• 제목/요약/키워드: SHA

검색결과 382건 처리시간 0.031초

16-비트 데이터 패스를 이용한 SHA-256 해시함수의 경량화 구현 (Lightweight Implementation of SHA-256 Hash Function using 16-bit Datapath)

  • 이상현;신경욱
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2017년도 춘계학술대회
    • /
    • pp.194-196
    • /
    • 2017
  • 본 설계에서는 임의의 길이의 메시지를 256-비트의 해시 코드로 압축하는 해시 알고리듬인 SHA-256(Secure Hash Algorithm-256) 해시함수를 경량화 구현 설계 하였다. 미국 표준 기술연구소 NIST에서 발표한 표준문서 FIPS 180-4에 정의16된 32-비트의 데이터 패스를 16-비트로 설계하여 경량화 구현하였다. Verilog HDL로 설계된 SHA-256 해시함수는 Xilinx ISim를 사용하여 시뮬레이션 검증을 하였다. CMOS 표준 셀 라이브러리로 합성한 결과 100MHz 동작주파수에서 18,192 GE로 구현되었으며, 192MHz의 최대 동작주파수를 갖는다.

  • PDF

SHA-3 후보들의 H/W 구현에 대한 전력 소모량 추정 (A Report on Power Estimation of SHA-3 Candidates H/W Implementation)

  • 이동건;추상호;김슬아;김호원
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2010년도 추계학술발표대회
    • /
    • pp.1183-1185
    • /
    • 2010
  • 2005년 중국의 Wang 등이 SHA-1의 충돌쌍 공격에 대한 취약성을 발표한 이후 미국의 NIST(National Institute of Standards and Technologies)에서는 새로운 표준 해쉬 함수에 대한 필요성을 제기하였으며, SHA-3로 사용될 새로운 해쉬 함수를 공모하게 되었다. 전세계에서 64개의 후보들이 제안되었으며, 1라운드가 끝난 2010년 현재 14개의 후보들에 대한 2 라운드 심사가 진행중이다. 본 논문에서는 ASIC(Application Specified Intergrated Circuit) 설계 과정에서 설계 대상의 전력 소모량을 추정하는 과정을 소개하고, 이를 이용해 SHA-3 후보들의 H/W 구현들에 대해서 전력 소모량을 추정하여 결과를 제시한다.

Enhancing the Session Security of Zen Cart based on HMAC-SHA256

  • Lin, Lihui;Chen, Kaizhi;Zhong, Shangping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권1호
    • /
    • pp.466-483
    • /
    • 2017
  • Zen Cart is an open-source online store management system. It is used all over the world because of its stability and safety. Today, Zen Cart's session security mechanism is mainly used to verify user agents and check IP addresses. However, the security in verifying the user agent is lower and checking the IP address can affect the user's experience. This paper, which is based on the idea of session protection as proposed by Ben Adida, takes advantage of the HTML5's sessionStorage property to store the shared keys that are used in HMAC-SHA256 encryption. Moreover, the request path, current timestamp, and parameter are encrypted by using HMAC-SHA256 in the client. The client then submits the result to the web server as per request. Finally, the web server recalculates the HMAC-SHA256 value to validate the request by comparing it with the submitted value. In this way, the Zen Cart's open-source system is reinforced. Owing to the security and integrity of the HMAC-SHA256 algorithm, it can effectively protect the session security. Analysis and experimental results show that this mechanism can effectively protect the session security of Zen Cart without affecting the original performance.

Look-Up Table Based Implementations of SHA-3 Finalists: JH, Keccak and Skein

  • Latif, Kashif;Aziz, Arshad;Mahboob, Athar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권9호
    • /
    • pp.2388-2404
    • /
    • 2012
  • Cryptographic hash functions are widely used in many information security applications like digital signatures, message authentication codes (MACs), and other forms of authentication. In response to recent advances in cryptanalysis of commonly used hash algorithms, National Institute of Standards and Technology (NIST) announced a publicly open competition for selection of new standard Secure Hash Algorithm called SHA-3. One important aspect of this competition is evaluation of hardware performances of the candidates. In this work we present efficient hardware implementations of SHA-3 finalists: JH, Keccak and Skein. We propose high speed architectures using Look-Up Table (LUT) resources on FPGAs, to minimize chip area and to reduce critical path lengths. This approach allows us to design data paths of SHA-3 finalists with minimum resources and higher clock frequencies. We implemented and investigated the performance of these candidates on modern and latest FPGA devices from Xilinx. This work serves as performance investigation of leading SHA-3 finalists on most up-to-date FPGAs.

1970-2014년 경상의료비 및 국민보건계정: SHA2011의 적용 (1970-2014 Current Health Expenditures and National Health Accounts in Korea: Application of SHA2011)

  • 정형선;신정우
    • 보건행정학회지
    • /
    • 제26권2호
    • /
    • pp.95-106
    • /
    • 2016
  • A new manual of System of Health Accounts (SHA) 2011, was published jointly by the Organization for Economic Cooperation and Development (OECD), Eurostat, and World Health Organization in 2011. This offers more complete coverage than the previous version, SHA 1.0, within the functional classification in areas such as prevention and a precise approach for tracking financing in the health care sector using the new classification of financing schemes. This paper aims to demonstrate current health expenditure (CHE) and National Health Accounts of the years 1970-2014 constructed according to the SHA2011. Data sources for public financing include budget and settlement documents of the government, various statistics from the National Health Insurance, and others. In the case of private financing, an estimation of total revenue by provider groups is made from the Economic Census data and the household income and expenditure survey, Korean healthcare panel study, etc. are used to allocate those totals into functional classifications. CHE was 105 trillion won in 2014, which accounts for 7.1% of Korea's gross domestic product. It was a big increase of 7.7 trillion won, 7.9%, from the previous year. Public share (government and compulsory schemes) accounting for 56.5% of the CHE in 2014 was still much lower than the OECD average of about 73%. With these estimates, it is possible to compare health expenditures of Korea and other countries better. Awareness and appreciation of the need and gains from applying SHA2011 for the health expenditure classification are expected to increase as OECD health expenditure figures get more frequently quoted among health policy makers.

Effect of Hip Flexion and Internal Rotation on the Hip Abductor Muscle Activity During Side-Lying Hip Abduction in Subjects With Gluteus Medius Weakness

  • Park, Hye-jin;Cho, Sang-hyun
    • 한국전문물리치료학회지
    • /
    • 제23권3호
    • /
    • pp.57-67
    • /
    • 2016
  • Background: Many previous studies recommended the side-lying hip abduction (SHA) exercise for targeting the gluteus medius (Gmed) and gluteus maximus (Gmax) muscle activity while the decreasing tensor fasciae latae (TFL) activation. Mischoice of hip position and angle in SHA may increase the risk of lower extremity injuries and undesirable muscle activation. However, information is limited on the effect of composite hip flexion angles and hip rotation on the gluteal muscle activity during SHA. Objects: This study aimed to compare muscle activity (Gmed, TFL, and Gmax) and activity ratios (Gmed/TFL, Gmax/TFL, and Gmed/Gmax) using surface electromyography (EMG) during SHA exercise at three different hip flexion angles either with or without internal rotation (IR) in subjects with Gmed weakness. We hypothesized that applying hip flexion and IR during SHA would increase gluteal muscle activity and decrease TFL activity. Methods: Muscle activity and activity ratios in 20 volunteers with Gmed weakness during 6 different SHA were investigated with surface EMG. One-way repeated-measures analysis of variance was used to determine the statistical significance. Results: Significant differences were found among the six different exercises for Gmed ($F_{2,41}=11.817$, p<.001) and Gmax ($F_{3,52}=5.513$, p=.003) muscle activity, and Gmed/TFL ($F_{3,54}=8.735$, p<.001) and Gmax/TFL ($F_{2,37}=4.019$, p=.028) activity ratios. Conclusion: Applying hip flexion is an effective method for increasing gluteal activity, and it elicits great Gmed/TFL and Gmax/TFL activity ratios during SHA in subjects with Gmed weakness.

환도혈(環跳穴) 오공약침(五蚣藥鍼) 자극(刺戟)이 백서(白鼠)의 신경병리성(神經病理性) 통증(痛症) 억제(抑制)에 미치는 영향(影響) (Inhibitory Effect of Scolopendrid Aqua-Acupuncture Injected at Hwando(GB30) on Neuropathic Pain in Rats)

  • 김성남;김성철;최회강;소기숙;임정아;황우준;문형철;최성용;이상관;나창수
    • Journal of Acupuncture Research
    • /
    • 제21권3호
    • /
    • pp.145-167
    • /
    • 2004
  • Objective : Neuropathic pain can be caused by a partial peripheral nerve injury. This kind of pain is usually accompanied by spontaneous burning pain, allodynia and hyperalgesia. It is not clear that scolopendrid aqua-acupuncture can control neuropathic pain effectively. The purpose of this study is to examine if scolopendrid aqua-acupuncture may be effective to the neuropathic pain (mechanical allodynia, cold allodynia) in a rat model of neuropathic pain. Methods : To produce the model of neuropathic pain, under isoflurane 2.5% anesthesia, tibial nerve and sural nerve was resected. After the neuropathic surgery, the author examined if the animals exhibited the behavioral signs of allodynia. The allodynia was assessed by stimulating the medial malleolus with von Frey filament and acetone. Three weeks after the neuropathic surgery, scolopendrid aqua-acupuncture was injected at Hwando(GB30) one time a day for one week. After that the author examined the withdrawl response of neuropathic rats' legs by von Frey filament and acetone stimulation. And also the author examined c-fos in the midbrain central gray of neuropathic rats and the change of WBC count in the blood of neuropathic rats. Results & Conclusion : 1. The scolopendrid aqua-acupuncture injected at Hwando(GB30) decreased the withdrawl response of mechanical allodynia in SHA-1, SHA-2 and SAH-3 group as compared with control group. 2. The scolopendrid aqua-acupuncture injected at Hwando(GB30) decreased the withdrawl response of chemical allodynia(cold allodynia) in SHA-1, SHA-2 and SAH-3 group as compared with control group. 3. The scolopendrid aqua-acupuncture injected at Hwando(GB30) showed the significant difference between sham group and control group(p=0.01), sham and SHA-3 group(p=0.026), control group and SHA-1 group(p=0.01), control group and SHA-2 group(p=0.024) in the c-fos expression. 4. The scolopendrid aqua-acupuncture injected at Hwando(GB30) showed the significant difference between sham group and SHA-3 group(p=0.010), control group and SHA-3 group(p=0.006) in the WBC count.

  • PDF

급암(及庵) 민사평(閔思平)의 현실인식 (A study on Keup-ahm Min Sah-pyeong's Realization of Reality)

  • 정성식
    • 동양고전연구
    • /
    • 제69호
    • /
    • pp.509-530
    • /
    • 2017
  • 본 논문의 목적은 고려 말에 삶을 영위한 민사평(閔思平, 1295~1359)의 현실인식을 고찰하는 데 있다. 민사평은 당시 여러 학자들과 활발한 교섭을 통해 학문적 교류가 가능했다. 그는 21세 때 과거시험에 합격한 후 여러 관직을 수행해 오면서 행동이 바르고 지조가 변하지 않았다. 민사평은 이제현, 백문보, 이색 등과 자주 만남을 가지며 생각을 주고 받았다. 가끔 백문보는 모여서 술 마실 때 함께하지 않은 적이 없었다. 이색은 민자평이 현묘한 시법을 깨달은 자라고 높게 평가한 바 있으며, 그의 시는 후세까지 계속 전해질 것이라고 확신하였다. 민사평이 활동했던 시대는 고려 말로서 국내외적으로 매우 혼란스러웠던 때였다. 국외적으로 고려 말은 당시 빈번했던 왜구와 흉노의 침입으로 인해 피폐해진 국토와 고통 받는 백성들로 온 나라가 불안정했다. 국내적으로는 당시 위정자들의 부패와 백성들의 고통이 심각했다. 그는 당시 백성들의 궁핍한 생활상을 비판적으로 언급하며 애민적 현실인식을 보였다. 그는 의리가 없는 삶은 정상적인 삶이 아니라고 주장하였다. 만약 욕심이 있다면 부귀영화도 언젠간 쇠퇴할 것이라고 지적하였다. 그는 당시 백성의 심정을 깊이 동정하고 그들의 입장을 대변하여 구제될 수 있기를 희망하였다. 여기서 민사평의 애민적 현실인식이 분명하게 드러나고 있음을 살필 수 있었다.

ARIRANG, HAS-160, PKC98-Hash의 축소된 단계들에 대한 역상공격 (Preimage Attacks on Reduced Steps of ARIRANG, HAS-160, and PKC98-Hash)

  • 홍득조;구본욱;김우환;권대성
    • 정보보호학회논문지
    • /
    • 제20권2호
    • /
    • pp.3-14
    • /
    • 2010
  • 본 논문에서는 ARIRANG, HAS-160, PKC98-Hash의 단계-축소 버전에 대한 역상공격 결과를 소개한다. 이 공격에는 Aoki와 Sasaki가 SHA-0와 SHA-1의 단계-축소 버전을 공격하는데 이용한 chunk 검색 방법이 응용되었다. 본 논문에서 소개하는 공격 알고리즘들은 각각 ARIRANG, HAS-160, PKC98-Hash의 35단계, 65단계, 80단계에 대하여 전수조사보다 빠른시간내에 역상을 찾는다.

디지털 포렌식을 위한 SHA-256 활용 데이터 수정 감지시스템 제안 (A Proposal on Data Modification Detection System using SHA-256 in Digital Forensics)

  • 장은진;신승중
    • 한국인터넷방송통신학회논문지
    • /
    • 제21권4호
    • /
    • pp.9-13
    • /
    • 2021
  • 통신 기술의 발달과 더불어 다양한 형태의 디지털 범죄가 증가하고 있고, 이에 따라 디지털 포렌식에 대한 필요성이 높아지고 있다. 더욱이 특정인이 중요한 데이터를 담고 있는 텍스트 문서를 고의적으로 삭제하거나 수정할 경우 데이터 수정 감지 여부를 확인하는 시스템을 통해 특정인과 범죄와의 연관성을 입증할 수 있는 중요한 자료가 될 수 있을 것이다. 이에 본 논문은 텍스트 파일을 중심으로 암호화 기법 중 하나인 SHA-256의 hash data, 생성 시간, 수정 시간, 접근 시간 및 파일의 크기 등을 분석하여 대상 텍스트 파일의 수정 여부를 비교할 수 있는 데이터 수정 감지 시스템을 제안한다.