• Title/Summary/Keyword: SHA 2011

Search Result 13, Processing Time 0.035 seconds

1970-2014 Current Health Expenditures and National Health Accounts in Korea: Application of SHA2011 (1970-2014년 경상의료비 및 국민보건계정: SHA2011의 적용)

  • Jeong, Hyoung-Sun;Shin, Jeong-Woo
    • Health Policy and Management
    • /
    • v.26 no.2
    • /
    • pp.95-106
    • /
    • 2016
  • A new manual of System of Health Accounts (SHA) 2011, was published jointly by the Organization for Economic Cooperation and Development (OECD), Eurostat, and World Health Organization in 2011. This offers more complete coverage than the previous version, SHA 1.0, within the functional classification in areas such as prevention and a precise approach for tracking financing in the health care sector using the new classification of financing schemes. This paper aims to demonstrate current health expenditure (CHE) and National Health Accounts of the years 1970-2014 constructed according to the SHA2011. Data sources for public financing include budget and settlement documents of the government, various statistics from the National Health Insurance, and others. In the case of private financing, an estimation of total revenue by provider groups is made from the Economic Census data and the household income and expenditure survey, Korean healthcare panel study, etc. are used to allocate those totals into functional classifications. CHE was 105 trillion won in 2014, which accounts for 7.1% of Korea's gross domestic product. It was a big increase of 7.7 trillion won, 7.9%, from the previous year. Public share (government and compulsory schemes) accounting for 56.5% of the CHE in 2014 was still much lower than the OECD average of about 73%. With these estimates, it is possible to compare health expenditures of Korea and other countries better. Awareness and appreciation of the need and gains from applying SHA2011 for the health expenditure classification are expected to increase as OECD health expenditure figures get more frequently quoted among health policy makers.

Analysis on Power Consumption Characteristics of SHA-3 Candidates and Low-Power Architecture (SHA-3 해쉬함수 소비전력 특성 분석 및 저전력 구조 기법)

  • Kim, Sung-Ho;Cho, Sung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.115-125
    • /
    • 2011
  • Cryptographic hash functions are also called one-way functions and they ensure the integrity of communication data and command by detecting or blocking forgery. Also hash functions can be used with other security protocols for signature, authentication, and key distribution. The SHA-1 was widely used until it was found to be cryptographically broken by Wang, et. al, 2005. For this reason, NIST launched the SHA-3 competition in November 2007 to develop new secure hash function by 2012. Many SHA-3 hash functions were proposed and currently in review process. To choose new SHA-3 hash function among the proposed hash functions, there have been many efforts to analyze the cryptographic secureness, hardware/software characteristics on each proposed one. However there are few research efforts on the SHA-3 from the point of power consumption, which is a crucial metric on hardware module. In this paper, we analyze the power consumption characteristics of the SHA-3 hash functions when they are made in the form of ASIC hardware module. Also we propose power efficient hardware architecture on Luffa, which is strong candidate as a new SHA-3 hash function. Our proposed low power architecture for Luffa achieves 10% less power consumption than previous Luffa hardware architecture.

Roles of Putative Sodium-Hydrogen Antiporter (SHA) Genes in S. coelicolor A3(2) Culture with pH Variation

  • Kim, Yoon-Jung;Moon, Myung-Hee;Lee, Jae-Sun;Hong, Soon-Kwang;Chang, Yong-Keun
    • Journal of Microbiology and Biotechnology
    • /
    • v.21 no.9
    • /
    • pp.979-987
    • /
    • 2011
  • Culture pH change has some important roles in signal transduction and secondary metabolism. We have already reported that acidic pH shock enhanced actinorhodin production in Streptomyces coelicolor. Among many potential governing factors on pH variation, the putative $Na^+/H^+$ antiporter (sha) genes in S. coelicolor have been investigated in this study to elucidate the association of the sha on pH variation and secondary metabolism. Through the transcriptional analysis and overexpression experiments on 8 sha genes, we observed that most of the sha expressions were promoted by pH shock, and in the opposite way the pH changes and actinorhodin production were enhanced by the overexpression of each sha. We also confirmed that sha8 especially has a main role in maintaining cell viability and pH homeostasis through $Na^+$ extrusion, in salt effect experiment under the alkaline medium condition by deleting sha8. Moreover, this gene was observed to have a function of pH recovery after pH variation such as the pH shock, being able to cause the sporulation. However, actinorhodin production was not induced by the only pH recovery. The sha8 gene could confer on the host cell the ability to recover pH to the neutral level after pH variation like a pH drop. Sporulation was closely associated with this pH recovery caused by the action of sha8, whereas actinorhodin production was not due to such pH variation patterns alone.

Performance Evaluation of Cryptographic Algorithms for the 6LoWPAN with Packet Fragmentations (6LoWPAN 단편화 패킷 재전송에 따른 암호화 알고리즘 성능 분석)

  • Kim, Hyun-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.8
    • /
    • pp.77-84
    • /
    • 2011
  • In this paper we implement a 6LoWPAN protocol on the MICAz sensor platform, which could minimize packet re-transmission, and support security primitives for packet integrity and confidentiality. And we also present a performance evaluation of the implemented protocol calculated according to the cryptographic algorithms. In the re-transmission method, time stamp, nonce, and checksum are considered to protect replay attacks. As cryptographic algorithms, AES, 3DES, SHA2, and SHA1 are implemented. If transmission errors (thus, packet losses) and the number of hops are increase then, packet re-transmissions are increase exponentially from the experimental results. Also, the result shows that cryptographic operations take more time than packet re-transmission time.

2015 National Health Accounts and Current Health Expenditures in Korea (2015년 국민보건계정과 경상의료비)

  • Jeong, Hyoung-Sun;Shin, Jeong-Woo
    • Health Policy and Management
    • /
    • v.27 no.3
    • /
    • pp.199-210
    • /
    • 2017
  • Background: This paper aims to demonstrate current health expenditure (CHE) and National Health Accounts of the years 2015 constructed according to the SHA2011, which is a new manual of System of Health Accounts (SHA) that was published jointly by the Organization for Economic Cooperation and Development (OECD), Eurostat, and World Health Organization in 2011. Comparison is made with international trends by collecting and analysing health accounts of OECD member countries. Particularly, financing public-private mix is parsed in depth using SHA data of both HF as financing schemes as well as FS (financing source) as their revenue types. Methods: Data sources such as Health Insurance Review and Assessment Service's publications of both motor insurance and drugs are newly used to construct the 2015 National Health Accounts. In the case of private financing, an estimation of total expenditures for revenues by provider groups is made from the Economic Census data; and the household income and expenditure survey, Korean healthcare panel study, etc. are used to allocate those totals into functional classifications. Results: CHE was 115.2 trillion won in 2015, which accounts for 7.4 percent of Korea's gross domestic product. It was a big increase of 9.3 trillion won, 8.8 percent, from the previous year. Government and compulsory schemes's share (or public share) of 56.4% of the CHE in 2015 was much lower than the OECD average of 72.6%. 'Transfers from government domestic revenue' share of total revenue of HF was 17.8% in Korea, lower than the other contribution-based countries. When it comes to 'compulsory contributory health financing schemes,' 'Transfers from government domestic revenue' share of 14.9% was again much lower compared to Japan (44.7%) and Belgium (34.8%) as contribution-based countries. Conclusion: Considering relatively lower public financing share in the inpatient care as well as overall low public financing share of total CHE, priorities in health insurance coverage need to be repositioned among inpatient care, outpatient care and drugs.

A Key Recovery Attack on HMAC using Fault Injection Attack (오류 주입 공격을 이용한 HMAC에 대한 키 복구 공격)

  • Jeong, Ki-Tae;Lee, Yu-Seop;Sung, Jae-Chul;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.27-33
    • /
    • 2011
  • At FDTC'05 and CISC-W'10, the authors showed that if they decrease the number of rounds of AES and Triple-DES by using the fault injections, it is possible to recover the secret key of the target algorithms, respectively. In this paper, we propose a key recovery attack on HMAC by using the main idea of these attacks. This attack is applicable to HMAC based on MD-family hash functions and can recover the secret key with the negligible computational complexity. Particularly, the attack result on HMAC-SHA-2 is the first known key recovery attack result on this algorithm.

Design and Implementation of Disk Archive System Exploiting De-duplication Scheme (데이터 중복 제거 기반의 디스크 아카이브 시스템 설계 및 구현)

  • Kang, Sung-Woon;Jung, Ho-Min;Ko, Young-Woong;Lee, Jeong-Gun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.204-206
    • /
    • 2011
  • 기존의 TAR와 같은 아카이브 포맷은 파일의 중복을 제거하는 기능이 포함되지 않아 리눅스 배포 미러와 같이 버전단위로 저장되는 시스템에서 디스크 공간의 낭비가 발생했다. 본 연구에서는 중복 제거 기능이 포함된 아카이브 포맷인 DTAR와 이를 지원하는 DTM 유틸리티를 제안하였다. 주요 아이디어는 DTAR 헤더에 SHA1 해시를 삽입하고 SHA1 해시를 노드로 하는 R-B Tree를 생성하여 중복을 검색 및 제거하는 것이다. 실험 결과 DTAR가 tar.gz보다 최대 31% 공간을 절약하고, 수행 시간도 줄어드는 것을 확인하여 효율적임을 보였다.

2018 Current Health Expenditures and National Health Accounts in Korea (2018년 경상의료비 및 국민보건계정)

  • Jeong, Hyoung-Sun;Shin, Jeong-Woo;Moon, Sung-Woong;Choi, Ji-Sook;Kim, Heenyun
    • Health Policy and Management
    • /
    • v.29 no.2
    • /
    • pp.206-219
    • /
    • 2019
  • This paper aims to demonstrate current health expenditure (CHE) and National Health Accounts of the years 2018 constructed according to the SHA2011, which is a manual for System of Health Accounts (SHA) that was published jointly by the Organization for Economic Cooperation and Development (OECD), Eurostat, and World Health Organization in 2011. Comparison is made with international trends by collecting and analyzing health accounts of OECD member countries. Particularly, scale and trends of the total CHE financing as well as public-private mix are parsed in depth. In the case of private financing, estimation of total expenditures for (revenues by) provider groups (HP) is made from both survey on the benefit coverage rate of National Health Insurance (by National Health Insurance Service) and Economic Census and Service Industry Census (by National Statistical Office); and other pieces of information from Korean Health Panel Study, etc. are supplementarily used to allocate those totals into functional classifications. CHE was 144.4 trillion won in 2018, which accounts for 8.1% of Korea's gross domestic product (GDP). It was a big increase of 12.8 trillion won, or 9.7%, from the previous year. GDP share of Korean CHE has already been close to the average of OECD member countries. Government and compulsory schemes' share (or public share), 59.8% of the CHE in 2018, is much lower than the OECD average of 73.6%. 'Transfers from government domestic revenue' share of total revenue of health financing was 16.9% in Korea, lower than the other social insurance countries. When it comes to 'compulsory contributory health financing schemes,' 'transfers from government domestic revenue' share of 13.5% was again much lower compared to Japan (43.0%) and Belgium (30.1%) with social insurance scheme.

Data Backup System Exploiting De-duplication TAR Scheme (중복제거 TAR 기법을 적용한 백업 시스템)

  • Kang, Sung-Woon;Jung, Ho-Min;Lee, Jeong-Gun;Ko, Young-Woong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06a
    • /
    • pp.539-542
    • /
    • 2011
  • TAR와 같은 아카이브 포맷에는 파일 중복을 제거하는 기능이 포함되어 있지 않아서 리눅스 배포 미러와 같이 버전단위로 저장되는 시스템에서 디스크 공간의 낭비가 발생하였다. 본 연구에서는 파일 중복 제거 기능을 추가한 TAR형태의 압축 포맷인 DTAR와 이를 제어하는 DTM 유틸리티를 제안하였다. 주요 아이디어는 클라이언트에서 DTAR 생성 시, 헤더에 SHA1 해시 정보를 추가하여 DTM 유틸리티를 통해 SHA1 해시를 노드로 하는 R-B Tree를 생성하고 이를 서버에 저장된 해시 정보와 비교하여 DTAR내에서 중복이 없는 파일을 선택적으로 파일을 압축하고 서버로 백업하고 관리하는 것이다. 실험 결과 DTM을 통한 백업은 중복 데이터가 누적될수록 DTAR가 tar.gz보다 공간적인 측면이나 백업을 위한 데이터 패킷 전송 시간에서 크게 향상된 성능을 보였다.

A 1.8V 50-MS/s 10-bit 0.18-um CMOS Pipelined ADC without SHA

  • Uh, Ji-Hun;Kim, Won-Myung;Kim, Sang-Hun;Jang, Young-Chan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.143-146
    • /
    • 2011
  • A 50-MS/s 10-bit pipelined ADC with 1.2Vpp differential input range is proposed in this paper. The designed pipelined ADC consists of eight stage of 1.5bit/stage, one stage of 2bit/stage, digital error correction block, bias & reference driver, and clock generator. 1.5bit/stage is consists of sub-ADC, DAC and gain stage, Specially, a sample-and hold amplifier (SHA) is removed in the designed pipelined ADC to reduce the hardware and power consumption. Also, the proposed bootstrapped switch improves the Linearity of the input analog switch and the dynamic performance of the total ADC. The reference voltage was driven by using the on-chip reference driver without external reference. The proposed pipelined ADC was designed by using a 0.18um 1-poly 5-metal CMOS process with 1.8V supply. The total area including the power decoupling capacitor and power consumption are $0.95mm^2$ and 60mW, respectively. Also, the simulation result shows the ENOB of 9.3-bit at the Nyquist sampling rate.

  • PDF