• Title/Summary/Keyword: validation

Search Result 8,155, Processing Time 0.038 seconds

Implementation of Validation Tool for Cryptographic Modules (암호기술 구현물 검증도구 구현)

  • 이종후;김충길;이재일;이석래;류재철
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.2
    • /
    • pp.45-58
    • /
    • 2001
  • There are relatively many research results of the validation of the cryptography. But few researches on the validation of cryptography implementations were accomplished. However, developer\`s misunderstanding the crypto-algorithm or a mistake in implementation of the crypto-a1gorithm leads to lose reliability of security products. Therefore, as validation of the crypto-algorithm itself also validation of the implementation is important. The major objective of this paper is to propose Security Products Validation Tool. Our tool validates implementation of the public key algorithm (RSA. KCDSA) and hash algorithm (SHA-1, HAS-170). The validation process is composed of several items and our tool performs validation teats for conformance to related standard.

A Study on the Statistical Model Validation using Response-adaptive Experimental Design (반응적응 시험설계법을 이용하는 통계적 해석모델 검증 기법 연구)

  • Jung, Byung Chang;Huh, Young-Chul;Moon, Seok-Jun;Kim, Young Joong
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2014.10a
    • /
    • pp.347-349
    • /
    • 2014
  • Model verification and validation (V&V) is a current research topic to build computational models with high predictive capability by addressing the general concepts, processes and statistical techniques. The hypothesis test for validity check is one of the model validation techniques and gives a guideline to evaluate the validity of a computational model when limited experimental data only exist due to restricted test resources (e.g., time and budget). The hypothesis test for validity check mainly employ Type I error, the risk of rejecting the valid computational model, for the validity evaluation since quantification of Type II error is not feasible for model validation. However, Type II error, the risk of accepting invalid computational model, should be importantly considered for an engineered products having high risk on predicted results. This paper proposes a technique named as the response-adaptive experimental design to reduce Type II error by adaptively designing experimental conditions for the validation experiment. A tire tread block problem and a numerical example are employed to show the effectiveness of the response-adaptive experimental design for the validity evaluation.

  • PDF

Modeling cryptographic algorithms validation and developing block ciphers with electronic code book for a control system at nuclear power plants

  • JunYoung Son;Taewoo Tak;Hahm Inhye
    • Nuclear Engineering and Technology
    • /
    • v.55 no.1
    • /
    • pp.25-36
    • /
    • 2023
  • Nuclear power plants have recognized the importance of nuclear cybersecurity. Based on regulatory guidelines and security-related standards issued by regulatory agencies around the world including IAEA, NRC, and KINAC, nuclear operating organizations and related systems manufacturing organizations, design companies, and regulatory agencies are considering methods to prepare for nuclear cybersecurity. Cryptographic algorithms have to be developed and applied in order to meet nuclear cybersecurity requirements. This paper presents methodologies for validating cryptographic algorithms that should be continuously applied at the critical control system of I&C in NPPs. Through the proposed schemes, validation programs are developed in the PLC, which is a critical system of a NPP's I&C, and the validation program is verified through simulation results. Since the development of a cryptographic algorithm validation program for critical digital systems of NPPs has not been carried out, the methodologies proposed in this paper could provide guidelines for Cryptographic Module Validation Modeling for Control Systems in NPPs. In particular, among several CMVP, specific testing techniques for ECB mode-based block ciphers are introduced with program codes and validation models.

GLOBAL MINIMA OF LEAST SQUARES CROSS VALIDATION FOR A SYMMETRIC POLYNOMIAL KEREL WITH FINITE SUPPORT

  • Jung, Kang-Mo;Kim, Byung-Chun
    • Journal of applied mathematics & informatics
    • /
    • v.3 no.2
    • /
    • pp.183-192
    • /
    • 1996
  • The least squares cross validated bandwidth is the mini-mizer of the corss validation function for choosing the smooth parame-ter of a kernel density estimator. It is a completely automatic method but it requires inordinate amounts of computational time. We present a convenient formula for calculation of the cross validation function when the kernel function is a symmetric polynomial with finite sup-port. Also we suggest an algorithm for finding global minima of the crass validation function.

Validation Process of HPLC Assay Methods of Drugs in Biological Samples (생체시료내 약물의 HPLC 분석법에 대한 유효성 검토방법)

  • Chi, Sang-Cheol;Jun, H.-Won
    • Journal of Pharmaceutical Investigation
    • /
    • v.21 no.3
    • /
    • pp.179-188
    • /
    • 1991
  • An HPLC assay method of a drug to be applied to the pharmacokinetic studies of the drug should be completely validated. The validation process for an HPLC assay method in a biological sample was discussed using the data obtained from the development of HPLC method for the simultaneous quantitation of verapamil and norverapamil in human serum. The validation criteria included were specificity, linearity, accuracy, precision, sensitivity, recovery, drug stability, and ruggedness of an assay method.

  • PDF

ROBUST CROSS VALIDATIONS IN RIDGE REGRESSION

  • Jung, Kang-Mo
    • Journal of applied mathematics & informatics
    • /
    • v.27 no.3_4
    • /
    • pp.903-908
    • /
    • 2009
  • The shrink parameter in ridge regression may be contaminated by outlying points. We propose robust cross validation scores in ridge regression instead of classical cross validation. We use robust location estimators such as median, least trimmed squares, absolute mean for robust cross validation scores. The robust scores have global robustness. Simulations are performed to show the effectiveness of the proposed estimators.

  • PDF

Validation of time domain seakeeping codes for a destroyer hull form operating in steep stern-quartering seas

  • Van Walree, Frans;Carette, Nicolas F.A.J.
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.3 no.1
    • /
    • pp.9-19
    • /
    • 2011
  • The paper describes the validation of two time domain methods to simulate the behaviour of a destroyer operating in steep, stern-quartering seas. The significance of deck-edge immersion and water on deck on the capsize risk is shown as well as the necessity to account for the wave disturbances caused by the ship. A method is described to reconstruct experimental wave trains and finally two deterministic validation cases are shown.

Validation of Numerical Codes Applied to Floating Offshore Structures

  • Choi, Hang S.
    • Journal of Hydrospace Technology
    • /
    • v.2 no.1
    • /
    • pp.55-64
    • /
    • 1996
  • Herein a review is made on the validation problem of numerical codes applied to floating offshore structures. Since the dynamic behaviour of offshore floating structures in water waves is in general complex and nonlinear, a numerical approach seems to be promising. However, numerical codes are likely involved with uncertainties and they at the present status show apparent scatterness in typical bechmark tests, particularly in second-order wave forces. Convergence test is the minimum requirement for the validation of numerical codes. Some other practical check points are introduced to clarify the potential error sources. It is concluded that a standard procedure for validation must be urgently established sothat numerical methods can safely be used as a rational design tool.

  • PDF

A study on the Preconditions of Space Program Validation of Healthcare Architecture for Application of BIM Technology (병원건축의 BIM적용을 위한 공간프로그램유효성평가의 전제조건에 관한 연구)

  • Seong, Joonho;Kim, Khilchae
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.19 no.2
    • /
    • pp.19-30
    • /
    • 2013
  • Purpose: The planning and design of hospital generally requires the participation and consultation of skilled experts since it has more complex space program than any other buildings. Therefore, the BIM systems for the planning of hospital have been tried continuously. The purpose of this study is to identify the precondition for space Program validation of healthcare architecture based on BIM, which is recently receiving wide attention. Method: For this study, United States, Australia and Finland's guidelines were analyzed among the description space program validation system in 14 overseas BIM Guidelines. And the propose precondition that can be applied to healthcare architecture from among these description of space program validation items, target, process etc for General building. Result: 1) spatial program validation is the following four evaluation phase. Step 1: Standard setting phase Step 2: BIM model accuracy assessment phase Step 3: space validation phase Step 4: Performance evaluation phase 2) The standards for the building elements at Standards Setting stage is considered to the standards for the architectural elements of General building. 3) Healthcare Architecture Area calculation method is considered to be reasonable that borrowing the area calculation standard of general architecture according to the UIA of international standards. However, Be proposed of measuring method that reflect the efficiency of the design process step-by-step area calculation method. The performance assessment indicators of reflect the Hospital uniqueness have to developed. And the research needs to be carried out continuously according to the purpose for healthcare architecture of feature-oriented. Implications: In this paper like to understanding that precondition of space program validation considering the BIM. As a result, understanding to condition about step of the evaluation, the evaluation standards. Is expected to keep the focus on the development of performance indicators that reflect the uniqueness of the hospital for the efficient evaluation of the Hospital building.

Design of Validation System for a Crypto-Algorithm Implementation (암호 알고리즘 구현 적합성 평가 시스템 설계)

  • Ha, Kyeoung-Ju;Seo, Chang-Ho;Kim, Dae-Youb
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.242-250
    • /
    • 2014
  • Conventional researches of standard tool validating cryptographic algorithm have been studied for the internet environment, for the mobile internet. It is important to develop the validation tool for establishment of interoperability and convenience of users in the information systems. Therefore, this paper presents the validation tool of Elliptic Curve Cryptography algorithm that can test if following X9.62 technology standard specification. The validation tool can be applied all information securities using DES, SEED, AES, SHA-1/256/384/512, RSA-OAEP V2.0, V2.1, ECDSA, ECKCDSA, ECDH, etc. Moreover, we can enhance the precision of validation through several experiments and perform the validation tool in the online environment.