• Title/Summary/Keyword: SHA-1

Search Result 205, Processing Time 0.028 seconds

Analysis of implementation of SHA-1 hash function for Low power Sensor Network (저전력 센서 네트워크 노드용 SHA-1 해쉬함수 구현 분석)

  • Choi, Yong-Je;Lee, Hang-Rok;Kim, Ho-Won
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.201-202
    • /
    • 2006
  • In this paper, we achieved software and hardware implementation of SHA-1 hash function for sensor network. We implemented the software to be compatible with TinySec. In hardware design, we optimized operation logics for small area of hardware and minimized data transitions of register memory for low power design. Designed the software and hardware is verified on commercial sensor motes and our secure motes respectively.

  • PDF

Performance Evaluation of Cryptographic Algorithms for the 6LoWPAN with Packet Fragmentations (6LoWPAN 단편화 패킷 재전송에 따른 암호화 알고리즘 성능 분석)

  • Kim, Hyun-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.8
    • /
    • pp.77-84
    • /
    • 2011
  • In this paper we implement a 6LoWPAN protocol on the MICAz sensor platform, which could minimize packet re-transmission, and support security primitives for packet integrity and confidentiality. And we also present a performance evaluation of the implemented protocol calculated according to the cryptographic algorithms. In the re-transmission method, time stamp, nonce, and checksum are considered to protect replay attacks. As cryptographic algorithms, AES, 3DES, SHA2, and SHA1 are implemented. If transmission errors (thus, packet losses) and the number of hops are increase then, packet re-transmissions are increase exponentially from the experimental results. Also, the result shows that cryptographic operations take more time than packet re-transmission time.

EFFECT OF XYLITOL ON BINDING OF ORAL BACTERIA TO SALIVA-COATED SURFACES (Xylitol이 구강세균의 부착에 미치는 영향에 관한 연구)

  • Choi, Hye-Jin;Choi, Ho-Young
    • Restorative Dentistry and Endodontics
    • /
    • v.22 no.1
    • /
    • pp.170-180
    • /
    • 1997
  • Cariogenicity of the bacteria is attributed to their binding capacity to the teeth. Bacterial attachment to oral surfaces is an essential step for colonization and subsequently infection. Therefore, it is conceivable that caries prevention can be achieved fundamentally by inhibition of bacterial attachment. The rationale for caries prevention through the use of sugar substitutes or limited use of sugar has been revealed. Among many sugar substitutes, xylitol has been shown to exhibit the most profound cariostatic effect, inhibiting glucose metabolism and possibly binding of mutans streptococci. The purpose of this study was to examine the effect of xylitol on binding of different species of oral bacteria. The effect of xylitol on binding of [$^3H$]-labeled oral bacteria to hydroxyapatite coated with human saliva(SHA) as a model for the pellicle-coated tooth surfaces was investigated. The strains of oral bacteria used in this study were A. viscosus T14V, A. viscosus WVU627, P. gingivaiis 2561, P. gingivalis A7Al-28, S. gordonii G9B, S. gordonii Challis, S. sobrinus 6715, S. mutans UA101, S. mutans KPSK -2, S. mutans T8, and S. mutans UA130. The obtained results were as follows: 1. P. gingivalis A7 Al-28, S. mutans UA130, S. mutans T8 grown with xylitol showed greater binding to SHA than the organism grown without xylitol. Among these, S. mutans T8 showed the greatest rate of increase in its binding to SHA ; 8-fold increase in its binding with xylitol. 2. S. mutans KPSK -2 grown with xylitol showed 2 times lesser binding to SHA than the organism grown without xylitol. 3. Binding ability of the remaining strains grown with xylitol to SHA was almost same as that of the organisms grown without xylitol. The overall results suggest that use of xylitol in the oral cavity may affect the complex oral bacterial ecosystem.

  • PDF

Recent Domestic and International Clinical Research Trends in Gua Sha Therapy: A Scoping Review (괄사요법의 국내외 최신 임상 연구 동향: 주제범위 문헌고찰)

  • Seungwon Jung;Seungkwan Choi;Jungho Jo;Yunhee Han;Hyeonjun Woo;Byeonghyeon Jeon;Wonbae Ha;Junghan Lee
    • Journal of Korean Medicine Rehabilitation
    • /
    • v.34 no.1
    • /
    • pp.23-38
    • /
    • 2024
  • Objectives This study examined recent domestic and international clinical research trends in Gua sha therapy to suggest future direction for research. Methods We used six domestic and international databases (Research Information Sharing Service, Korean studies Information Service System, Oriental Medicine Advanced Searching Integrated System, PubMed, Embase, Cochrane Library) to select clinical studies with an original text in English or Korean published after 2018. Results Finally, 55 studies were selected. Randomized controlled trials accounted for the largest amount with 42 studies. Instrument assisted soft tissue mobilization was the most frequent term referring to Gua sha. Muscle shortening, limited range of motion, and plantar fasciitis were the most common symptoms, with six cases each. Additionally, there were two studies targeting symptoms other than the musculoskeletal system. Conclusions Additional research is needed on the effects of Gua sha therapy on the back of the lower extremities and hip joints, and research is needed on the possibility of their clinical use for diseases or symptoms other than those of the musculoskeletal system. And standards for the terminology of Gua sha and the types and methods of applied interventions are needed.

Preimage Attacks on Step-Reduced ARIRANG (해쉬함수 ARIRANG의 출소된 단계에 대한 역상공격)

  • Hong, Deuk-Jo;Kim, Woo-Hwan;Koo, Bon-Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.143-149
    • /
    • 2009
  • The hash function ARIRANG is one of the 1st round SHA-3 candidates. In this paper, we present preimage attacks on ARIRANG with step-reduced compression functions. Our attack finds a preimage of the 33-step OFF(Original FeedForward1) variants of ARIRANG, and a preimage of the 31-step MFF(Middle FeedForward1) variants of ARIRANG. Its time complexity is about $2^{241}$ for ARIRANG-256 and $2^{481}$ for ARIRANG-512, respectively.

Design of Cryptographic Hardware Architecture for Mobile Computing

  • Kim, Moo-Seop;Kim, Young-Sae;Cho, Hyun-Sook
    • Journal of Information Processing Systems
    • /
    • v.5 no.4
    • /
    • pp.187-196
    • /
    • 2009
  • This paper presents compact cryptographic hardware architecture suitable for the Mobile Trusted Module (MTM) that requires low-area and low-power characteristics. The built-in cryptographic engine in the MTM is one of the most important circuit blocks and contributes to the performance of the whole platform because it is used as the key primitive supporting digital signature, platform integrity and command authentication. Unlike personal computers, mobile platforms have very stringent limitations with respect to available power, physical circuit area, and cost. Therefore special architecture and design methods for a compact cryptographic hardware module are required. The proposed cryptographic hardware has a chip area of 38K gates for RSA and 12.4K gates for unified SHA-1 and SHA-256 respectively on a 0.25um CMOS process. The current consumption of the proposed cryptographic hardware consumes at most 3.96mA for RSA and 2.16mA for SHA computations under the 25MHz.

Microstructure and wear performance of WC-6.5%Co cladding layer by electric resistance welding (저항 클래딩법에 의해 형성된 내마모성 WC-6.5Co 클래딩층의 미크로조직 및 내마모성능)

  • Lee, Jin-U;Bae, Myeong-Il;Kim, Sang-Jin;Lee, Yeong-Ho
    • Proceedings of the KWS Conference
    • /
    • 2006.10a
    • /
    • pp.120-122
    • /
    • 2006
  • This study deals with characterizations of microstructure and wear performance of a cladding layer, product on 1.9 mm-thick mild steel plate by the electric resistance welding, of composite metal powder of Coarse WC-6.5%Co and high carbon alloy(SHA). The cladding layer was examined and tested fur microstructural features, chemical composition, hardness, wear performance and wear mechanism. The cladding layer have two different matrix were observed by an optical microscope and EPMA. The one was the coarse WC-6.5Co structure. The other was the melted SHA with surrounding the WC-6.5Co structure. The hardness of WC-6.5Co was 1210HV. The hardness of SHA was 640HV. In comparison by wear rate, the cladding layer showed the remarkable wear performance that was 15 times of SM490 and about 62% of D2.

  • PDF

Characterization of Microstructure of WC-6.5%Co Cladding Layer by Electric Resistance Welding (저항클래딩법을 응용하여 형성된 내마모성 WC-6.5Co 클래딩층의 미크로조직 특성)

  • Lee, Jin-Woo;Ko, Jun-Bin;Lee, Young-Ho
    • Journal of Welding and Joining
    • /
    • v.25 no.3
    • /
    • pp.72-77
    • /
    • 2007
  • This study deals with characterizations of microstructure and wear performance of a cladding layer, product on 1.9 mm-thick mild steel plate by the electric resistance welding, of composite metal powder of Coarse WC-6.5%Co and high carbon alloy (SHA). The cladding layer was examined and tested for microstructural features, chemical composition, hardness, and bondability. The cladding layer have two different matrix were observed by an optical microscope and EPMA. The one was the coarse WC-6.5Co structure. The other was the melted SHA with surrounding the WC-6.5Co structure. The hardness of WC-6.5Co was 1210HV. The hardness of SHA was 640HV.

양자 컴퓨터를 통한 대칭키 AES 및 해시 함수 SHA-2/3 해킹 동향

  • Kyungbae Jang;Yujin Oh;Hwa-Jeong Seo
    • Review of KIISC
    • /
    • v.34 no.2
    • /
    • pp.49-55
    • /
    • 2024
  • 고전 컴퓨터에서 풀기 어려운 난제를 효율적으로 모델링하고 해결할 수 있는 양자 컴퓨터는 현재암호들을 위협하고 있다. 특히, 공개키 암호에 해당하는 RSA와 Elliptic Curve Cryptography (ECC)는 Shor의 양자 알고리즘에 의해 해당 암호들의 안전성이 기반이 되는 난제들을 다항 시간 내에 해결하여 새로운 양자 내성 암호가 필요한 상황이다. 이에 NIST는 양자내성암호 표준화 공모전을 주최함으로써 현재까지 표준화 작업을 이어나가고 있다. 대칭키 암호의 경우, Grover의양자 검색 알고리즘에 의해 고전 컴퓨터상에서 보장하던 보안 강도가 제곱근으로 감소되게 된다. 기존, 신규 암호 알고리즘 모두 양자 컴퓨터상에서의 보안 강도를 평가해야 되는 상황이며, 이에 NIST는 양자 후 보안 강도 기준을 도입하였다. 양자 후 보안 강도는 레벨 1에서 5로 정의되며, 각 레벨에는 AES 및 SHA-2/3에 대한 양자 해킹 비용이 지정되어있다. 본 논문에서는 이러한 암호 학계 상황에 따라, 대칭키 AES 및 해시 함수 SHA-2/3에 대한 해킹, 특히 양자 회로 구현 동향에 대해 살펴보고자 한다.

Design and Implementation of the Security Components in Ultra-Lightweight Mobile Computing Environment (초경량 이동 컴퓨팅 환경에서의 보안 컴포넌트 설계 및 구현)

  • Park, Rae-Young;You, Yong-Duck;Lee, Young-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4C
    • /
    • pp.454-461
    • /
    • 2007
  • The next-generation computer is the ultra-lightweight mobile computer that communicates with peripheral handhold devices and provides dynamically the services appropriate to user. To provide the dynamic services on the ultra-lightweight mobile computer, security problem for user or computer system information should be solved and security mechanism is necessary for the ultra-lightweight mobile computing environment that has battery limit and low performance. In this paper, the security mechanism on the component based middleware for the ultra-lightweight mobile computer was implemented using RC-5 cipher algorithm and SHA-1 authentication algorithm. The security components are dynamically loaded and executed into the component based middleware on the ultra-lightweight mobile computer.