• Title/Summary/Keyword: five security key

Search Result 46, Processing Time 0.031 seconds

A Lightweight Hardware Accelerator for Public-Key Cryptography (공개키 암호 구현을 위한 경량 하드웨어 가속기)

  • Sung, Byung-Yoon;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1609-1617
    • /
    • 2019
  • Described in this paper is a design of hardware accelerator for implementing public-key cryptographic protocols (PKCPs) based on Elliptic Curve Cryptography (ECC) and RSA. It supports five elliptic curves (ECs) over GF(p) and three key lengths of RSA that are defined by NIST standard. It was designed to support four point operations over ECs and six modular arithmetic operations, making it suitable for hardware implementation of ECC- and RSA-based PKCPs. In order to achieve small-area implementation, a finite field arithmetic circuit was designed with 32-bit data-path, and it adopted word-based Montgomery multiplication algorithm, the Jacobian coordinate system for EC point operations, and the Fermat's little theorem for modular multiplicative inverse. The hardware operation was verified with FPGA device by implementing EC-DH key exchange protocol and RSA operations. It occupied 20,800 gate equivalents and 28 kbits of RAM at 50 MHz clock frequency with 180-nm CMOS cell library, and 1,503 slices and 2 BRAMs in Virtex-5 FPGA device.

A Empirical Study on the Obstacles to the Adoption of Electronic Bill of Lading - Focusing on the Bolero Bill of Lading - (전자선화증권 도입의 장애요인에 관한 실증적 연구 - 볼레로 전자선화증권을 중심으로 -)

  • Choi, Seok-Beom;Kim, Tae-Hwan;Choi, Gwang-Don
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.30
    • /
    • pp.27-58
    • /
    • 2006
  • The purpose of this study is to identify key obstacles to the adoption of electronic bill of lading and to suggest an effective way to promote the utilization of electronic bill of lading in international trade field. This study finds that all the respondants have not used 'true' electronic bill of lading that is issued and distributed electronically, and most of them agreed the needs of e-B/L adoption, but their intentions to adopt e-B/L remain very low in the present situation. Five obstacles to the adoption of e-B/L were derived from an explanatory factor analysis: 'integration' factor, 'law institution' factor, 'usability' factor, 'economic efficiency' factor, and 'security' factor. Solutions to promote the utilization of e-B/L in international trade field are as follows; Firstly, to endow e-B/L with the legal force through amending relevant laws including the commercial law. Secondly, to conclude the relevant international agreement, and to carry out joint projects between nations are needed. Thirdly, to conduct publicity campaigns is required to increase the understanding of the concepts and benefits of e-B/L to all concerned parties. Fourthly, stable and reliable system must be constructed with high level security. Fifthly, to readjust the service fee of e-B/L system to a realistic level is to be needed in order for user companies to use e-B/L service.

  • PDF

Examining Customers' Continuance Intentions towards E-wallet Usage: The Emergence of Mobile Payment Acceptance in Vietnam

  • PHUONG, Nguyen Ngoc Duy;LUAN, Ly Thien;DONG, Vu Van;KHANH, Nguyen Le Nhat
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.9
    • /
    • pp.505-516
    • /
    • 2020
  • The purpose of the research is to identify antecedents of mobile wallet continuance intention in Vietnam. A self-administered questionnaire was distributed to collect data from a total of 276 respondents. Partial least squares structural equation modeling was employed for analyzing the data. Five mobile wallet features - mobile application quality, mobile wallet familiarity, situational normality, payment security, and feedback mechanism - are introduced as fundamental elements, which influence customer' continuance intention to use mobile wallet in Vietnam. The results indicate that mobile quality application and familiarity can significantly influence perceived ease-of-use (PEOU) and perceived usefulness (PU), but situational normality has an impact only on PEOU. PEOU and PU are positively related to satisfaction. On the other hand, payment security and feedback mechanism affect positively customer' trust. As a result, the positive effects that satisfaction and trust have on electronic wallet continuance intention are confirmed. The findings can be used to advise mobile wallet providers to improve their platform design and services to retain users. As a theoretical contribution, this study combines the Technology Acceptance Model, Unified Theory of Acceptance and Use of Technology to investigate the key determinants on continuance intention in the context of electronic wallet in Vietnam.

Emerging Trends in Cloud-Based E-Learning: A Systematic Review of Predictors, Security and Themes

  • Noorah Abdullah Al manyi;Ahmad Fadhil Yusof;Ali Safaa Sadiq
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.89-104
    • /
    • 2024
  • Cloud-based e-learning (CBEL) represents a promising technological frontier. Existing literature has presented a diverse array of findings regarding the determinants that influence the adoption of CBEL. The primary objective of this study is to conduct an exhaustive examination of the available literature, aiming to determine the key predictors of CBEL utilization by employing the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology. A comprehensive review of 35 articles was undertaken, shedding light on the status of CBEL as an evolving field. Notably, there has been a discernible downturn in related research output during the COVID-19 pandemic, underscoring the temporal dynamics of this subject. It is noteworthy that a significant portion of this research has emanated from the Asian continent. Furthermore, the dominance of the technology acceptance model (TAM) in research frameworks is affirmed by our findings. Through a rigorous thematic analysis, our study identified five overarching themes, each encompassing a diverse range of sub-themes. These themes encompass 1) technological factors, 2) individual factors, 3) organizational factors, 4) environmental factors, and 5) security factors. This categorization provides a structured framework for understanding the multifaceted nature of CBEL adoption determinants. Our study serves as a compass, guiding future research endeavours in this domain. It underscores the imperative for further investigations utilizing diverse theoretical frameworks, contextual settings, research methodologies, and variables. This call for diversity and expansion in research efforts reflects the dynamic nature of CBEL and the evolving landscape of e-learning technologies.

Difficulties in ERP integration in Umm Al Qura University: A Case Study

  • Abdullah A H Alzahrani
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.35-43
    • /
    • 2024
  • The development and integration of Enterprise Resource Planning (ERP) systems have consistently attracted attention from software engineering researchers. Many studies have examined the factors that influence successful ERP integration, while others have focused on introducing integration models that address issues and challenges that affect the successful integration of ERP. However, it is crucial to recognize that the key player in successful integration is the individual involved. This paper aims to investigate how individuals based on departmental attachments and experiences have viewed the factors that affected the success of ERP integration. A case study was conducted at one large organization namely Umm Al Qura University, Saudi Arabia. Five departments were involved namely: Financial management, purchasing management, warehouse management, human resources management, and the Deanship of Information Technology. The results of 78 participants were collected and analyzed. Furthermore, it was different how individuals from different departments involved in the ERP integration viewed the factors that affected the success of integration. In addition, it was noticed that individuals with different experiences have various views on the factors. Moreover, it was evident that departmental attachments and individual experience might play a role in the successful integration of ERP.

A Design of Security SoC Prototype Based on Cortex-M0 (Cortex-M0 기반의 보안 SoC 프로토타입 설계)

  • Choi, Jun-baek;Choe, Jun-yeong;Shin, Kyung-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.251-253
    • /
    • 2019
  • This paper describes an implementation of a security SoC (System-on-Chip) prototype that interfaces a microprocessor with a block cipher crypto-core. The Cortex-M0 was used as a microprocessor, and a crypto-core implemented by integrating ARIA and AES into a single hardware was used as an intellectual property (IP). The integrated ARIA-AES crypto-core supports five modes of operation including ECB, CBC, CFB, CTR and OFB, and two master key sizes of 128-bit and 256-bit. The integrated ARIA-AES crypto-core was interfaced to work with the AHB-light bus protocol of Cortex-M0, and the crypto-core IP was expected to operate at clock frequencies up to 50 MHz. The security SoC prototype was verified by BFM simulation, and then hardware-software co-verification was carried out with FPGA implementation.

  • PDF

Recognizing F5-like stego images from multi-class JPEG stego images

  • Lu, Jicang;Liu, Fenlin;Luo, Xiangyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.4153-4169
    • /
    • 2014
  • To recognize F5-like (such as F5 and nsF5) steganographic algorithm from multi-class stego images, a recognition algorithm based on the identifiable statistical feature (IDSF) of F5-like steganography is proposed in this paper. First, this paper analyzes the special modification ways of F5-like steganography to image data, as well as the special changes of statistical properties of image data caused by the modifications. And then, by constructing appropriate feature extraction sources, the IDSF of F5-like steganography distinguished from others is extracted. Lastly, based on the extracted IDSFs and combined with the training of SVM (Support Vector Machine) classifier, a recognition algorithm is presented to recognize F5-like stego images from images set consisting of a large number of multi-class stego images. A series of experimental results based on the detection of five types of typical JPEG steganography (namely F5, nsF5, JSteg, Steghide and Outguess) indicate that, the proposed algorithm can distinguish F5-like stego images reliably from multi-class stego images generated by the steganography mentioned above. Furthermore, even if the types of some detected stego images are unknown, the proposed algorithm can still recognize F5-like stego images correctly with high accuracy.

Cervical Cancer Trends in Mexico: Incidence, Mortality and Research Output

  • Anaya-Ruiz, Maricruz;Vincent, Ana Karen;Perez-Santos, Martin
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.20
    • /
    • pp.8689-8692
    • /
    • 2014
  • Purpose: To evaluate the recent incidence and mortality of and scientific research trends in cervical cancer in Mexican females. Materials and Methods: Data between 2000 and 2010 from the Department of Epidemiology of the Ministry of Health, and International Agency for Research on Cancer (IARC) of World Health Organization were analyzed, and age-standardized rates (ASRs) were calculated. In addition, scientific research data were retrieved from the Web of Science database from 2003 to 2012, using different terms related to cervical cancer. Results: The incidence rate decreased during last five years, while mortality rates showed an annual decrease of 4.93%. A total of 780 articles were retrieved, and the institutions with the majority of publications were National Autonomous University of Mexico (34.87%), Social Security Mexican Institute (16.02%), and National Institute of Cancerology (15%). The main types of research were treatment, diagnosis, and prevention. Conclusions: The above results show that incidence of cervical cancer decreased over time in Mexico during last five years; similarly, the downturn observed in mortality mainly reflects improved survival as a result of earlier diagnosis and cancer treatment. Also, this article demonstrates the usefulness of bibliometrics to address key evaluation questions and to establish priorities, define future areas of research, and develop cervical cancer control strategies in Mexico.

High Performance Hardware Implementation of the 128-bit SEED Cryptography Algorithm (128비트 SEED 암호 알고리즘의 고속처리를 위한 하드웨어 구현)

  • 전신우;정용진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.1
    • /
    • pp.13-23
    • /
    • 2001
  • This paper implemented into hardware SEED which is the KOREA standard 128-bit block cipher. First, at the respect of hardware implementation, we compared and analyzed SEED with AES finalist algorithms - MARS, RC6, RIJNDAEL, SERPENT, TWOFISH, which are secret key block encryption algorithms. The encryption of SEED is faster than MARS, RC6, TWOFISH, but is as five times slow as RIJNDAEL which is the fastest. We propose a SEED hardware architecture which improves the encryption speed. We divided one round into three parts, J1 function block, J2 function block J3 function block including key mixing block, because SEED repeatedly executes the same operation 16 times, then we pipelined one round into three parts, J1 function block, J2 function block, J3 function block including key mixing block, because SEED repeatedly executes the same operation 16 times, then we pipelined it to make it more faster. G-function is implemented more easily by xoring four extended 4 byte SS-boxes. We tested it using ALTERA FPGA with Verilog HDL. If the design is synthesized with 0.5 um Samsung standard cell library, encryption of ECB and decryption of ECB, CBC, CFB, which can be pipelined would take 50 clock cycles to encrypt 384-bit plaintext, and hence we have 745.6 Mbps assuming 97.1 MHz clock frequency. Encryption of CBC, OFB, CFB and decryption of OFB, which cannot be pipelined have 258.9 Mbps under same condition.

Improving the Performance of Mutual Authentication and Session Key Agreement Protocols for Mobile Communication (이동 통신 환경에서의 상호인증 및 세션키 공유 프로토콜의 성능 향상)

  • Lee, Seung-Won;Hong, Seong-Min;Yun, Hyeon-Su;Jo, Yu
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.11
    • /
    • pp.1391-1400
    • /
    • 1999
  • 이동 통신은 대기를 전달매체로 하고 이동단말기를 사용하기 때문에 가로채기나 불법사용과 같은 공격에 취약하다. 이를 극복하기 위해, 이동 통신 환경에서 이동단말기와 기지국 사이에 안전한 통신을 제공하기 위한 많은 프로토콜들이 제안되어왔다. 그러나 이동단말기의 부족한 계산능력과 전력량 때문에 공개키를 이용한 프로토콜들은 많은 장점에도 불구하고 충분히 활용되지 못했다. 본 논문에서는 이동 통신 환경에서 기지국과 이동단말기 사이의 상호인증 및 세션키 공유 프로토콜들의 성능을 향상시킬 수 있는 기법을 제안한다. 본 논문에서 제안하는 기법은 이동단말기의 비밀 정보를 기지국에게 드러나게 하지 않으면서 많은 계산을 기지국으로 하여금 대신 수행하도록 하는 것이다. 제안된 기법은 기존의 프로토콜들을 최대 5배까지 성능을 향상시키며 해당하는 만큼 이동단말기의 전력량 소모를 감소시킬 수있다.Abstract Mobile communication is more vulnerable to security attacks such as interception and unauthorized access than fixed network communication. To overcome these problems, many protocols have been proposed to provide a secure channel between a mobile station and a base station. However, these public-key based protocols have not been fully utilized due to the poor computing power and small battery capacity of mobile stations. In this paper, we propose techniques for accelerating public-key based key establishment protocols between a mobile station and a base station. The proposed techniques enable a mobile station to borrow computing power from a base station without revealing its secret information. The proposed schemes accelerate the previous protocols up to five times and reduce the amount of power consumption of mobile stations.