Sang Uk Shin

Learn More
All-or-nothing property is a new encryption mode proposed by Rivest and has the property that one must decrypt the entire cipher-text to determine any plaintext block. In this paper, we propose a hash function with all-or-nothing property. The proposed scheme can use the existing hash functions without changing their structures, and it is secure against all(More)
Within the security architecture of the 3GPP system there is a standardised encryption mode f 8 based on the block cipher KASUMI. In this work we examine the pseudorandomness of the block cipher KA-SUMI and the provable security of f 8. First we show that the three round KASUMI is not a pseudorandom permutation ensemble but the four round KASUMI is a(More)
All-or-nothing property is a new encryption mode proposed by Rivest and has the property that one must decrypt the entire ciphertext to determine any plaintext block. In this paper, we propose hash functions with all-or-nothing property. The proposed schemes use the existing hash functions without changing their structures, and they are secure against known(More)
Several fast software hash functions have been proposed since the hash function MD4 was introduced by R. Rivest in 1990. At the moment , SHA-1, RIPEMD-160, and HAVAL are known as secure dedicated hash functions in MDx-family hash functions. In this paper, we propose a new hash function based on advantages of these three hash functions, which keeps the(More)
In order to minimize time & cost for E-Discovery, many vendors have developed and released competitively their own service systems or software applied state-of-the-art technologies. Among them, Cloud Computing is one of the most exclusive skills as a computing infrastructure for E-Discovery service. However, these products actually do not cover all(More)
Recently, as IT Compliance becomes more diverse, companies have to take a great amount of effort to comply with it and prepare countermeasures. Especially, E-Discovery is also one of the most notable compliances for IT and law. In order to minimize the time and cost for E-Discovery, many service systems and solutions using the state-of-the-art technology(More)
Big Data brings new challenges to the field of e-Discovery or digital forensics and these challenges are mostly connected to the various methods for data processing. Considering that the most important factors are time and cost in determining success or failure of digital investigation, the development of a valid indexing method for efficient search should(More)
This paper proposes a scalable video coding (SVC) DRM mechanism considering the convergence environment that redistributes the adaptive content for devices which may have different display size and computing capabilities between users or in the home network. The proposed SVC DRM mechanism uses the SVC content that is compressed by H.264/SVC scheme which has(More)