• Title/Summary/Keyword: Analysis of key

Search Result 10,058, Processing Time 0.04 seconds

A Review of Simulation for Human Escape on Shipboard (인적요소를 고려한 선상 탈출 시뮬레이션 기술)

  • 김홍태;이동곤;박진형
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2001.05a
    • /
    • pp.135-140
    • /
    • 2001
  • In the last years there have been some severe accidents with passenger vessels. So, International Maritime Organization(IMO) has recognized that computer stimulation of the evacuation may be required for passenger vessels. Human elements is a key issues of escape analysis on shipboard. There are technical requirements to simulate of escape analysis for human elements. Technical requirements include model of ship structure, evacuation algorithm, human behaviour analysis and influence of ship listing/motion. This paper provides the key issues and technologies of simulation for human escape on shipboard.

  • PDF

Differential Power Analysis Attack of a Block Cipher ARIA (블럭 암호 ARIA에 대한 차분전력분석공격)

  • Seo JungKab;Kim ChangKyun;Ha JaeCheol;Moon SangJae;Park IlHwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.99-107
    • /
    • 2005
  • ARIA is a 128-bit block cipher having 128-bit, 192-bit, or 256-bit key length. The cipher is a substitution and permutation encryption network (SPN) and uses an involutional binary matrix. This structure was efficiently developed into light weight environments or hardware implementations. This paper shows that a careless implementation of an ARIA on smartcards is vulnerable to a differential power analysis attack This attack is realistic because we can measure power consumption signals at two kinds of S-boxes and two types of substitution layers. By using the two round key, we extracted the master key (MK).

KEY EXCHANGE PROTOCOL USING MATRIX ALGEBRAS AND ITS ANALYSIS

  • CHO SOOJIN;HA KIL-CHAN;KIM YOUNG-ONE;MOON DONGHO
    • Journal of the Korean Mathematical Society
    • /
    • v.42 no.6
    • /
    • pp.1287-1309
    • /
    • 2005
  • A key exchange protocol using commutative subalge-bras of a full matrix algebra is considered. The security of the protocol depends on the difficulty of solving matrix equations XRY = T, with given matrices R and T. We give a polynomial time algorithm to solve XRY = T for the choice of certain types of subalgebras. We also compare the efficiency of the protocol with the Diffie-Hellman key exchange protocol on the key computation time and the key size.

The 2518 A/G Polymorphism in the MCP-1 Gene and Cancer Risk: A Meta-analysis

  • Jia, Liu-Qun;Shen, Yong-Chun;Guo, Shu-Jin;Hu, Qian-Jing;Pang, Cai-Shuang;Wang, Tao;Chen, Lei;Wen, Fu-Qiang
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.6
    • /
    • pp.3575-3579
    • /
    • 2013
  • Background: The 2518 A/G polymorphism in the MCP-1 gene has been extensively studied for association swith cancer; however, results from replication studies have been inconsistent. The aim of this investigation was to determine links with risk of cancer by meta-analysis. Methods: We searched Pubmed, Embase, CNKI, Weipu and Wanfang databases, covering all case-control studies until March, 2013. Statistical analyses were performed using the Revman 5.0 software. Results: A total of 11 case-control studies met our inclusion criteria, including 1,422 cases and 2,237 controls. The results indicated that the MCP-1 2518 gene polymorphism had no association with cancer risk overall (GG vs.GA+ AA: OR = 0.89, 95%CI = 0.61-1.28, P = 0.52). However, in the subgroup analysis by ethnicity, a decrease of cancer risk was found in Asian populations (GG vs.GA+ AA: OR = 0.79, 95%CI = 0.63-0.99, P = 0.04). Conclusion: This meta-analysis suggested that the 2518A/G polymorphism of MCP-1 gene is associated with risk of cancer among Asian, but not in Caucasian populations.

An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting

  • Lim, Meng-Hui;Goi, Bok-Min;Lee, Sang-Gon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.4
    • /
    • pp.822-839
    • /
    • 2011
  • Group key agreement protocols derive a shared secret key for a group of users to ensure data confidentiality or/and integrity among the users in the subsequent communications. In this paper, we inspect two group key agreement schemes which have been proposed by Shi et al. and Zheng et al. in 2005 and 2007 respectively. Although both schemes were claimed to be secure in a heuristic way, we reveal several flaws using the Bellare-Rogaway security model extended to multi-party setting by Bresson et al. These flaws are found to be originated from inappropriate selection of key derivation function, inadvertent exclusion of partners' identities from the protocol specification and insufficient consideration in preserving known temporary information security and key freshness properties. Furthermore, we suggest and discuss proper countermeasures to address such flaws.

Design and Performance Analysis of Queue-based Group Diffie-Hellman Protocol (QGDH)

  • Hong, Sunghyuck;Lee, Sungjin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.149-165
    • /
    • 2013
  • Current group key agreement protocols, which are often tree-based, have unnecessary delays that are caused when members with low-performance computer systems join a group key computation process. These delays are caused by the computations necessary to balance a key tree after membership changes. An alternate approach to group key generation that reduces delays is the dynamic prioritizing mechanism of queue-based group key generation. We propose an efficient group key agreement protocol and present the results of performance evaluation tests of this protocol. The queue-based approach that we propose is scalable and requires less computational overhead than conventional tree-based protocols.

Design and Performance Analysis of Queue-based Group Diffie-Hellman Protocol (QGDH)

  • Hong, Sunghyuck;Lee, Sungjin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1737-1753
    • /
    • 2013
  • Current group key agreement protocols, which are often tree-based, have unnecessary delays that are caused when members with low-performance computer systems join a group key computation process. These delays are caused by the computations necessary to balance a key tree after membership changes. An alternate approach to group key generation that reduces delays is the dynamic prioritizing mechanism of queue-based group key generation. We propose an efficient group key agreement protocol and present the results of performance evaluation tests of this protocol. The queue-based approach that we propose is scalable and requires less computational overhead than conventional tree-based protocols.

Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks

  • Mohaisen, Abedelaziz;Nyang, Dae-Hun;AbuHmed, Tamer
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.5
    • /
    • pp.222-238
    • /
    • 2008
  • In this paper, the random key pre-distribution scheme introduced in ACM CCS'02 by Eschenauer and Gligor is reexamined, and a generalized form of key establishment is introduced. As the communication overhead is one of the most critical constraints of any successful protocol design, we introduce an alternative scheme in which the connectivity is maintained at the same level as in the original work, while the communication overhead is reduced by about 40% of the original overhead, for various carefully chosen parameters. The main modification relies on the use of a two-level key pool design and two round assignment/key establishment phases. Further analysis demonstrates the efficiency of our modification.

Identification of a Novel Human Zinc Finger Gene, ZNF438, with Transcription Inhibition Activity

  • Zhong, Zhaomin;Wan, Bo;Qiu, Yun;Ni, Jun;Tang, Wenwen;Chen, Xinya;Yang, Yun;Shen, Suqin;Wang, Ying;Bai, Meirong;Lang, Qingyu;Yu, Long
    • BMB Reports
    • /
    • v.40 no.4
    • /
    • pp.517-524
    • /
    • 2007
  • There were many different families of zinc finger proteins that contained multiple cysteine and/or histidine residues and used zinc to stabilize their folds. The classical C2H2 zinc finger proteins were the founding members of this superfamily and were among the most abundant proteins in eukaryotic genomes. C2H2 proteins typically contained several C2H2 fingers that made tandem contacts along the DNA. Here we reported a novel C2H2 type zinc finger gene, ZNF438, which encoded 828 amino acids that formed five zinc finger domains. Bioinformatics analysis revealed that the ZNF438 was mapped to human chromosome 10p11.2 and shared 62% identity with rat and mouse homologues. RT-PCR analysis indicated that it was ubiquitously expressed in 18 human adult tissues. With immunofluorescence assay, it was shown that the exogenous Flag-tagged ZNF438 was located in nucleus of COS-7 cells. To further explore the function of ZNF438, we examined the transcriptional activity of ZNF438 protein by transfecting recombinant pM-ZNF438 into mammalian cells. The subsequent analysis based on the duel luciferase assay system showed that ZNF438 was a transcriptional repressor.

Tissues Expression, Polymorphisms Identification of FcRn Gene and Its Relationship with Serum Classical Swine Fever Virus Antibody Level in Pigs

  • Liu, Yang;Wang, Chonglong;Liu, Zhengzhu;Xu, Jingen;Fu, Weixuan;Wang, Wenwen;Ding, Xiangdong;Liu, Jianfeng;Zhang, Qin
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.25 no.8
    • /
    • pp.1089-1095
    • /
    • 2012
  • Neonatal Fc receptor (FcRn) gene encodes a receptor that binds the Fc region of monomeric immunoglobulin G (IgG) and is responsible for IgG transport and stabilization. In this report, the 8,900 bp porcine FcRn genomic DNA structure was identified and putative FcRn protein included 356 amino acids. Alignment and phylogenetic analysis of the porcine FcRn amino acid sequences with their homologies of other species showed high identity. Tissues expression of FcRn mRNA was detected by real time quantitative polymerase chain reaction (Q-PCR), the results revealed FcRn expressed widely in ten analyzed tissues. One single nucleotide polymorphism (SNP) (HQ026019:g.8526 C>T) in exon6 region of porcine FcRn gene was demonstrated by DNA sequencing analysis. A further analysis of SNP genotypes associated with serum Classical Swine Fever Virus antibody (anti-CSFV) concentration was performed in three pig populations including Large White, Landrace and Songliao Black pig (a Chinese indigenous breed). Our results of statistical analysis showed that the SNP had a highly significant association with the level of anti-CSFV antibody (At d 20; At d 35) in serum (p = 0.008; p = 0.0001). Investigation of expression and polymorphisms of the porcine FcRn gene will help us in further understanding the molecular basis of the antibody regulation pathway in the porcine immune response. All these results indicate that FcRn gene might be regarded as a molecular marker for genetic selection of anti-CSFV antibody level in pig disease resistance breeding programmes.