• Title/Summary/Keyword: hashing

Search Result 214, Processing Time 0.022 seconds

Adaptation of a Key Distribution Scheme for VSAT Satellite Communications (VSAT 위성통신 보호를 위한 키 분배 방식의 적용)

  • Park, Jeong-Hyeon;Im, Seon-Bae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.1
    • /
    • pp.115-122
    • /
    • 1999
  • This paper presents a key distribution scheme based on the Yacobi scheme that does not use the secret key provided by key distribution center, but uses instead a random number generated y the user. The scheme is independent of the exposure of the secret key. this paper also presented the key distribution schemes based on the Diffie-Hellman (DH) and ID (identity). The schemes based on the solving of the discrete logarithm and prime resolution into factors are better on the expose of secret key. The proposed scheme based on the DH was applied to VSAT satellite communications and simulated on PC using Montgomery algorithm for modular and MD5 (Message Digest) for hashing function.

  • PDF

Random Number Generation using SDRAM (SDRAM을 사용한 난수 발생)

  • Pyo, Chang-Woo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.415-420
    • /
    • 2010
  • Cryptographic keys for security should be generated by true random number generators that apply irreversible hashing algorithms to initial values taken from a random source. As DRAM shows randomness in its access latency, it can be used as a random source. However, systems with synchronous DRAM (SDRAM) do not easily expose such randomness resulting in highly clustered random numbers. We resolved this problem by using the xor instruction. Statistical testing shows that the generated random bits have the quality comparable to true random bit sequences. The performance of bit generation is at the order of 100 Kbits/sec. Since the proposed random number generation requires neither external devices nor any special circuits, this method may be used in any computing device that employs DRAM.

Multi-match Packet Classification Scheme Combining TCAM with an Algorithmic Approach

  • Lim, Hysook;Lee, Nara;Lee, Jungwon
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.6 no.1
    • /
    • pp.27-38
    • /
    • 2017
  • Packet classification is one of the essential functionalities of Internet routers in providing quality of service. Since the arrival rate of input packets can be tens-of-millions per second, wire-speed packet classification has become one of the most challenging tasks. While traditional packet classification only reports a single matching result, new network applications require multiple matching results. Ternary content-addressable memory (TCAM) has been adopted to solve the multi-match classification problem due to its ability to perform fast parallel matching. However, TCAM has a fundamental issue: high power dissipation. Since TCAM is designed for a single match, the applicability of TCAM to multi-match classification is limited. In this paper, we propose a cost- and energy-efficient multi-match classification architecture that combines TCAM with a tuple space search algorithm. The proposed solution uses two small TCAM modules and requires a single-cycle TCAM lookup, two SRAM accesses, and several Bloom filter query cycles for multi-match classifications.

On the performance of the hash based indexes for storing the position information of moving objects (이동체의 위치 정보를 저장하기 위한 해쉬 기반 색인의 성능 분석)

  • Jun, Bong-Gi
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.9-17
    • /
    • 2006
  • Moving objects database systems manage a set of moving objects which changes its locations and directions continuously. The traditional spatial indexing scheme is not suitable for the moving objects because it aimed to manage static spatial data. Because the location of moving object changes continuously, there is problem that expense that the existent spatial index structure reconstructs index dynamically is overladen. In this paper, we analyzed the insertion/deletion costs for processing the movement of objects. The results of our extensive experiments show that the Dynamic Hashing Index outperforms the original R-tree and the fixed grid typically by a big margin.

  • PDF

Performance Optimization of LLAH for Tracking Random Dots under Gaussian Noise (가우시안 잡음을 가지는 랜덤 점 추적을 위한 LLAH의 성능 최적화)

  • Park, Hanhoon
    • Journal of Broadcast Engineering
    • /
    • v.20 no.6
    • /
    • pp.912-920
    • /
    • 2015
  • Unlike general texture-based feature description algorithms, Locally Likely Arrangement Hashing (LLAH) algorithm describes a feature based on the geometric relationship between its neighbors. Thus, even in poor-textured scenes or large camera pose changes, it can successfully describe and track features and enables to implement augmented reality. This paper aims to optimize the performance of LLAH algorithm for tracking random dots (= features) with Gaussian noise. For this purpose, images with different number of features and magnitude of Gaussian noise are prepared. Then, the performance of LLAH algorithm according to the conditions: the number of neighbors, the type of geometric invariants, and the distance between features, is analyzed, and the optimal conditions are determined. With the optimal conditions, each feature could be matched and tracked in real-time with a matching rate of more than 80%.

Study on Hashing of CD-R Media from the Viewpoint of Digital Forensics (디지털 포렌식 관점에서 CD-R 미디어의 해쉬 값 생성에 관한 연구)

  • Park, Jung-Heum;Kim, Kwon-Youp;Lee, Sang-Jin;Lim, Jong-In
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.167-170
    • /
    • 2008
  • 해쉬 알고리즘은 디지털 포렌식 수사에서 디지털 증거의 무결성을 증명하기 위해 널리 사용되고 있다. 디지털 증거의 무결성은 동일한 데이터에서만 같은 해쉬 값이 계산된다는 성질에 의하여 증명된다. 일반적으로 동일한 데이터에 대한 해쉬 값은 서로 다른 포렌식 툴을 이용해서 계산을 해도 항상 같은 값이 출력될 것이라고 인식하고 있다. 하지만, CD-R 미디어의 경우에는 해쉬를 계산하는 포렌식 툴에 따라 값이 다르다는 특성이 있다. 이것은 해쉬 값이 CD 제작 도구에서 CD-R 미디어에 데이터를 기록하는 방식과 각 포렌식 툴 별로 CD-R 미디어를 인식하는 방식에 의해 영향을 받기 때문이다. 이러한 특성은 CD-R 미디어의 무결성 증명 시에 문제가 될 여지가 있기 때문에 디지털 포렌식 수사 절차에서 반드시 고려되어야 한다. 본 논문에서는 CD-R 미디어의 해쉬 값에 영향을 주는 요소에 대해 기술하고, 실험용 CD-R 미디어를 제작하여 대표적인 디지털 포렌식 도구들을 이용해서 확인한다. 이를 통해, 디지털 포렌식 수사 절차에서 CD-R 미디어에 대한 해쉬 값을 계산할 때 고려해야 할 사항을 제안한다.

  • PDF

A Black Hole Detection Protocol Design based on a Mutual Authentication Scheme on VANET

  • Lee, ByungKwan;Jeong, EunHee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1467-1480
    • /
    • 2016
  • This paper proposes "A Black Hole Detection Protocol Design based on a Mutual Authentication Scheme on VANET." It consists of the Mutual Authentication Scheme (MAS) that processes a Mutual Authentication by transferring messages among a Gateway Node, a Sensor Node, and a User Node and the Black Hole Detection Protocol (BHDP) which detects a Non-Authentication Node by using the Session Key computed in the MAS and a Black Hole by using the Broadcasting Table. Therefore, the MAS can reduce the operation count of hash functions more than the existing scheme and protect a privacy from an eavesdropping attack and an information exposure by hashing a nonce and user's ID and password. In addition, the MAS prevents a replay attack by using the randomly generated nonce and the time stamp. The BHDP improves Packet Delivery ratio and Throughput more than the AODV with Black hole by 4.79% and 38.28Kbps. Also, it improves Packet Delivery ratio and Throughput more than the IDSAODV by 1.53% and 10.45Kbps. Hence it makes VANET more safe and reliable.

Detection of Malicious Code using Association Rule Mining and Naive Bayes classification (연관규칙 마이닝과 나이브베이즈 분류를 이용한 악성코드 탐지)

  • Ju, Yeongji;Kim, Byeongsik;Shin, Juhyun
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.11
    • /
    • pp.1759-1767
    • /
    • 2017
  • Although Open API has been invigorated by advancements in the software industry, diverse types of malicious code have also increased. Thus, many studies have been carried out to discriminate the behaviors of malicious code based on API data, and to determine whether malicious code is included in a specific executable file. Existing methods detect malicious code by analyzing signature data, which requires a long time to detect mutated malicious code and has a high false detection rate. Accordingly, in this paper, we propose a method that analyzes and detects malicious code using association rule mining and an Naive Bayes classification. The proposed method reduces the false detection rate by mining the rules of malicious and normal code APIs in the PE file and grouping patterns using the DHP(Direct Hashing and Pruning) algorithm, and classifies malicious and normal files using the Naive Bayes.

Improving TCP Performance in Multipath Packet Forwarding Networks

  • Lee, Youngseok;Park, Ilkyu;Park, Yanghee
    • Journal of Communications and Networks
    • /
    • v.4 no.2
    • /
    • pp.148-157
    • /
    • 2002
  • This paper investigates schemes to improve TCP performance in multipath forwarding networks. In multipath routing, packets to the same destination are sent to multiple next-hops in either packet-level or flow-level forwarding mode. Effective bandwidth is increased since we can utilize unused capacity of multiple paths to the destination. In packet-level multipath forwarding networks, TCP performance may not be enhanced due to frequent out-of-order segment arrivals at the receiver because of different delays among paths. To overcome this problem, we propose simple TCP modifications. At the sender, the fast retransmission threshold is adjusted taking the number of paths into consideration. At the receiver, the delayed acknowledgment scheme is modified such that an acknowledgment for an out-of-order segment arrival is delayed in the same way for the in-order one. The number of unnecessary retransmissions and congestion window reductions is diminished, which is verified by extensive simulations. In flow-level multipath forwarding networks, hashing is used at routers to select outgoing link of a packet. Here, we show by simulations that TCP performance is increased in proportion to the number of paths regardless of delay differences.

Integrity Verification in Vehicle Black Box Video Files with Hashing Method (차량용 블랙박스 영상파일의 무결성 검증에 해시함수 이용 방법)

  • Choi, Jin-young;Chang, Nam Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.241-249
    • /
    • 2017
  • Recently, as a vehicle black box device has propagated, it has been increasingly used as a legal proof and there are the needs to verify an integrity of the video data. However, since the black box classified as the embedded system has a small capacity and low processing speed, there are limitations to the storage of video files and the integrity verification processing. In this paper, we propose a novel method for video files integrity in the black box environment with limited resources by using lightweight hash function LSH and the security of HMAC. We also present the test results of CPU idle rate at integrity verification in vehicle black box device by implementing this method, and verify the effectiveness and practicality of the proposed method.