http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Piljoo Choi,Mun-Kyu Lee,Jeong-Taek Kong,Dong Kyue Kim 대한전자공학회 2017 Journal of semiconductor technology and science Vol.17 No.3
For efficient hardware (HW) implementation of elliptic curve cryptography (ECC), various sub-modules for the underlying finite field operations should be implemented efficiently. Among these submodules, modular inversion (MI) requires the most computation; therefore, its performance might be a dominant factor of the overall performance of an ECC module. To determine the most efficient MI algorithm for an HW ECC module, we implement various classes of MI algorithms and analyze their performance. In contrast to the common belief in previous research, our results show that the right-shift binary inversion (RS) algorithm performs well when implemented in hardware. In addition, we present optimization methods to reduce the area overhead and improve the speed of the RS algorithm. By applying these methods, we propose a new RS-variant that is both fast and compact. The proposed MI module is more than twice as fast as the other two classes of MI: shifting Euclidean (SE) and left-shift binary inversion (LS) algorithms. It consumes only 15% more area and even 5% less area than SE and LS, respectively. Finally, we show that how our new method can be applied to optimize an HW ECC module.
Choi, Piljoo,Lee, Mun-Kyu,Kong, Jeong-Taek,Kim, Dong Kyue The Institute of Electronics and Information Engin 2017 Journal of semiconductor technology and science Vol.17 No.3
For efficient hardware (HW) implementation of elliptic curve cryptography (ECC), various sub-modules for the underlying finite field operations should be implemented efficiently. Among these sub-modules, modular inversion (MI) requires the most computation; therefore, its performance might be a dominant factor of the overall performance of an ECC module. To determine the most efficient MI algorithm for an HW ECC module, we implement various classes of MI algorithms and analyze their performance. In contrast to the common belief in previous research, our results show that the right-shift binary inversion (RS) algorithm performs well when implemented in hardware. In addition, we present optimization methods to reduce the area overhead and improve the speed of the RS algorithm. By applying these methods, we propose a new RS-variant that is both fast and compact. The proposed MI module is more than twice as fast as the other two classes of MI: shifting Euclidean (SE) and left-shift binary inversion (LS) algorithms. It consumes only 15% more area and even 5% less area than SE and LS, respectively. Finally, we show that how our new method can be applied to optimize an HW ECC module.
Improving Ring-oscillator-based True Random Number Generators using Multiple Sampling
Piljoo Choi,Ji-Hoon Kim,Dong Kyue Kim 대한전자공학회 2019 Journal of semiconductor technology and science Vol.19 No.3
A ring-oscillator-based true random number generator (TRNG) can be implemented using only digital standard cells. However, this requires significant hardware resources to compensate for the low bit rate. In this letter, we propose an improved Fibonacci and Galois ring oscillator (FIGARO) TRNG based on a multiple-sampling technique. We implemented FIGARO TRNGs with and without multiple sampling in the same field-programmable gate array and tested the generators’ randomness using the National Institute of Standards and Technology (NIST) random test suite. Our experimental results show that the proposed FIGARO TRNG with multiple sampling requires 3.67-4.76 times fewer resources than when only FIGAROs are used for the same bit rates.
Montgomery Multiplication Hardware Module with Combined Pre-computation Module
Piljoo Choi,Seung Ho Chung,Dong Kyue Kim 한국멀티미디어학회 2011 한국멀티미디어학회 국제학술대회 Vol.2011 No.-
This paper presents a hardware module of RSA algorithm. RSA algorithm needs a modular exponentiation module, and Montgomery product algorithm is widely used. In this paper, a small-area hardware design of Montgomery product with pre-computed functionality was suggested, and it is expected to be used for resource-limited security applications such as smartcards.
최필주(Choi, Piljoo),박상선(Lee, Jae Seong),김동규(Kim, Dong Kyue) 한국정보보호학회 2012 情報保護學會誌 Vol.22 No.4
최근 스마트폰을 이용한 모바일 금융 서비스 시장이 증대되고 있으나 개방된 무선인터넷을 사용하며 도난 및 분실의 위험이 큰 모바일 환경의 특성으로 인하여 안전한 인증 기술의 필요성이 대두되고 있다. 최근 모든 플랫폼에서 사용할 수 있는 오픈 뱅킹에 대한 수요와 편의성에 대한 요구로 기존의 공개키 기반의 인증 방식인 공인인증서를 대체할 수 있는 새로운 인식 기술이 요구되고 있다. 사용자의 생체 특성을 이용하는 바이오 인식 기술은 모바일에 탑재되어 있는 기본입력 장치를 이용하여 바이오 정보를 인식하는 것이 가능하며 별도의 소지 없이 간단히 인식이 가능하기 때문에 모바일 지급 결제에 공인인증서를 대체할 수단으로 사용될 수 있다. 아직 모바일 지급결재에 바이오인식 기술을 적용하기에는 인식률의 정확도 향상이 필요한 상태이나 이를 위한 소프트웨어 및 하드웨어적인 개선이 이루어진다면 안전한 모바일 지급결제 환경을 구축할 수 있을 것으로 기대된다.
Hardware Implementation of Lightweight Block Ciphers for IoT Sensors
Wonbae Gong,Piljoo Choi,Dong Kyue Kim 대한전자공학회 2020 Journal of semiconductor technology and science Vol.20 No.4
Small devices such as sensors in Internet of Things (IoT) networks have highly constrained resources, which significantly influences the choice of cipher algorithm and communication method. For these devices, lightweight block ciphers such as SIMON, SPECK, SIMECK, CHAM, LED, Piccolo, and TWINE have been proposed, and radio-frequency identification (RFID) communication is considered to be a suitable communication method for IoT sensors because it can transmit power remotely. In this study, we implemented the aforementioned lightweight block ciphers in round- and serial-based structures and analyzed their suitability for IoT sensors using ultra-high-frequency (UHF) and high frequency (HF) RFID communication. To obtain the result using the same technology library, we have re-implemented all the block ciphers including one that has not been included in the previous research. The results of our comparison show that CHAM has the smallest area requirement. According to our analysis, only round-based CHAM, Piccolo, and LED are suitable for IoT sensors, such as those in the Smart Dust system, using UHF RFID communication, and all serial-based ciphers are suitable for IoT sensors such as biosensors when using HF RFID communication.
산업 IoT 전용 분산 연합 학습 기반 침입 탐지 시스템
( Md Mamunur Rashid ),최필주 ( Piljoo Choi ),이석환 ( Suk-hwan Lee ),권기룡 ( Ki-ryong Kwon ) 한국정보처리학회 2023 한국정보처리학회 학술대회논문집 Vol.30 No.2
Federated learning (FL)-based network intrusion detection techniques have enormous potential for securing the Industrial Internet of Things (IIoT) cybersecurity. The openness and connection of systems in smart industrial facilities can be targeted and manipulated by malicious actors, which emphasizes the significance of cybersecurity. The conventional centralized technique's drawbacks, including excessive latency, a congested network, and privacy leaks, are all addressed by the FL method. In addition, the rich data enables the training of models while combining private data from numerous participants. This research aims to create an FL-based architecture to improve cybersecurity and intrusion detection in IoT networks. In order to assess the effectiveness of the suggested approach, we have utilized well-known cybersecurity datasets along with centralized and federated machine learning models.