• Title/Summary/Keyword: entropy generation

Search Result 80, Processing Time 0.023 seconds

Implementation and characterization of flash-based hardware security primitives for cryptographic key generation

  • Mi-Kyung Oh;Sangjae Lee;Yousung Kang;Dooho Choi
    • ETRI Journal
    • /
    • v.45 no.2
    • /
    • pp.346-357
    • /
    • 2023
  • Hardware security primitives, also known as physical unclonable functions (PUFs), perform innovative roles to extract the randomness unique to specific hardware. This paper proposes a novel hardware security primitive using a commercial off-the-shelf flash memory chip that is an intrinsic part of most commercial Internet of Things (IoT) devices. First, we define a hardware security source model to describe a hardware-based fixed random bit generator for use in security applications, such as cryptographic key generation. Then, we propose a hardware security primitive with flash memory by exploiting the variability of tunneling electrons in the floating gate. In accordance with the requirements for robustness against the environment, timing variations, and random errors, we developed an adaptive extraction algorithm for the flash PUF. Experimental results show that the proposed flash PUF successfully generates a fixed random response, where the uniqueness is 49.1%, steadiness is 3.8%, uniformity is 50.2%, and min-entropy per bit is 0.87. Thus, our approach can be applied to security applications with reliability and satisfy high-entropy requirements, such as cryptographic key generation for IoT devices.

Chinese Prosody Generation Based on C-ToBI Representation for Text-to-Speech (음성합성을 위한 C-ToBI기반의 중국어 운율 경계와 F0 contour 생성)

  • Kim, Seung-Won;Zheng, Yu;Lee, Gary-Geunbae;Kim, Byeong-Chang
    • MALSORI
    • /
    • no.53
    • /
    • pp.75-92
    • /
    • 2005
  • Prosody Generation Based on C-ToBI Representation for Text-to-SpeechSeungwon Kim, Yu Zheng, Gary Geunbae Lee, Byeongchang KimProsody modeling is critical in developing text-to-speech (TTS) systems where speech synthesis is used to automatically generate natural speech. In this paper, we present a prosody generation architecture based on Chinese Tone and Break Index (C-ToBI) representation. ToBI is a multi-tier representation system based on linguistic knowledge to transcribe events in an utterance. The TTS system which adopts ToBI as an intermediate representation is known to exhibit higher flexibility, modularity and domain/task portability compared with the direct prosody generation TTS systems. However, the cost of corpus preparation is very expensive for practical-level performance because the ToBI labeled corpus has been manually constructed by many prosody experts and normally requires a large amount of data for accurate statistical prosody modeling. This paper proposes a new method which transcribes the C-ToBI labels automatically in Chinese speech. We model Chinese prosody generation as a classification problem and apply conditional Maximum Entropy (ME) classification to this problem. We empirically verify the usefulness of various natural language and phonology features to make well-integrated features for ME framework.

  • PDF

The Slip-Wall Boundary Conditions Effects and the Entropy Characteristics of the Multi-Species GH Solver (다화학종 GH 방정식의 정확성 향상을 위한 벽면 경계조건 연구 및 GH 방정식의 엔트로피 특성 고찰)

  • Ahn, Jae-Wan;Kim, Chong-Am
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.37 no.10
    • /
    • pp.947-954
    • /
    • 2009
  • Starting from the Eu's GH(Generalized Hydrodynamic) theory, the multi-species GH numerical solver is developed in this research and its computatyional behaviors are examined for the hypersonic rarefied flow over an axisymmetric body. To improve the accuracy of the developed multi-species GH solver, various slip-wall boundary conditions are tested and the computed results are compared. Additionally, in order to validate the entropy characteristics of the GH equation, the entropy production and entropy generation rates of the GH equation are investigated in the 1-dimensional normal shock structure test at a high Knudsen number.

Chaotic Time Series Prediction using Extended Fuzzy Entropy Clustering (확장된 퍼지엔트로피 클러스터링을 이용한 카오스 시계열 데이터 예측)

  • 박인규
    • Proceedings of the IEEK Conference
    • /
    • 2000.06c
    • /
    • pp.5-8
    • /
    • 2000
  • In this paper, we propose new algorithms for the partition of input space and the generation of fuzzy control rules. The one consists of Shannon and extended fuzzy entropy function, the other consists of adaptive fuzzy neural system with back propagation teaming rule. The focus of this scheme is to realize the optimal fuzzy rule base with the minimal number of the parameters of the rules, reducing the complexity of the system. The proposed algorithm is tested with the time series prediction problem using Mackey-Glass chaotic time series.

  • PDF

Thermodynamics of a composite system composed of two simple thermal systems (두 열적 단순계로 구성된 복합계의 열역학)

  • Jeong, Pyeong-Seok;Kim, Su-Yeon
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.21 no.2
    • /
    • pp.275-284
    • /
    • 1997
  • Thermodynamic behavior of a composite system which is composed of two simple thermal subsystems with constant heat capacities is analyzed, and several thermodynamic phenomena are investigated. The changes of the states and the potential work of the composite system are shown as the interaction between the subsystems in the composite system. The potential work is defined as the possible maximum available work from the composite system, and it is a thermodynamic property of the composite system. The decrease of the potential work is the same as the available work output from the composite system in reversible processes. The dissipation of available work is directly connected to the generation of entropy. The concepts of exergy and internal energy can be explained as a special case of the potential work.

Basic Study on the Definition of the Second Law Efficiencies of Thermodynamic Cycles (열역학적 사이클의 제2법칙 효율의 정의에 대한 기본 연구)

  • Park, Kyoung Kuhn
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.24 no.11
    • /
    • pp.792-798
    • /
    • 2012
  • A general concept on the definition of the second law efficiencies of thermodynamic cycles is introduced. The efficiency is defined to be proportional to the entropy generation divided by the maximum possible entropy generation. This way of definition of the cycle efficiency is clear and concise and, moreover, follows faithfully the concept of the second law of thermodynamics. This definition is applied to heat engine, refrigerator and heat pump. The second law efficiencies of heat engine and refrigeration cycles are derived, which are the same as the existing ones, respectively. The second law efficiency of heat pump, however, finds to be different from the existing one. Discussion is given about the difference and its cause.

Analysis of the Irreversibilities of a Vapor Compression Type Refrigerator (증기 압축식 냉동기의 비가역성 분석)

  • Shin, K.Y.;Jung, P.S.;Kim, S.Y.;Lee, S.C.
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.7 no.1
    • /
    • pp.30-41
    • /
    • 1995
  • The present paper investigated irreversibilities and energy flow of a vapor compression refrigerator. The entropy generation and the available energy dissipation in components of the system were analyzed by using experimental data. It was shown that the dissipated available energy in the compressor including electric motor was much more than those in other components. The effects of the pressure drop and heat loss on irreversibilities in the condenser and the evaporator were small in comparison with heat transfer.

  • PDF

Utilisation of IoT Systems as Entropy Source for Random Number Generation

  • Oguzhan ARSLAN;Ismail KIRBAS
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.77-86
    • /
    • 2024
  • Using random numbers to represent uncertainty and unpredictability is essential in many industries. This is crucial in disciplines like computer science, cryptography, and statistics where the use of randomness helps to guarantee the security and dependability of systems and procedures. In computer science, random number generation is used to generate passwords, keys, and other security tokens as well as to add randomness to algorithms and simulations. According to recent research, the hardware random number generators used in billions of Internet of Things devices do not produce enough entropy. This article describes how raw data gathered by IoT system sensors can be used to generate random numbers for cryptography systems and also examines the results of these random numbers. The results obtained have been validated by successfully passing the FIPS 140-1 and NIST 800-22 test suites.

An Effective Feature Generation Method for Distributed Denial of Service Attack Detection using Entropy (엔트로피를 이용한 분산 서비스 거부 공격 탐지에 효과적인 특징 생성 방법 연구)

  • Kim, Tae-Hun;Seo, Ki-Taek;Lee, Young-Hoon;Lim, Jong-In;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.63-73
    • /
    • 2010
  • Malicious bot programs, the source of distributed denial of service attack, are widespread and the number of PCs which were infected by malicious bot program are increasing geometrically thesedays. The continuous distributed denial of service attacks are happened constantly through these bot PCs and some financial incident cases have found lately. Therefore researches to response distributed denial of service attack are necessary so we propose an effective feature generation method for distributed denial of service attack detection using entropy. In this paper, we apply our method to both the DARPA 2000 datasets and also the distributed denial of service attack datasets that we composed and generated ourself in general university. And then we evaluate how the proposed method is useful through classification using bayesian network classifier.

Efficient and Secure Sound-Based Hybrid Authentication Factor with High Usability

  • Mohinder Singh B;Jaisankar N.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2844-2861
    • /
    • 2023
  • Internet is the most prevailing word being used nowadays. Over the years, people are becoming more dependent on the internet as it makes their job easier. This became a part of everyone's life as a means of communication in almost every area like financial transactions, education, and personal-health operations. A lot of data is being converted to digital and made online. Many researchers have proposed different authentication factors - biometric and/or non-biometric authentication factors - as the first line of defense to secure online data. Among all those factors, passwords and passphrases are being used by many users around the world. However, the usability of these factors is low. Also, the passwords are easily susceptible to brute force and dictionary attacks. This paper proposes the generation of a novel passcode from the hybrid authentication factor - sound. The proposed passcode is evaluated for its strength to resist brute-force and dictionary attacks using the Shannon entropy and Passcode (or password) entropy formulae. Also, the passcode is evaluated for its usability. The entropy value of the proposed is 658.2. This is higher than that of other authentication factors. Like, for a 6-digit pin - the entropy value was 13.2, 101.4 for Password with Passphrase combined with Keystroke dynamics and 193 for fingerprint, and 30 for voice biometrics. The proposed novel passcode is far much better than other authentication factors when compared with their corresponding strength and usability values.