Donggeon Lee
Pusan National University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Donggeon Lee.
workshop on information security applications | 2013
Deukjo Hong; Jung-Keun Lee; Dong-Chan Kim; Daesung Kwon; Kwon Ho Ryu; Donggeon Lee
We propose a new block cipher LEA, which has 128-bit block size and 128, 192, or 256-bit key size. It provides a high-speed software encryption on general-purpose processors. Our experiments show that LEA is faster than AES on Intel, AMD, ARM, and ColdFire platforms. LEA can be also implemented to have tiny code size. Its hardware implementation has a competitive throughput per area. It is secure against all the existing attacks on block ciphers.
Sensors | 2014
Donggeon Lee; Dong-Chan Kim; Daesung Kwon; Howon Kim
Recently, due to the advent of resource-constrained trends, such as smartphones and smart devices, the computing environment is changing. Because our daily life is deeply intertwined with ubiquitous networks, the importance of security is growing. A lightweight encryption algorithm is essential for secure communication between these kinds of resource-constrained devices, and many researchers have been investigating this field. Recently, a lightweight block cipher called LEA was proposed. LEA was originally targeted for efficient implementation on microprocessors, as it is fast when implemented in software and furthermore, it has a small memory footprint. To reflect on recent technology, all required calculations utilize 32-bit wide operations. In addition, the algorithm is comprised of not complex S-Box-like structures but simple Addition, Rotation, and XOR operations. To the best of our knowledge, this paper is the first report on a comprehensive hardware implementation of LEA. We present various hardware structures and their implementation results according to key sizes. Even though LEA was originally targeted at software efficiency, it also shows high efficiency when implemented as hardware.
international conference on information technology: new generations | 2010
Donggeon Lee; Seongyun Kim; Howon Kim; Namje Park
RFID (radio-frequency identification) technology is widely used for supply chain management and inventory control. Furthermore, RFID has been recognized as a tool to realize a ubiquitous environment. The typical architecture of RFID applications comprises RFID tags, which are embedded in or attached to an object, an RFID reader, and IS (information services) server. The RFID reader reads the code in the RFID tag and interprets it by communicating with the IS server via a proper communication network. This is the typical architecture defined by EPCglobal. The RFID reader can be stationary or mobile. A mobile RFID reader affords more applications than the stationary one. In this paper, we describe the core components for realizing a mobile RFID application, such as a mobile RFID reader, platform architecture, and the corresponding network architecture. Although there are several types of mobile RFID readers in the market, we propose a specially designed mobile RFID technology that has several positive features including security, network architecture, operation scenario, and code resolution mechanism. Furthermore, we analyze the characteristics of the proposed technologies.
Sensors | 2013
Donggeon Lee; Dooho Choi; Jungtaek Seo; Howon Kim
In this paper, we present a new reset tree-based scheme to protect cryptographic hardware against optical fault injection attacks. As one of the most powerful invasive attacks on cryptographic hardware, optical fault attacks cause semiconductors to misbehave by injecting high-energy light into a decapped integrated circuit. The contaminated result from the affected chip is then used to reveal secret information, such as a key, from the cryptographic hardware. Since the advent of such attacks, various countermeasures have been proposed. Although most of these countermeasures are strong, there is still the possibility of attack. In this paper, we present a novel optical fault detection scheme that utilizes the buffers on a circuits reset signal tree as a fault detection sensor. To evaluate our proposal, we model radiation-induced currents into circuit components and perform a SPICE simulation. The proposed scheme is expected to be used as a supplemental security tool.
2008 International Symposium on Ubiquitous Multimedia Computing | 2008
Byounghoon Kim; Youngmann Kim; Donggeon Lee; Sungwoo Tak
This paper presents the RCP (reconfigurable hardware-software codesign platform incorporating real-time task management technique) for hardware-software codesign of network protocols in SoC (system-on-chip) based system. In the RCP, we decompose a network protocol suite into real-time application-specific and reconfigurable hardware and software tasks. Such a task decomposition technique can improve co-design productivity by supporting the modularity and reuse of complex network protocol cores, thus enabling a higher level of abstraction in architectural modeling of network protocol specifications. Besides, the RCP provides coarse-grained and fine-grained real-time processing simultaneously for given application-specific real-time requirements. The coarse-grained real-time processing is supported at a level of task unit to enable real-time scheduling of network tasks. The fine-grained real-time processing is achieved at a level of a piece of data frame unit to enable real-time communication between decomposed tasks. A case study based on experiments is conducted to illustrate the application and efficiency of the proposed technique by implementing it in the Altera EPXA4 which is a commercial SoC platform.
information security and cryptology | 2014
Donggeon Lee; Yeonchoel Lee; Kyunghoon Kim; Jong-gyu Park; Yong-Je Choi; Howon Kim
ABSTRACT A PUF is a technology for distinguishing a device from other de vices like biological information such as humans’ iris or fingerprints. Over the past decade, many researchers studied va rious methods for implementing PUFs and utilizing them in identification, random number generation, key distribution and authentication. However, various attacks on the PUFs are the major reason to inhibiting the proliferation of PUF. For the re asons, various technologies are being studied to enhance safety of PUFs. In this paper, we will see several PUF implementations and various attacks on PUFs, and suggest guidelines for securely implementing PUFs. We expect our guidelines would be t he foundation for implementing the secure and reliable PUFs.Keywords: Physically Unclonable Function; Implementation Guideline;접수일(2014년 1월 2일), 수정일(2014년 2월 5일), 게재확정일(2014년 2월 8일)* 본 논문은 한국전자통신연구원의 기초연구과제로 수행한 연구결과입니다.†주저자, [email protected]‡교신저자, [email protected] (Corresponding author) I.서 론 최근 IT 기술의 급격한 발전으로 인해 빠른 속도로 새로운 최첨단 디바이스들이 등장하고 있지만, 불법 복제에 대한 피해와 위조로 인한 경제적, 산업적 손실이 날이 갈수록 커져가고 있는 실정이다. 이러한 문제를 해결하고자 Physical Unclonable Function (PUF)라는 새로운 기술이 등장하였다. PUF는 마치 인간의 지문이나 홍채와 같은 생체 정보처럼 각각의
Journal of information and communication convergence engineering | 2014
Aparna Vegendla; Hwajeong Seo; Donggeon Lee; Howon Kim
The wireless sensor networking standard DASH7 operates in low-power communication with a better transmission quality in active RFID networks. The DASH7 security standard supports public key cryptography. At present, the DASH7 standard uses the message authentication code in the network layer for authentication and integrity. However, its security standard is still in an incubation stage with respect to the implementation of a crypto exchange over a DASH7 network. Effective key management is an important factor for privacy and security. If organizations are not careful about where and how keys are stored, they leave the encrypted data vulnerable to theft. In this regard, we present a key management system designed for efficient key management through public key infrastructure authentication as well as a non-repudiation feature for the DASH7 standard. We analyze the performance of the proposed system on a basis of various performance criteria such as latency and throughput.
international conference on computer communications and networks | 2008
Byounghoon Kim; Donggeon Lee; Junghwa Shin; E. K. Park; Sungwoo Tak
This paper presents a framework of wireless multi-hop networks exploiting an ad hoc routing protocol working on the layer 2.5, called REAL (reputation based approach on 2.5-Layer) routing protocol. The framework of REAL routing protocol incorporates following three things: a new concept of wireless multi-hop network architecture, a new 2.5-layer routing technique with a reputation management scheme, and high throughput network performance based on cross-layer approaches between MAC (medium access control) and REAL layers. We compare the performance of the REAL routing protocol with previous routing algorithms, DSR (dynamic source routing) and AODV (ad hoc on demand distance vector). A case study on practical experiments and simulations shows that the REAL routing protocol yields better performance in terms of low rate of packet loss, fast packet delivery time, and high throughput network performance.
Archive | 2014
Donggeon Lee; Hwajeong Seo; Howon Kim
Journal of Korea Multimedia Society | 2007
Donggeon Lee; Youngmann Kim; Sungwoo Tak