• Title/Summary/Keyword: Single Trace Analysis

Search Result 53, Processing Time 0.023 seconds

Walking load model for single footfall trace in three dimensions based on gait experiment

  • Peng, Yixin;Chen, Jun;Ding, Guo
    • Structural Engineering and Mechanics
    • /
    • v.54 no.5
    • /
    • pp.937-953
    • /
    • 2015
  • This paper investigates the load model for single footfall trace of human walking. A large amount of single person walking load tests were conducted using the three-dimensional gait analysis system. Based on the experimental data, Fourier series functions were adopted to model single footfall trace in three directions, i.e. along walking direction, direction perpendicular to the walking path and vertical direction. Function parameters such as trace duration time, number of Fourier series orders, dynamic load factors (DLFs) and phase angles were determined from the experimental records. Stochastic models were then suggested by treating walking rates, duration time and DLFs as independent random variables, whose probability density functions were obtained from experimental data. Simulation procedures using the stochastic models are presented with examples. The simulated single footfall traces are similar to the experimental records.

On methods for extending a single footfall trace into a continuous force curve for floor vibration serviceability analysis

  • Chen, Jun;Peng, Yixin;Ye, Ting
    • Structural Engineering and Mechanics
    • /
    • v.46 no.2
    • /
    • pp.179-196
    • /
    • 2013
  • An experimentally measured single footfall trace (SFT) from a walking subject needs to be extended into a continuous force curve, which can then be used as load for floor vibration serviceability assessment, or on which further analysis like discrete Fourier transform can be conducted. This paper investigates the accuracy, applicability and parametrical sensitivity of four extension methods, Methods I to IV, which extends the SFT into a continuous time history by the walking step rate, stride time, double support proportion and the double support time, respectively. Performance of the four methods was assessed by comparing their results with the experimentally obtained reference footfall traces in the time and frequency domain, and by comparing the vibrational response of a concrete slab subjected to the extended traces to that of reference traces. The effect of the extension parameter on each method was also explored through parametrical analysis. This study finds that, in general, Method I and II perform better than Method III and IV, and all of the four methods are sensitive to their extension parameter. When reliable information of walking rate or gait period is available in the test, Methods I or II is a better choice. Otherwise, Method III, with the suggested extension parameter of double support time proportion, is recommended.

Analysis and Countermeasure on RSA Algorithm Having High Attack Complexity in Collision-Based Power Analysis Attack (충돌 전력 분석 공격에 높은 공격 복잡도를 갖는 RSA 알고리즘에 대한 취약점 분석 및 대응기법)

  • Kim, Suhri;Kim, Taewon;Jo, Sungmin;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.335-344
    • /
    • 2016
  • It is known that power analysis is one of the most powerful attack in side channel analysis. Among power analysis single trace attack is widely studied recently since it uses one power consumption trace to recover secret key of public cryptosystem. Recently Sim et al. proposed new exponentiation algorithm for RSA cryptosystem with higher attack complexity to prevent single trace attack. In this paper we analyze the vulnerability of exponentiation algorithm described by Sim et al. Sim et al. applied message blinding and random exponentiation splitting method on $2^t-ary$ for higher attack complexity. However we can reveal private key using information exposed during pre-computation generation. Also we describe modified algorithm that provides higher attack complexity on collision attack. Proposed algorithm minimized the reuse of value that are used during exponentiation to provide security under single collision attack.

Single Trace Side Channel Analysis on NTRUEncrypt Implementation (NTRUEncrypt에 대한 단일 파형 기반 전력 분석)

  • An, Soojung;Kim, Suhri;Jin, Sunghyun;Kim, HanBit;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1089-1098
    • /
    • 2018
  • As the development of quantum computers becomes visible, the researches on post-quantum cryptography to alternate the present cryptography system have actively pursued. To substitute RSA and Elliptic Curve Cryptosystem, post-quantum cryptography must also consider side channel resistance in implementation. In this paper, we propose a side channel analysis on NTRU, based on the implementation made public in the NIST standardization. Unlike the previous analysis which exploits a thousands of traces, the proposed attack can recover the private key using a single power consumption trace. Our attack not only reduces the complexity of the attack but also gives more possibility to analyze a practical public key cryptosystem. Furthermore, we suggested the countermeasure against our attacks. Our countermeasure is much more efficient than existing implementation.

Generation of Simulation input Stream using Threshold Bootstrap (임계값 부트스트랩을 사용한 시뮬레이션 입력 시나리오의 생성)

  • Kim Yun Bae;Kim Jae Bum
    • Korean Management Science Review
    • /
    • v.22 no.1
    • /
    • pp.15-26
    • /
    • 2005
  • The bootstrap is a method of computational inference that simulates the creation of new data by resampling from a single data set. We propose a new job for the bootstrap: generating inputs from one historical trace using Threshold Bootstrap. In this regard, the most important quality of bootstrap samples is that they be functionally indistinguishable from independent samples of the same stochastic process. We describe a quantitative measure of difference between two time series, and demonstrate the sensitivity of this measure for discriminating between two data generating processes. Utilizing this distance measure for the task of generating inputs, we show a way of tuning the bootstrap using a single observed trace. This application of the threshold bootstrap will be a powerful tool for Monte Carlo simulation. Monte Carlo simulation analysis relies on built-in input generators. These generators make unrealistic assumptions about independence and marginal distributions. The alternative source of inputs, historical trace data, though realistic by definition, provides only a single input stream for simulation. One benefit of our method would be expanding the number of inputs achieving reality by driving system models with actual historical input series. Another benefit might be the automatic generation of lifelike scenarios for the field of finance.

Key Bit-dependent Attack on Side-Channel Analysis-Resistant Hardware Binary Scalar Multiplication Algorithm using a Single-Trace (부채널 분석에 안전한 하드웨어 이진 스칼라 곱셈 알고리즘에 대한 단일 파형 비밀 키 비트 종속 공격)

  • Sim, Bo-Yeon;Kang, Junki;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1079-1087
    • /
    • 2018
  • Binary scalar multiplication which is the main operation of elliptic curve cryptography is vulnerable to the side-channel analysis. Especially, it is vulnerable to the side-channel analysis which uses power consumption and electromagnetic emission patterns. Thus, various countermeasures have been studied. However, they have focused on eliminating patterns of data dependent branches, statistical characteristic according to intermediate values, or the interrelationships between data. No countermeasure have been taken into account for the secure design of the key bit check phase, although the secret scalar bits are directly loaded during that phase. Therefore, in this paper, we demonstrate that we can extract secret scalar bits with 100% success rate using a single power or a single electromagnetic trace by performing key bit-dependent attack on hardware implementation of binary scalar multiplication algorithm. Experiments are focused on the $Montgomery-L{\acute{o}}pez-Dahab$ ladder algorithm protected by scalar randomization. Our attack does not require sophisticated pre-processing and can defeat existing countermeasures using a single-trace. As a result, we propose a countermeasure and suggest that it should be applied.

A comparative study of ultra-trace-level uranium by thermal ionization mass spectrometry with continuous heating: Static and peak-jumping modes

  • Lee, Chi-Gyu;Park, Ranhee;Park, Jinkyu;Lim, Sang Ho
    • Nuclear Engineering and Technology
    • /
    • v.52 no.7
    • /
    • pp.1532-1536
    • /
    • 2020
  • For ensuring nuclear safeguards, we report the analytical signal-detection performance of thermal ionization mass spectrometry (TIMS) with continuous heating for the measurement of isotopic ratios in samples containing ultra-trace amounts of uranium. As methods for detecting uranium signals, peak-jumping mode using a single detector and static mode using multiple detectors were examined with U100 (10% 235U-enriched) uranium standard samples in the femtogram-to-picogram range. Uranium isotope ratios, n(235U)/n(238U), were measured down to levels of 1 fg and 3 fg in static and peak-jumping modes, respectively, while n(234U)/n(238U) and n(236U)/n(238U) values were measured down to levels of 100 fg in both modes. In addition, the dependency of the 238U signal intensity on sample quantity exhibited similar tendencies in both modes. The precisions of the isotope ratios obtained in the static mode over all sample ranges used in this study were overall slightly higher than those obtained in peak-jumping mode. These results indicate that isotope ratio measurements by TIMS with continuous heating are almost independent of the detection method, i.e., peak-jumping mode or static mode, which is characteristic of isotope-ratio measurements using the TIMS method with continuous heating. TIMS with continuous heating is advantageous as it exhibits the properties of multiple detectors within a single detector, and is expected to be used in various fields in addition to ensuring nuclear safeguards.

Determination of trace elements in food reference materials by instrumental neutron activation analysis

  • Cho, K.H.;Zeisler, R.;Park, K.W.
    • Analytical Science and Technology
    • /
    • v.18 no.6
    • /
    • pp.520-528
    • /
    • 2005
  • Two biological Certified Reference Materials (CRMs), KRISS 108-04-001 (oyster tissue) and 108-05-001 (water dropwort stem), were prepared by Korea Research Institute of Standards and Science (KRISS)during FY '01. The certified values of these materials had been determined by Isotope Dilution Mass Spectrometry (IDMS) for six elements (Cd, Cr, Cu, Fe, Pb and Zn). Additional analytical works are now progressing to certify the concentrations of a number of the environmental and nutrimental elements in these CRMs. The certified values in a CRM are usually determined by using a single primary method with confirmation by other method(s) or using two independent critically-evaluated methods. Instrumental Neutron Activation Analysis (INAA) plays an important role in the determination of certified values as it can eliminate the possibility of common error sources resulting from sample dissolution. In this study INAA procedure was used in determination of 23 elements in these two biological CRMs to acquire the concentration information and the results were compared with KRISS certified values.

Mineralogical Analysis and Mechano-Chemical Purification of Natural Silica Ore for High Purity Silica Powder

  • Park, Jesik;Lee, Churl Kyoung;Lee, Hyun-Kwon
    • Korean Journal of Materials Research
    • /
    • v.26 no.6
    • /
    • pp.306-310
    • /
    • 2016
  • To produce 4N grade high-purity silica powder from natural ore, the mineralogical characteristics of natural silica ore were investigated and their effects on the purification process were revealed. The Chinese silica mineral ore used was composed of iron and aluminum as main impurities and calcium, magnesium, potassium, sodium, and titanium as trace impurities; these trace impurities generally exist as either single oxides or complex oxides. It was confirmed that liberation and acidic washing of the impurities were highly dependent on the particle size of the ground silica ore and on its mineralogical characteristics such as the distribution and phases of existing impurities. It is suggested that appropriate size reduction of silica ore should be realized for optimized purification according to the origin of the natural silica ore. A single step purification process, the mechano-chemical washing (MCW) process, was proposed and verified in comparison with the conventional multi step washing process.