• Title/Summary/Keyword: permutation

Search Result 418, Processing Time 0.032 seconds

A Chosen Plaintext Linear Attack On Block Cipher Cipher CIKS-1 (CIKS-1 블록 암호에 대한 선택 평문 선형 공격)

  • 이창훈;홍득조;이성재;이상진;양형진;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.47-57
    • /
    • 2003
  • In this paper, we firstly evaluate the resistance of the reduced 5-round version of the block cipher CIKS-1 against linear cryptanalysis(LC) and show that we can attack full-round CIKS-1 with \ulcorner56-bit key through the canonical extension of our attack. A feature of the CIKS-1 is the use of both Data-Dependent permutations(DDP) and internal key scheduling which consist in data dependent transformation of the round subkeys. Taking into accout the structure of CIKS-1 we investigate linear approximation. That is, we consider 16 linear approximations with p=3/4 for 16 parallel modulo $2^2$ additions to construct one-round linear approximation and derive one-round linear approximation with the probability P=1/2+$2^{-17}$ by Piling-up lemma. Then we present 3-round linear approximation with 1/2+$2^{-17}$ using this one-round approximation and attack the reduced 5-round CIKS-1 with 64-bit block by LC. In conclusion we present that our attack requires $2^{38}$chosen plaintexts with a probability of success of 99.9% and about $2^{67-7}$encryption times to recover the last round key.(But, for the full-round CIKS-1, our attack requires about $2^{166}$encryption times)

Efficient Implementation of NIST LWC SPARKLE on 64-Bit ARMv8 (ARMv8 환경에서 NIST LWC SPARKLE 효율적 구현)

  • Hanbeom Shin;Gyusang Kim;Myeonghoon Lee;Insung Kim;Sunyeop Kim;Donggeun Kwon;Seonggyeom Kim;Seogchung Seo;Seokhie Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.401-410
    • /
    • 2023
  • In this paper, we propose optimization methods for implementing SPARKLE, one of the NIST LWC finalists, on a 64-bit ARMv8 processor. The proposed methods consist of two approaches: an implementation using ARM A64 instructions and another using NEON ASIMD instructions. The A64-based implementation is optimized by performing register scheduling to efficiently utilize the available registers on the ARMv8 architecture. By utilizing the optimized A64-based implementation, we can achieve speeds that are 1.69 to 1.81 times faster than the C reference implementation on a Raspberry Pi 4B. The ASIMD-based implementation, on the other hand, optimizes data by parallelizing the ARX-boxes to perform more than three of them concurrently through a single vector instruction. While the general speed of the optimized ASIMD-based implementation is lower than that of the A64-based implementation, it only slows down by 1.2 times compared to the 2.1 times slowdown observed in the A64-based implementation as the block size increases from SPARKLE256 to SPARKLE512. This is an advantage of the ASIMD-based implementation. Therefore, the ASIMD-based implementation is more efficient for SPARKLE variant block cipher or permutation designs with larger block sizes than the original SPARKLE, making it a useful resource.

Comparative analysis of water surface spectral characteristics based on hyperspectral images for chlorophyll-a estimation in Namyang estuarine reservoir and Baekje weir (남양호와 백제보의 Chlorophyll-a 산정을 위한 초분광 영상기반 수체분광특성 비교 분석)

  • Jang, Wonjin;Kim, Jinuk;Kim, Jinhwi;Nam, Guisook;Kang, Euetae;Park, Yongeun;Kim, Seongjoon
    • Journal of Korea Water Resources Association
    • /
    • v.56 no.2
    • /
    • pp.91-101
    • /
    • 2023
  • In this study, we estimated the concentration of chlorophyll-a (Chl-a) using hyperspectral water surface reflectance in an inland weir (Baekjae weir) and estuarine reservoir (Namyang Reservoir) for monitoring the occurrence of algae in freshwater in South Korea. The hyperspectral reflectance was measured by aircraft in Baekjae Weir (BJW) from 2016 to 2017, and a drone in Namyang Reservoir (NYR) from 2020 to 2021. The 30 reflectance bands (BJW: 400-530, 620-680, 710-730, 760-790 nm, NYR: 400-430, 655-680, 740-800 nm) that were highly related to Chl-a concentration were selected using permutation importance. Artificial neural network based Chl-a estimation model was developed using the selected reflectance in both water bodies. And the performance of the model was evaluated with the coefficient of determination (R2), the root mean square error (RMSE), and the mean absolute error (MAE). The performance evaluation results of the Chl-a estimation model for each watershed was R2: 0.63, 0.82, RMSE: 9.67, 6.99, and MAE: 11.25, 8.48, respectively. The developed Chl-a model of this study may be used as foundation tool for the optimal management of freshwater algal blooms in the future.

Probabilistic Risk Assessment of a Cable-Stayed Bridge Based on the Prediction Method for the Combination of Failure Modes (붕괴모드 조합 예측법에 의한 PSC사장교의 위험도평가)

  • Park, Mi-Yun;Cho, Hyo-Nam;Cho, Taejun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.4A
    • /
    • pp.647-657
    • /
    • 2006
  • Probabilistic Risk Assessment considering statistically random variables is performed for the preliminary design of a Cable Stayed Bridge, which is Prestressed Concrete Bridge consisted of cable and plate girders, based on the method of Working Stress Design and Strength Design. Component reliabilities of cables and girders have been evaluated using the response surface of the design variables at the selected critical sections based on the maximum shear, positive and negative moment locations. Response Surface Method (RSM) is successfully applied for reliability analyses for this relatively small probability of failure of the complex structure, which is hard to obtain through Monte-Carlo Simulations. or through First Order Second Moment Method that can not easily calculate the derivative terms of implicit limit state functions. For the analysis of system reliability, parallel resistance system consisting of cables and plate girder is changed into series connection system and the result of system reliability of total structure is presented. As a system reliability, the upper and lower probabilities of failure for the structural system have been evaluated and compared with the suggested prediction method for the combination of failure modes. The suggested prediction method for the combination of failure modes reveals the unexpected combinations of element failures in significantly reduced time and efforts compared with the previous permutation method or system reliability analysis method, which calculates upper and lower bound failure probabilities.

Exploring automatic scoring of mathematical descriptive assessment using prompt engineering with the GPT-4 model: Focused on permutations and combinations (프롬프트 엔지니어링을 통한 GPT-4 모델의 수학 서술형 평가 자동 채점 탐색: 순열과 조합을 중심으로)

  • Byoungchul Shin;Junsu Lee;Yunjoo Yoo
    • The Mathematical Education
    • /
    • v.63 no.2
    • /
    • pp.187-207
    • /
    • 2024
  • In this study, we explored the feasibility of automatically scoring descriptive assessment items using GPT-4 based ChatGPT by comparing and analyzing the scoring results between teachers and GPT-4 based ChatGPT. For this purpose, three descriptive items from the permutation and combination unit for first-year high school students were selected from the KICE (Korea Institute for Curriculum and Evaluation) website. Items 1 and 2 had only one problem-solving strategy, while Item 3 had more than two strategies. Two teachers, each with over eight years of educational experience, graded answers from 204 students and compared these with the results from GPT-4 based ChatGPT. Various techniques such as Few-Shot-CoT, SC, structured, and Iteratively prompts were utilized to construct prompts for scoring, which were then inputted into GPT-4 based ChatGPT for scoring. The scoring results for Items 1 and 2 showed a strong correlation between the teachers' and GPT-4's scoring. For Item 3, which involved multiple problem-solving strategies, the student answers were first classified according to their strategies using prompts inputted into GPT-4 based ChatGPT. Following this classification, scoring prompts tailored to each type were applied and inputted into GPT-4 based ChatGPT for scoring, and these results also showed a strong correlation with the teachers' scoring. Through this, the potential for GPT-4 models utilizing prompt engineering to assist in teachers' scoring was confirmed, and the limitations of this study and directions for future research were presented.

Exposure Assessment for Polycyclic Aromatic Hydrocarbons in the Model Menu System of Korean (한국인의 모델식이에 대한 다환방향족탄화수소류(PAHs)의 인체노출량평가)

  • Kim YunHee;Yoon EunKyung;Lee HyoMin;Park KyungAh;Jun EunAh;Lee CherlHo;Choi SangYun;Lim SeungTaek;Ze KeumRyun;Choi KwangSik
    • Journal of Food Hygiene and Safety
    • /
    • v.19 no.4
    • /
    • pp.176-184
    • /
    • 2004
  • This study was conducted to compare and estimate the daily PAHs dietary intake from both home-cooking and dining-out, through approach of model diet used in exposure assessment of food contaminants. Food commodities reflecting in model diet were selected from the KHIDI report and were analysed in cooked or uncooked edible forms using HPLC-Fluorscence Detector. The PAHs dietary intake comparison between home-cooking and dining-out was based on one meal intake suggested in model diet and PAHs dietary intake was estimated by using food consumption rate and body weight of the Korean adult group. The daily PAHs dietary intake was calculated by permutation and combination method with assumption that a person consumed 2 meals from home-cooking menu and 1 meal from dining-out menu. The total PAHs levels in 36 food commodities with 200 samples were ranged from 2.00 ug/kg to 141.28 ug/kg and a food showing the highest PAHs level was the stir-fried anchovy. The $TEQ_{BaP}$ levels of PAHs were calculated using benzo(a)pyrene equivalents individual congener level and corresponding TEF value and the $TEQ_{BaP}$ level were ranged from $0.03\;ugTEQ{BaP}$ to $1.31\;ugTEQ_{BaP}$ and a food showing the highest $TEQ_{BaP}$ level was the hamburger. The PAHs dietary intakes per one meal from home-cooking and dining-out were $2.4\times10^{-3}\;ugTEQ_{BaP}/kg/meal\;and\;4.0\times10^{-3}\;ugTEQ_{BaP}/kg/meal$, respectively. This data showed the PAHs dietary intake from dining-out was about 1.7 times higher than from the home-cooking. The daily PAHs dietary intakes of general Korean adult having two meals from home-cooking and one meal from dining-out per a day were ranged between $8.0\times10^{-3}\~9.7\times10^{-3}\;ugTEQ_{BaP}/gg/day$ and mean value as $8.9\times10^{-3}\~9.7\times10^{-3}\;ugTEQ_{BaP}/gg/day$.

Experimental Design of S box and G function strong with attacks in SEED-type cipher (SEED 형식 암호에서 공격에 강한 S 박스와 G 함수의 실험적 설계)

  • 박창수;송홍복;조경연
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.1
    • /
    • pp.123-136
    • /
    • 2004
  • In this paper, complexity and regularity of polynomial multiplication over $GF({2^n})$ are defined by using Hamming weight of rows and columns of the matrix ever GF(2) which represents polynomial multiplication. It is shown experimentally that in order to construct the block cipher robust against differential cryptanalysis, polynomial multiplication of substitution layer and the permutation layer should have high complexity and high regularity. With result of the experiment, a way of constituting S box and G function is suggested in the block cipher whose structure is similar to SEED, which is KOREA standard of 128-bit block cipher. S box can be formed with a nonlinear function and an affine transform. Nonlinear function must be strong with differential attack and linear attack, and it consists of an inverse number over $GF({2^8})$ which has neither a fixed pout, whose input and output are the same except 0 and 1, nor an opposite fixed number, whose output is one`s complement of the input. Affine transform can be constituted so that the input/output correlation can be the lowest and there can be no fixed point or opposite fixed point. G function undergoes linear transform with 4 S-box outputs using the matrix of 4${\times}$4 over $GF({2^8})$. The components in the matrix of linear transformation have high complexity and high regularity. Furthermore, G function can be constituted so that MDS(Maximum Distance Separable) code can be formed, SAC(Strict Avalanche Criterion) can be met, and there can be no weak input where a fixed point an opposite fixed point, and output can be two`s complement of input. The primitive polynomials of nonlinear function affine transform and linear transformation are different each other. The S box and G function suggested in this paper can be used as a constituent of the block cipher with high security, in that they are strong with differential attack and linear attack with no weak input and they are excellent at diffusion.

Early Responses of Planted Quercus serrata Seedlings and Understory Vegetation to Artificial Gap Treatments in Black Locust Plantation (아까시나무림에서 인공 숲틈 처리에 대한 졸참나무 식재목 및 하층식생의 초기 반응)

  • Cho, Yong-Chan;Kim, Jun-Soo;Lee, Jung-Hyo;Lee, Heon-Ho;Ma, Ho-Seob;Lee, Chang-Seok;Cho, Hyun-Je;Bae, Kwan-Ho
    • Journal of Korean Society of Forest Science
    • /
    • v.98 no.1
    • /
    • pp.94-105
    • /
    • 2009
  • Black locust (Robinia pseudoacacia) stand is representative lowland exotic plantation with low ecological quality and arrested succession in South Korea. To facilitate succession and restore natural vegetation, small canopy gaps (${\sim}57m^2$), which can modify minimally structural variables and reduce restoration related disturbances on stand, was established in the black locust stand, and oak (Quercus serrata) seedlings were introduced in the gap. Two types of varying levels were introduced for gap creation; cutting (C) and girdling (G) on canopies. Understory removal (CU and GU) treatment was applied as subtypes of structural modification. Growth (diameter, height and leaf area) of target species and responses (species composition, diversity and coverage) of understory community were monitored during study years (2007~2008). Canopy openness was different significantly among treatments but not for light availability. Based on the result of logistic regression, growth of height and leaf area of seedlings were significant variables on seedling survival. Height and leaf area of seedlings were increased during study years, although radial growth was reduced. During study years, there were no significant differences in species composition and diversity, and total coverage increased about 20%. Increase of resources by gap creation and understory removal likely affect growth of target species. Small gap creation was effective to reduce understory responses in composition and diverstiy. Synthesized, growth of target species and responses of understory community to small canopy gap creation exhibited, in short term, possibility of utilization in alternative forest restoration and management option. Long-term monitoring is necessary to certificate effect of artificial gap creation on forest restoration.