• 제목/요약/키워드: Asymmetric Key

검색결과 170건 처리시간 0.03초

Optical Asymmetric Cryptography Modifying the RSA Public-key Protocol

  • Jeon, Seok Hee;Gil, Sang Keun
    • Current Optics and Photonics
    • /
    • 제4권2호
    • /
    • pp.103-114
    • /
    • 2020
  • A new optical asymmetric cryptosystem is proposed by modifying the asymmetric RSA public-key protocol required in a cryptosystem. The proposed asymmetric public-key algorithm can be optically implemented by combining a two-step quadrature phase-shifting digital holographic encryption method with the modified RSA public-key algorithm; then two pairs of public-private keys are used to encrypt and decrypt the plaintext. Public keys and ciphertexts are digital holograms that are Fourier-transform holograms, and are recorded on CCDs with 256-gray-level quantized intensities in the optical architecture. The plaintext can only be decrypted by the private keys, which are acquired by the corresponding asymmetric public-key-generation algorithm. Schematically, the proposed optical architecture has the advantage of producing a complicated, asymmetric public-key cryptosystem that can enhance security strength compared to the conventional electronic RSA public-key cryptosystem. Numerical simulations are carried out to demonstrate the validity and effectiveness of the proposed method, by evaluating decryption performance and analysis. The proposed method shows feasibility for application to an asymmetric public-key cryptosystem.

Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol

  • Wei, Guiyi;Yang, Xianbo;Shao, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권12호
    • /
    • pp.3352-3365
    • /
    • 2012
  • Group key agreement (GKA) is a cryptographic primitive allowing two or more users to negotiate a shared session key over public networks. Wu et al. recently introduced the concept of asymmetric GKA that allows a group of users to negotiate a common public key, while each user only needs to hold his/her respective private key. However, Wu et al.'s protocol can not resist active attacks, such as fabrication. To solve this problem, Zhang et al. proposed an authenticated asymmetric GKA protocol, where each user is authenticated during the negotiation process, so it can resist active attacks. Whereas, Zhang et al.'s protocol needs a partially trusted certificate authority to issue certificates, which brings a heavy certificate management burden. To eliminate such cost, Zhang et al. constructed another protocol in identity-based setting. Unfortunately, it suffers from the so-called key escrow problem. In this paper, we propose the certificateless authenticated asymmetric group key agreement protocol which does not have certificate management burden and key escrow problem. Besides, our protocol achieves known-key security, unknown key-share security, key-compromise impersonation security, and key control security. Our simulation based on the pairing-based cryptography (PBC) library shows that this protocol is efficient and practical.

A FAST ASYMMETRIC KEY ENCRYPTION ALGORITHM FOR BULK DATA

  • Shin, Sang-Uk;Rhee, Kyung-Hyune
    • Journal of applied mathematics & informatics
    • /
    • 제8권3호
    • /
    • pp.943-957
    • /
    • 2001
  • In this paper, we propose an efficient encryption algorithm, without exchanging session keys of a symmetric cryptosystem. The proposed scheme, called as the FAKE(Fast Asymmetric Key Encryption), first scrambles an entire input message and then encrypts small parts of the scrambled message using an asymmetric key encryption scheme. We use the all-or-nothing transform based on the hash function as a scrambling function, which was proposed by Shin, et al. Furthermore, the proposed scheme can additionally provide a digital signature service with only small overhead.

Asymmetric Public Key Cryptography by Using Logic-based Optical Processing

  • Gil, Sang Keun
    • Journal of the Optical Society of Korea
    • /
    • 제20권1호
    • /
    • pp.55-63
    • /
    • 2016
  • In this paper, a new asymmetric public key cryptography based on the modified RSA algorithm is proposed by using logic-based optical processing. The proposed asymmetric public key algorithm is realized into an optical schematic, where AND, OR and XOR logic operations are implemented by using free space digital optics architecture. Schematically, the proposed optical configuration has an advantage of generating the public keys simultaneously. Another advantage is that the suggested optical setup can also be used for message encryption and decryption by simply replacing data inputs of SLMs in the optical configuration. The last merit is that the optical configuration has a 2-D array data format which can increase the key length easily. This can provide longer 2-D key length resulting in a higher security cryptosystem than the conventional 1-D key length cryptosystem. Results of numerical simulation and differential cryptanalysis are presented to verify that the proposed method shows the effectiveness in the optical asymmetric cryptographic system.

대칭형 인증 및 키 교환 프로토콜을 이용한 비대칭형 프로토콜의 설계 기법 (Method to Obtain Asymmetric Authenticated Key Exchange Protocols from Symmetric Ones)

  • 양대헌
    • 한국정보과학회논문지:정보통신
    • /
    • 제31권2호
    • /
    • pp.179-187
    • /
    • 2004
  • 대칭형 패스워드 기반의 인증 및 키교환 프로토콜은 비대칭형 프로토콜보다 설계, 분석, 효율면에서 더 좋은 성질을 가진다. 하지만, 인증 서버가 공격당하는 경우 대칭형 인증 프로토콜은 쉽게 사용자의 패스워드가 노출된다. 비대칭형의 안전성 증명을 가지는 PAK-X나 SNAPI-X같은 프로토콜이 제안되었지만, Diffie-Hellman 키교환에 비해 많은 연산을 필요로 하고 있다. 이 논문에서는 패스워드 기반의 대칭형 인중 및 키교환 프로토콜을 비대칭형 프로토콜로 변환하는 효율적인 방법을 제시한다.

Experimental study on the asymmetric impact loads and hydroelastic responses of a very large container ship

  • Lin, Yuan;Ma, Ning;Gu, Xiechong;Wang, Deyu
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • 제12권1호
    • /
    • pp.226-240
    • /
    • 2020
  • This paper presents an experimental investigation of asymmetric impact effects on hydroelastic responses. A 1:64 scaled segmented ship model with U-shape open cross-section backbone was newly designed to meet elastic similarity conditions of vertical, horizontal and torsional stiffness simultaneously. Different wave heading angles and wavelengths were adopted in regular wave test. In head wave condition, parametric rolling phenomena happened along with asymmetric slamming forces, the relationship between them was disclosed at first time. The impact forces on starboard and port sides showed alternating asymmetric periodic changes. In oblique wave condition, nonlinear springing and whipping responses were found. Since slamming phenomena occurred, high-frequency bending moments became an important part in total bending moments and whipping responses were found in small wavelength. The wavelength and head angle are varied to elucidate the relationship of springing/whipping loads and asymmetric impact. The distributions of peaks of horizontal and torsional loads show highly asymmetric property.

Analysis of Laser-protection Performance of Asymmetric-phase-mask Wavefront-coding Imaging Systems

  • Yangliang, Li;Qing, Ye;Lei, Wang;Hao, Zhang;Yunlong, Wu;Xian'an, Dou;Xiaoquan, Sun
    • Current Optics and Photonics
    • /
    • 제7권1호
    • /
    • pp.1-14
    • /
    • 2023
  • Wavefront-coding imaging can achieve high-quality imaging along with a wide range of defocus. In this paper, the anti-laser detection and damage performance of wavefront-coding imaging systems using different asymmetric phase masks are studied, through modeling and simulation. Based on FresnelKirchhoff diffraction theory, the laser-propagation model of the wavefront-coding imaging system is established. The model uses defocus distance rather than wave aberration to characterize the degree of defocus of an imaging system. Then, based on a given defocus range, an optimization method based on Fisher information is used to determine the optimal phase-mask parameters. Finally, the anti-laser detection and damage performance of asymmetric phase masks at different defocus distances and propagation distances are simulated and analyzed. When studying the influence of defocus distance, compared to conventional imaging, the maximum single-pixel receiving power and echo-detection receiving power of asymmetric phase masks are reduced by about one and two orders of magnitude respectively. When exploring the influence of propagation distance, the maximum single-pixel receiving power of asymmetric phase masks decreases by about one order of magnitude and remains stable, and the echodetection receiving power gradually decreases with increasing propagation distance, until it approaches zero.

공개키 공격에 안전한 비대칭 워터마킹 (A Secure Asymmetric Watermarking to the Public Key Attack)

  • 이덕;김종원;최종욱
    • 한국컴퓨터정보학회논문지
    • /
    • 제13권7호
    • /
    • pp.173-180
    • /
    • 2008
  • 본 논문에서는 공개키 공격에 안전한 비대칭 워터마킹 시스템을 구성하기 위하여 효과적인 공개 키 및 개인 키 생성 알고리즘을 제안한다. 공개 키와 개인 키의 생성은 특수행렬을 이용한 선형변환 방식에 기초하였으며 높은 상관도 검출이 가능하도록 구성되었다 또 공개 키 공격에 대한검증과 검출을 위한 공개 키를 추가로 생성하여 분배하는 방안을 제안하여 특정된 환경에서 공개 키 공격에 효과적으로 대응하도록 하였다. 실험결과 워터마크가 삼입된 영상에서 공개 키 및 개인 키를 이용하여 효과적으로 높은 상관도 검출을 할 수 있었으며 공개 키 공격을 받은 영상에서 추가로 발급된 검증용 공개 키를 이용하여 효과적으로 상관도 검출을 할 수 있음을 확인하였다.

  • PDF

인증기능을 가진 혼합형 암호시스템 설계 (Hybrid Cryptosystem Design with Authentication)

  • 이선근;김영일;고영욱;송재호;김환용
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 하계종합학술대회 논문집(2)
    • /
    • pp.341-344
    • /
    • 2002
  • The importance of protection for information is increasing by the rapid development of information communication and network. Asymmetric crypto-system is the mainstream in encryption system rather than symmetric cryptosystem by above reasons. But asymmetric cryptosystem is restricted in applying to application fields by the reason it takes more times to process than symmetric cryptosystem. In this paper, the proposed cryptosystem uses an algorithm that combines block cipherment with stream ciphcrment. Proposed cryptosystem has a high stability in aspect of secret rate by means of transition of key sequence according to the information of plaintext while asymmetric /symmetric cryptosystern conducts encipherment/decipherment using a fixed key Consequently, it is very difficult to crack although unauthenticator acquires the key information. So, the proposed encryption system which has a certification function of asymmetric cryptosystcm and a processing time equivalent to symmetric cryptosystcm will be highly useful to authorize data or exchange important information.

  • PDF

Reevaluating the overhead of data preparation for asymmetric multicore system on graphics processing

  • Pei, Songwen;Zhang, Junge;Jiang, Linhua;Kim, Myoung-Seo;Gaudiot, Jean-Luc
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권7호
    • /
    • pp.3231-3244
    • /
    • 2016
  • As processor design has been transiting from homogeneous multicore processor to heterogeneous multicore processor, traditional Amdahl's law cannot meet the new challenges for asymmetric multicore system. In order to further investigate the impact factors related to the Overhead of Data Preparation (ODP) for Asymmetric multicore systems, we evaluate an asymmetric multicore system built with CPU-GPU by measuring the overheads of memory transfer, computing kernel, cache missing and synchronization. This paper demonstrates that decreasing the overhead of data preparation is a promising approach to improve the whole performance of heterogeneous system.