• Title/Summary/Keyword: SHA3

Search Result 150, Processing Time 0.026 seconds

Parallel Implementation of LSH Using SSE and AVX (SSE와 AVX를 활용한 LSH의 병렬 최적 구현)

  • Pack, Cheolhee;Kim, Hyun-il;Hong, Dowon;Seo, Changho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.31-39
    • /
    • 2016
  • Hash function is a cryptographic primitive which conduct authentication, signature and data integrity. Recently, Wang et al. found collision of standard hash function such as MD5, SHA-1. For that reason, National Security Research Institute in Korea suggests a secure structure and efficient hash function, LSH. LSH consists of three steps, initialization, compression, finalization and computes hash value using addition in modulo $2^W$, bit-wise substitution, word-wise substitution and bit-wise XOR. These operation is parallelizable because each step is independently conducted at the same time. In this paper, we analyse LSH structure and implement it over SIMD-SSE, AVX and demonstrate the superiority of LSH.

Korean Pharmaceutical Expenditure according to OECD's System of Health Accounts (OECD의 개념에 따른 우리나라 약제비의 국제 비교)

  • 정형선
    • Health Policy and Management
    • /
    • v.13 no.4
    • /
    • pp.48-65
    • /
    • 2003
  • Detailed analyses of total health expenditure and its sub­categories are essential for the evidence­based health policy(EBHP). These analyses, again, should be based on timely and reliable data that are comparable across countries. The System of Health Accounts (SHA), published by the OECD in 2000, provides an integrated system of comprehensive and internationally comparable accounts. The author has implemented the SHA manual into Korean situation, and examined overall expenditure estimate and its basic functional breakdown following the manual. This study explains how pharmaceutical expenditure is estimated. The results are, then, analyzed particularly from the international perspective. Both administrative data in Statistical Yearbooks (National Health Insurance, Medical Aid, Industrial Accident Compensation Insurance) and survey data on Health and Nutrition are used for the estimation. Per capita pharmaceutical expenditure in Korea (183 US$ PPPs) was far less than the OECD average (308 US$ PPPs) in 2001, but pharmaceutical expenditure share in total health expenditure (20.3%) was higher than the average (16.7%). This can be explained by the fact that there is a statistically significant correlation between pharmaceutical expenditure share and per capita GDP of each country. Korean people follow the tendency of relatively low­income countries to spend less than OECD average for health care, but follow again their tendency to spend more on drugs than on other health care services. In consideration of results and analysis as above, per capita pharmaceutical expenditure in Korea is expected to grow in the future, but the growth rate of the pharmaceutical expenditure is expected to be less than that of overall health expenditure.

The cryptographic module design requirements of Flight Termination System for secure cryptogram delivery (안전한 보안명령 전달을 위한 비행종단시스템용 암호화 장치 설계 요구사항)

  • Hwang, Soosul;Kim, Myunghwan;Jung, Haeseung;Oh, Changyul;Ma, Keunsu
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.3
    • /
    • pp.114-120
    • /
    • 2015
  • In this paper, we show the design requirements of the cryptographic module and its security algorithm designed to prevent the exposure of the command signal applied to Flight Termination System. The cryptographic module consists of two separate devices that are Command Insertion Device and Command Generation Device. The cryptographic module designed to meet the 3 principles(Confidentiality, Integrity and Availability) for the information security. AES-256 block encryption algorithm and SHA-256 Hash function were applied to the encrypted symmetric key encryption method. The proposed cryptographic module is expected to contribute to the security and reliability of the Flight Termination System for Space Launch Vehicle.

Optimized Security Algorithm for IEC 61850 based Power Utility System

  • Yang, Hyo-Sik;Kim, Sang-Sig;Jang, Hyuk-Soo
    • Journal of Electrical Engineering and Technology
    • /
    • v.7 no.3
    • /
    • pp.443-450
    • /
    • 2012
  • As power grids are integrated into one big umbrella (i.e., Smart Grid), communication network plays a key role in reliable and stable operation of power grids. For successful operation of smart grid, interoperability and security issues must be resolved. Security means providing network system integrity, authentication, and confidentiality service. For a cyber-attack to a power grid system, which may jeopardize the national security, vulnerability of communication infrastructure has a serious impact on the power grid network. While security aspects of power grid network have been studied much, security mechanisms are rarely adopted in power gird communication network. For security issues, strict timing requirements are defined in IEC 61850 for mission critical messages (i.e., GOOSE). In this paper, we apply security algorithms (i.e., MD-5, SHA-1, and RSA) and measure their processing time and transmission delay of secured mission critical messages. The results show the algorithms satisfying the timing requirements defined in IEC 61850 and we observer the algorithm that is optimal for secure communication of mission critical messages. Numerical analysis shows that SHA-1 is preferable for secure GOOSE message sending.

The Design of 10-bit 200MS/s CMOS Parallel Pipeline A/D Converter (10-비트 200MS/s CMOS 병렬 파이프라인 아날로그/디지털 변환기의 설계)

  • Chung, Kang-Min
    • The KIPS Transactions:PartA
    • /
    • v.11A no.2
    • /
    • pp.195-202
    • /
    • 2004
  • This paper introduces the design or parallel Pipeline high-speed analog-to-digital converter(ADC) for the high-resolution video applications which require very precise sampling. The overall architecture of the ADC consists of 4-channel parallel time-interleaved 10-bit pipeline ADC structure a]lowing 200MSample/s sampling speed which corresponds to 4-times improvement in sampling speed per channel. Key building blocks are composed of the front-end sample-and-hold amplifier(SHA), the dynamic comparator and the 2-stage full differential operational amplifier. The 1-bit DAC, comparator and gain-2 amplifier are used internally in each stage and they were integrated into single switched capacitor architecture allowing high speed operation as well as low power consumption. In this work, the gain of operational amplifier was enhanced significantly using negative resistance element. In the ADC, a delay line Is designed for each stage using D-flip flops to align the bit signals and minimize the timing error in the conversion. The converter has the power dissipation of 280㎽ at 3.3V power supply. Measured performance includes DNL and INL of +0.7/-0.6LSB, +0.9/-0.3LSB.

Complexation of Cadmium(Ⅱ) with Humic Acids: Effects of pH and Humic Acid Origin

  • Lee, Mee-Hae;Choi, Se-Young;Chung, Kun-Ho;Moon, Hi-Chung
    • Bulletin of the Korean Chemical Society
    • /
    • v.14 no.6
    • /
    • pp.726-732
    • /
    • 1993
  • A comparative study on cadmium(II) complexation with three well characterized humic acids (SHA: soil humic acid from the Okchun Metamorphic Belt; AqHA: aquatic humic acid from Gorleben underground aquifer, Germany; CoHA: commercially available humic acid from the Aldrich Co.) was carried out in 0.1 M $NaClO_4$ at different solution pH(5.0, 5.5, and 6.0) using the ultrafiltration technique. The maximum binding ability (MBA) of the humic acids for cadmium(II) was observed to vary with their origins and solution pH. The results suggest that 1 : 1 complex predominates within the experimental range, and the conditional stability constants were calculated based on the assumption of cooperative binding, yielding log K values that were quite similar (CoHA: 4.17${\pm}$0.08; AqHA: 4.14${\pm}$0.07; SHA: $4.06{\pm} 0.12\;l\;mol^{-1}$ at pH 6.0) irrespective of humic acid origins or pH. By contrast a nonlinear Schatchard plot was obtained, using the cadmium(II) ion selective electrode speciation analysis method, which indicated that humic acid may have two or more classes of binding sites, with $log\;K_1\;and\;log\;K_2$ of 4.73${\pm}$ 0.08 and $3.31{\pm}0.14\;l\;mol^{-1}$ respectively.

Security Enhancing of Authentication Protocol for Hash Based RFID Tag (해쉬 기반 RFID 태그를 위한 인증 프로토콜의 보안성 향상)

  • Jeon, Jin-Oh;Kang, Min-Sup
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.23-32
    • /
    • 2010
  • In this paper, we first propose the security enhancing of authentication protocol for Hash based RFID tag, and then a digital Codec for RFID tag is designed based on the proposed authentication protocol. The protocol is based on a three-way challenge response authentication protocol between the tags and a back-end server. In order to realize a secure cryptographic authentication mechanism, we modify three types of the protocol packets which defined in the ISO/IEC 18000-3 standard. Thus active attacks such as the Man-in-the-middle and Replay attacks can be easily protected. In order to verify effectiveness of the proposed protocol, a digital Codec for RFID tag is designed using Verilog HDL, and also synthesized using Synopsys Design Compiler with Hynix $0.25\;{\mu}m$ standard-cell library. Through security analysis and comparison result, we will show that the proposed scheme has better performance in user data confidentiality, tag anonymity, Man-in-the-middle attack prevention, replay attack, forgery resistance and location tracking.

Six new dammarane-type triterpene saponins from Panax ginseng flower buds and their cytotoxicity

  • Li, Ke-Ke;Li, Sha-Sha;Xu, Fei;Gong, Xiao-Jie
    • Journal of Ginseng Research
    • /
    • v.44 no.2
    • /
    • pp.215-221
    • /
    • 2020
  • Background: Panax ginseng has been used for a variety of medical purposes in eastern countries for more than two thousand years. From the extensive experiences accumulated in its long medication use history and the substantial strong evidence in modern research studies, we know that ginseng has various pharmacological activities, such as antitumor, antidiabetic, antioxidant, and cardiovascular system-protective effects. The active chemical constituents of ginseng, ginsenosides, are rich in structural diversity and exhibit a wide range of biological activities. Methods: Ginsenoside constituents from P. ginseng flower buds were isolated and purified by various chromatographic methods, and their structures were identified by spectroscopic analysis and comparison with the reported data. The 3-(4,5-dimethyl-2-thiazolyl)-2,5-diphenyl-2H- tetrazolium bromide method was used to test their cytotoxic effects on three human cancer cell lines. Results: Six ginsenosides, namely 6'-malonyl formyl ginsenoside F1 (1), 3β-acetoxyl ginsenoside F1 (2), ginsenoside Rh24 (6), ginsenoside Rh25 (7), 7β-hydroxyl ginsenoside Rd (8) and ginsenoside Rh26 (10) were isolated and elucidated as new compounds, together with four known compounds (3-5 and 9). In addition, the cytotoxicity of these isolated compounds was shown as half inhibitory concentration values, a tentative structure-activity relationship was also discussed based on the results of our bioassay. Conclusion: The study of chemical constituents was useful for the quality control of P. ginseng flower buds. The study on antitumor activities showed that new Compound 1 exhibited moderate cytotoxic activities against HL-60, MGC80-3 and Hep-G2 with half inhibitory concentration values of 16.74, 29.51 and 20.48 μM, respectively.