• Title/Summary/Keyword: Round Key

Search Result 276, Processing Time 0.025 seconds

Multiple Linear Cryptanalysis-Revisited (블록 암호에 대한 효율적인 선형 공격 방법)

  • Choi, Jun;Hong, Deuk-Jo;Hong, Seok-Hee;Lee, Sang-Jin;Im, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.59-69
    • /
    • 2002
  • Many Linear attacks have introduced after M. Matsui suggested Linear Cryptanalysis in 1993. The one of them is the method suggested by B. Kaliski and M. Robshaw. It was a new method using multiple linear approximations to attack for block ciphers. It requires less known plaintexts than that of Linear Cryptanalysis(LC) by Matsui, but it has a problem. In this paper, we will introduce the new method using multiple linear approximation that can solve the problem. Using the new method, the requirements of the known plaintexts is 5(1.25) times as small as the requirements in LC on 8(16) round DES with a success rate of 95%(86%) respectively. We can also adopt A Chosen Plaintext Linear Attack suggested by L. R. Knudsen and J. E. Mathiassen and then our attack requires about $2^{40.6}$ chosen plaintexts to recover 15 key bits with 86% success rate. We believe that the results in this paper contain the fastest attack on the DES full round reported so far in the open literature.

A Study on the Wearing Occasions of the Royal Attire in Joseon Dynasty through the Regular rule of Sang-uiwon ("상방정례로" 보는 조선왕실의 복식구조 - 착용사례를 중심으로 -)

  • Kim, Soh-Hyeon
    • Journal of the Korean Society of Costume
    • /
    • v.58 no.3
    • /
    • pp.149-162
    • /
    • 2008
  • The Regular rule of Sang-uiwon served as a manual of Royal Attires. According to the procedures, like as making letters about the affairs, consulting, and permission, Royal ceremonial attire was made and presented to the royal family. The materials for the Royal informal dress were presented in accordance with usual tributes. There was no difference in informal dress between the royal family and noble class. But the name of items was different such as Goa du[man's jacket], Go ui[woman's jacket], etc. The royal family continued to wear old days dress as akjurm and noui, which were not worn by common people any more, as a means of differentiating clothes. Bub-bok, which was designed only for key figures of the royal family such as the king, crown prince, queen, and crown princess, was the best status symbol. Because of its highly limited example of wearing, bub-bok was the authority of the wearer itself; with only difference in color, pattern, and material depending on social status. Yong-po is the most frequently worn by the Royal men. Yong-po worn with jong-lip served as yung-bok or gun-bok, and iksun-gwan functioned as sang-bok. Royal Attire for men was clearly divided into Yong-po as sang-bok, bub-bok as myun-bok and gangsa-po, while jeok-ui for women functioned as both sang-bok and bub-bok. However, the use of jeok-ui was defined by differentiate sang-bok from bub-bok like as the pattern of Hyung-bae, number of embroidered round badges, shoes and ornaments.

A New Approach for Image Encryption Based on Cyclic Rotations and Multiple Blockwise Diffusions Using Pomeau-Manneville and Sin Maps

  • Hanchinamani, Gururaj;Kulakarni, Linganagouda
    • Journal of Computing Science and Engineering
    • /
    • v.8 no.4
    • /
    • pp.187-198
    • /
    • 2014
  • In this paper an efficient image encryption scheme based on cyclic rotations and multiple blockwise diffusions with two chaotic maps is proposed. A Sin map is used to generate round keys for the encryption/decryption process. A Pomeau-Manneville map is used to generate chaotic values for permutation, pixel value rotation and diffusion operations. The encryption scheme is composed of three stages: permutation, pixel value rotation and diffusion. The permutation stage performs four operations on the image: row shuffling, column shuffling, cyclic rotation of all the rows and cyclic rotation of all the columns. This stage reduces the correlation significantly among neighboring pixels. The second stage performs circular rotation of pixel values twice by scanning the image horizontally and vertically. The amount of rotation is based on $M{\times}N$ chaotic values. The last stage performs the diffusion four times by scanning the image in four different ways: block of $8{\times}8$ pixels, block of $16{\times}16$ pixels, principal diagonally, and secondary diagonally. Each of the above four diffusions performs the diffusion in two directions (forwards and backwards) with two previously diffused pixels and two chaotic values. This stage makes the scheme resistant to differential attacks. The security and performance of the proposed method is analyzed systematically by using the key space, entropy, statistical, differential and performance analysis. The experimental results confirm that the proposed method is computationally efficient with high security.

A Survey on Elements of an Effective Hospital Infection Control Program for Korea (효과적인 병원감염관리 프로그램의 구성 요소에 대한 조사연구)

  • 윤혜상
    • Journal of Korean Academy of Nursing
    • /
    • v.19 no.2
    • /
    • pp.147-159
    • /
    • 1989
  • The main Purpose of this survey was to identify for elements of an effective hospital infection control program for Korea. Nurses and doctors who had participated in an education program for infection control or were re s ponsible for hospital infection control were selected as data informers. The data were collected from 51 subjects by employing a Delphi technique in a series of three rounds from september 1, 1987, to March 31, 1988. IN each round the responses to questionaires were analyzed and the results were communicated back to the individuals. Finally 32 elements of effective hospital infection control program were reduced to 10 elements. 10 elements are as follows ; 1) Hospital administrator's knowledge of importance and necessity for HIC(hospital infection control) 2) Supporting HIC administratively 3) Constituting infection control committee and role of ICC 4) Developing an eductional program and providing a work manual for the hospital infection control staff 5) Educating and informing medical staff about hospital infection 6) Surveillance for hospital infection 7) Developing patient care technique 8) Controlling the hospital environment 9) Executing regular health examination of all medical staff 10) Recruiting the medical staff sufficiently Three rankings of response rate about 32 elements are as follows ; 1) Hiring a full tim staff member for the HIC(66%) 2) Establishing a hospital policy and standards for the HIC(66%) 3) Activating the infection control committee and taking administrative action to support the ICC(63%) In addition the rankings of importance score by Likert 5 scale are as follows ; 1) Washing hands scrupulously(4.88) 2) Nurses participation as key members of the ICC(4.75) 3) Reviewing and evaluating all ongoing aseptic techniques (4.69) In conclusion, first of all, administrative support must be given to hiring a full time staff member and to organization of infection control committee for the HIC in Korea.

  • PDF

Diversity of Bacillus thuringiensis Strains Isolated from Citrus Orchards in Spain and Evaluation of Their Insecticidal Activity Against Ceratitis capitata

  • J.C., Vidal-Quist;Castanera, P.;Gonzalez-Cabrera, J.
    • Journal of Microbiology and Biotechnology
    • /
    • v.19 no.8
    • /
    • pp.749-759
    • /
    • 2009
  • A survey of Bacillus thuringiensis (Berliner) strains isolated from Spanish citrus orchards has been performed, and the strains were tested for insecticidal activity against the Mediterranean fruit fly Ceratitis capitata (Wiedemann), a key citrus pest in Spain. From a total of 150 environmental samples, 376 isolates were selected, recording a total B. thuringiensis index of 0.52. The collection was characterized by means of phase-contrast microscopy, SDS-PAGE, and PCR analysis with primer pairs detecting toxin genes cry1, cry2, cry3, cry4, cry5, cry7, cry8, cry9, cry10, cry11, cry12, cry14, cry17, cry19, cry21, cry27, cry39, cry44, cyt1, and cyt2. Diverse crystal inclusion morphologies were identified: bipyramidal (45%), round (40%), adhered to the spore (7%), small (5%), and irregular (3%). SDS-PAGE of spore-crystal preparations revealed 39 different electrophoresis patterns. All primer pairs used in PCR tests gave positive amplifications in strains of our collection, except for primers for detection of cry3, cry19, cry39, or cry44 genes. Strains containing cry1, cry2, cry4, and cry27 genes were the most abundant (48.7%, 46%, 11.2%, and 8.2% of the strains, respectively). Ten different genetic profiles were found, although a total of 109 strains did not amplify with the set of primers used. Screening for toxicity against C. capitata adults was performed using both spore-crystal and soluble fractions. Mortality levels were less than 30%. We have developed a large and diverse B. thuringiensis strain collection with huge potential to control several agricultural pests; however, further research is needed to find out Bt strains active against C. capitata.

The Change Pattern of Body Shape on Chronological Age in Korea Adult Women (한국 성인 여성의 연령대별 체형변화에 대한 연구)

  • Kim, Kyoung Sun;Han, Hyunsook;Nam, Yun Ja
    • Fashion & Textile Research Journal
    • /
    • v.19 no.1
    • /
    • pp.49-60
    • /
    • 2017
  • In this study, change trends and specific times for change in body size were sought to be identified by using manual measurements for Korean adult women at 20 to 89 of age, along with examinations of change trends and specific times of change in body shape based on body index values. The examinations of means, deviations, and variation coefficients revealed that there was a tendency of most height related measures to decrease. In addition, combined with decrease in height, growth in weight led to increased BMI, thus resulting in increase in measures of circumference, thickness, and breadth in the torso area. The BMI trends showed that with increasing age, BMI increased, reaching the peak between the ages of 55 and 59 and then decreasing from 64 of age, with the steepest increase in BMI at ages from 50 to 54. The examination of differences in the body flatness ratio for different parts of body found that with increasing age the ratio decreased, indicating a tendency for gradual change to round body shapes. The analysis of 3D body shape found that there were more back-bends and lowered shoulder levels with age, accompanied with a tendency for more bended legs and more inclined-forward necks. The key trends in changes in body measurements by age and detailed estimates of 3D standard body shape drawn out from this study are expected to significantly contribute to establishing a basic database for generating patterns reflecting age features of Korean adult females.

Immediate Breast Reconstruction using saline implant: Extension of pectoralis major muscle coverage with AlloDerm® (식염수 보형물을 이용한 즉시 유방 재건술: AlloDerm®을 이용한 대흉근 피복의 확장)

  • Hwang, Chang Heon;Kim, Eun Key;Eom, Jin Sup;Ahn, Sei Hyun;Son, Byung Ho;Kim, Tae Gon;Lee, Taik Jong
    • Archives of Plastic Surgery
    • /
    • v.36 no.2
    • /
    • pp.161-166
    • /
    • 2009
  • Purpose: Using the implant for the breast reconstruction still remains the options, despite the breast reconstruction using autologous tissue is an ideal method. In this study, we used AlloDerm$^{(R)}$ to extend subpectoral pocket for covering implants to reduce implant related complications. Met hods : From January 2005 to June 2007, 18 breasts in 16 patients were reconstructed using implant and AlloDerm$^{(R)}$ immediately after mastectomy. Hospital records, database files, and clinical photographs were reviewed. A ten - point scale was used to evaluate the patient's satisfaction, with a range from 2(poor) to 10(excellent). Results: Mean age of the patients was 38.7 years at the time of operation. Mean weight of removed breast tissue was 287g. AlloDerm$^{(R)}$ was used to extend subpectoral coverage. Any systemic complication was not reported. Breast complication was developed in 4 cases. Implant removal or change was not experienced. Conclusion: Immediate breast reconstruction using Implant is useful methods for certain conditions, when donor tissue is insufficient and breast is non ptotic with round shape. In those cases, extension of muscle coverage using AlloDerm$^{(R)}$ could reduce complications and lead more acceptable results.

A study on the perception of the Korean industrial security ecosystem using Delphi Method (전문가 델파이기법을 활용한 한국 산업보안 생태계 인식 조사연구)

  • Kang, Min Ji;Park, Chansoo
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.89-97
    • /
    • 2020
  • Recently, security issues on industrial technology are undergoing rapid changes around the world. Developed countries are establishing response strategies to protect their own core technologies while creating conflicts with global value chains and foreign capital movement. Also in Korea, we are approaching industrial security issues in the mid- to long-term industrial competitiveness. The purpose of this study is to survey on the awareness of the industrial security ecosystem and derive key policy issues. Based on a three round survey, four policies were suggested as followings : systemization of industrial security control tower, enhancement of security company's technical skills and training of security specialists, improvement of technology leakage prevention system through retirement personnel and M&A, reinforcement of research security in R&D process and proactive technology protection. It is hoped that this study will serve as a basis for policy-making as an evidence-based study reflecting the policy demands of industrial security.

High Speed Implementation of LEA on ARM Cortex-M3 processor (ARM Cortex-M3 프로세서 상에서의 LEA 암호화 고속 구현)

  • Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.8
    • /
    • pp.1133-1138
    • /
    • 2018
  • Lightweight Encryption Algorithm (LEA) is one of the most promising lightweight block cipher algorithm due to its high efficiency and security level. There are many works on the efficient LEA implementation. However, many works missed the secure application services where the IoT platforms perform secure communications between heterogeneous IoT platforms. In order to establish the secure communication channel between them, the encryption should be performed in the on-the-fly method. In this paper, we present the LEA implementation performing the on-the-fly method over the ARM Cortex-M3 processors. The general purpose registers are fully utilized to retain the required variables for the key scheduling and encryption operations and the rotation operation is optimized away by using the barrel-shifter technique. Since the on-the-fly method does not store the round keys, the RAM requirements are minimized. The implementation is evaluated over the ARM Cortex-M3 processor and it only requires 34 cycles/byte.

The First Finding of the Lichen Solorina saccata at an Algific Talus Slope in Korea

  • Park, Jung Shin;Kim, Dong-Kap;Kim, Chang Sun;Oh, Seunghwan;Kim, Kwang-Hyung;Oh, Soon-Ok
    • Mycobiology
    • /
    • v.48 no.4
    • /
    • pp.276-287
    • /
    • 2020
  • An algific talus slope is composed of broken rocks with vents connected to an ice cave, releasing cool air in summer and relatively warmer air in winter to maintain a more stable microclimate all year round. Such geological features create a very unusual and delicate ecosystem. Although there are around 25 major algific talus slopes in Korea, lichen ecology of these areas had not been investigated to date. In this study, we report the first exploration of lichen diversity and ecology at an algific talus slope, Jangyeol-ri, in Korea. A total of 37 specimens were collected over 2017-2018. Morphological and sequencing analysis revealed 27 species belonging to 18 genera present in the area. Of particular interest among these species was Solorina saccata, as it has previously not been reported in Korea and most members of genus Solorina are known to inhabit alpine regions of the Northern Hemisphere. We provide here a taxonomic key for S. saccata alongside molecular phylogenetic analyses and prediction of potential habitats in South Korea. Furthermore, regions in South Korea potentially suitable for Solorina spp. were predicted based on climatic features of known habitats around the globe. Our results showed that the suitable areas are mostly at high altitudes in mountainous areas where the annual temperature range does not exceed 26.6 ℃. Further survey of other environmental conditions determining the suitability of Solorina spp. should lead to a more precise prediction of suitable habitats and trace the origin of Solorina spp. in Korea.