• Title/Summary/Keyword: Communication message

Search Result 1,629, Processing Time 0.025 seconds

A STUDY ON HASH FUNCTIONS

  • Yang, Jeong-Mo
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.13 no.2
    • /
    • pp.87-98
    • /
    • 2001
  • In this paper, we study hash function, which will take a message of arbitrary length and produce a massage digest of a specified size. The message digest will then be signed. We have to be careful that the use of a hash function h does not weaken the security of the signature scheme, for it is the message digest that is signed, not the message. It will be necessary for h to satisfy certain properties in order to prevent various forgeries. In order to prevent various type of attack, we require that hash function satisfy collision-free property. In section 1, we introduce some definitions and collision-free properties of hash function. In section 2, we study a discrete log hash function and introduce the main theorem as follows : Theorem Suppose $h:X{\rightarrow}Z$ is a hash function. For any $z{\in}Z$, let $$h^{-1}(z)={\lbrace}x:h(x)=z{\rbrace}$$ and denote $s_z={\mid}h^{-1}(z){\mid}$. Define $$N={\mid}{\lbrace}{\lbrace}x_1,x_2{\rbrace}:h(x_1)=h(x_2){\rbrace}{\mid}$$. Then (1) $\sum\limits_{z{\in}Z}s_z={\mid}x{\mid}$ and the mean of the $s_z$'s is $\bar{s}=\frac{{\mid}X{\mid}}{{\mid}Z{\mid}}$ (2) $N=\sum\limits_{z{\in}Z}{\small{s_z}}C_2=\frac{1}{2}\sum\limits_{z{\in}Z}S_z{^2}-\frac{{\mid}X{\mid}}{2}$. (2) $\sum\limits_{z{\in}Z}(S_z-\bar{s})^2=2N+{\mid}X{\mid}-\frac{{\mid}X{\mid}^2}{{\mid}Z{\mid}}$.

  • PDF

A Study of Mobile Phone Interface Module Development for DGPS (GDPS를 위한 휴대전화 Interface Module 개발에 관한 연구)

  • 김창수;윤희철;이태오;정성훈;임재홍
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.197-200
    • /
    • 2002
  • The current Inn technique is many problems that is permission of radio station using RF Wireless Modem, that is influence of geographic obstacle using radio wave, that is frequency interference, that is finiteness of frequency resources. In this paper, we are solved many elements, IM replaces RF Wireless Modem, we suggest transmission technique of correction message using mobile phone, we researched Interface Module development which is linkage of DGPS receiver and mobile phone. IM can transmit correction message passing RS-232 port and modem communication control. IM of base station is initialized RS-232 port and modem to move station for correction message transmission, IM waited response mode. IM of move station is initialized RS-232 port and modem, IM requests hand shaking to base station, completed connection establishment. Users are worked Differential surveying using receiving correction message between mobile phones.

  • PDF

An exploratory study of Aab alternative role: In consideration of environment level of engagement and message direction (Aad의 대안적 역할에 대한 탐색적 연구 : 환경 관여도와 메시지 방향성을 중심으로)

  • Park, Jin-Woo
    • Management & Information Systems Review
    • /
    • v.24
    • /
    • pp.97-124
    • /
    • 2008
  • This study aimed to explore how the involvement of environment influenced eight subjects group. Thus, experiment was performed to clarify the role that the attitude of university student consumer plays in the communication process depending on the level of engagement of consumer in the environment and method to raise donation for preservation of environment. Analyzing as per the type of appeal, the mark in altruistic appeal type was higher in all variables than egoistic appeal type. Finally, checking the average mark of each variable as per the condition of donation, the value in unconditional donation was higher than in all variables than conditional donation. It was found 3 groups composed of 2 groups with high level of environmental engagement and 1 group with low level of environmental engagement were suitable to double mediation model among the 8 experimental groups. The group where double mediation model best corresponds than any other group was high level related to environment and the group that contacts altruistic appeal and the message in the form of conditional donation. It was also found that the group that has low level of environmental engagement and contacts egoistic appeal type and conditional donation shows the group that corresponds to double mediation model in the second place among the 8 groups. Finally, it was found that the group that has high level of environmental engagement and is stimulated by altruistic appeal and unconditional donation corresponds to double mediation model. Depending on the condition of message stimulation, unconditional donation is found to better correspond to double mediation model than conditional donation. However, opposite phenomena is observed when the level of environmental engagement is high and appeal type is egoistic. Namely, it was found that conditional donation better corresponds to double mediation model than unconditional donation.

  • PDF

A Study on IISS Software Architecture of Combat Management System for improving modifiability

  • Park, Ji-Yoon;Yang, Moon-Seok;Lee, Dong-Hyeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.133-140
    • /
    • 2020
  • The IISS(Integrated Interface Storage System) software uses communication methods such as DSS(Data Sharing Service), UDP to perform the function of sending all messages from the Combat Management System to the analytical computer. Because IISS software handles all message used in the Combat Management System, the source code is large and has a highly dependent feature on message changes. Modification of software is a task that requires a lot of labor, such as series of software reliability test. so research has been conducted to reduce software development costs, including minimizing software modifications. In this paper, We study the method of messages receiving and architectural structure improvement to minimize reliance on message changes in the Combat Management System and improve the modifiability. Reduced message dependency by changing the way DSS and UDP protocols are communicated to Packet Sniffing. In addition, Factory Method Pattern were applied to improve the software design. Test comparing existing software and development elements have confirmed that the software has improved its modifiability and reuse.

A Study on Area-Efficient Design of Unified MD5 and HAS-160 Hash Algorithms (MD5 및 HAS-160 해쉬 알고리즘을 통합한 면적 효율적인 설계에 관한 연구)

  • Sonh, Seung-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.1015-1022
    • /
    • 2012
  • This paper deals with hardware design which unifies MD5 and HAS-160 hash algorithms. Two algorithms get a message with arbitrary length and process message blocks divided into 512 bits each time and output a hash code with a fixed length. MD5 ouputs a hash code of 128 bits and HAS-160 a hash code of 160 bits. The unified hash core designed has 32% of slices overhead compared to HAS-160 core. However, there is only a fixed message buffer space used. The unified hash core which run a step in one clock cycle operates at 92MHz and has performance which digests a message in the speed of 724Mbps at MD5 and 581Mbps at HAS-160 hash mode. The unified hash core which is designed can be applicable to the areas such as E-commerce, data integrity and digital signature.

A Message Authentication Scheme for V2V message based on RSSI with anonymity (익명성을 제공하는 RSSI기반 V2V 메시지 인증기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.207-212
    • /
    • 2011
  • Vehicular Ad Hoc Network(VANET) is a communication technology between vehicles and vehicles(V2V) or vehicles and infrastructures(V2I) for offering a number of practical applications. Considering the importance of communicated information through VANET, data authentication, confidentiality and integrity are fundamental security elements. Recently, to enhance a security of VANET in various circumstances, message authentication is widely researched by many laboratories. Among of them, Zhang. et. al. is an efficient method to authenticate the message with condition of anonymity in dense space. In the scheme, to obtain the vehicular ID with condition of anonymity, the k-anonymity is used. However it has a disadvantage, which conducts hash operations in case of determining the vehicular ID. In the paper, we present a location based algorithm using received signal strength for the location based authentication and encryption technique as well, and to enhance the accuracy of algorithm we apply a location determination technique over the 3-dimensional space.

Efficient Message Authentication Scheme for VANET (차량 애드혹 네트워크 환경에서 효율적인 메시지 인증 기법)

  • Yoo, Young-Jun;Lee, Jun-Ho;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.37-47
    • /
    • 2009
  • In VANET, each vehicle can obtain traffic information from other vehicles or infrastructure, and they frequently exchange life-critical safety message. Therefore, it is necessary among vehicles to establish a secure channel for keeping the driver's safe and protecting the channel against several attack challenges. TSVC is a representative scheme which needs low communication and computation to be performed. But, there is a delay when verifying the messages because it is designed based on TESLA. Thus, it is not acceptable to use TSVC for sending the time-critical messages. In this paper, we propose a novel message authentication scheme which reduces a delay for the verification of messages. Therefore, the proposed scheme can be suitable to transmitting time-critical messages. Furthermore, the scheme supports to privacy preservation and can robust against DoS attacks.

Moderating Effect on Transportation Between Short Storytelling ad types and Message Sensation Value: Focusing on TikTok & Chinese consumers (짧은 동영상 광고 스토리텔링 유형과 메시지자극가(MSV)가 스토리몰입에 미치는 영향연구 - 틱톡(TikTok) 중국소비자를 대상으로)

  • CHEN, KAKA;Kim, Jung Kyu
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.659-665
    • /
    • 2021
  • Short video applications (e.g., TikTok, YouTube shorts) are growing quickly in terms of active users and usage time. Of course, advertising industry is utilizing the app as AD channel. The current study, however, argues that the effectiveness of ADs in short video apps are not articulated well and that precise research for measuring the effect is required. In this context, this study measured the effects of storytelling ad types(reality, parody, creative) and message sensation value(high vs. low level) on story transportation. The notable finding is that when creative storytelling ad type which requires more cognitive resources than other two types meets high level of message sensation value, ad viewers could reach cognitive overload state which induced low effectiveness of ad. As its result, the effectiveness of AD reduced. More specific theoretical discussion and suggestions for advertising producers are described.

Development of Message Broker-Based Real-Time Control Method for Road Traffic Safety Facilities Equipment and Devices Integrated Management System

  • JeongHo Kho;Eum Han
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.195-209
    • /
    • 2024
  • The current road traffic signal controller developed in the 1990s has limitations in flexibility and scalability due to power supply problems, various communication methods, and hierarchical black box structures for various equipment and devices installed to improve traffic safety for road users and autonomous cooperative driving. In this paper, we designed a road traffic safety facilities equipment and devices integrated management system that can cope with the rapidly changing future traffic environment by solving the using direct current(DC) and power supply problem through the power over ethernet(PoE) technology and centralized data-driven control through message broker technology. In addition, a data-driven real-time control method for road traffic safety facilities equipment and devices operating based on time series data was implemented and verified.

HF Data Communication Service Using SSB Modems for Maritime Applications (SSB 모뎀을 이용한 해상용 HF 데이터 통신 서비스)

  • Choo, Young-Yeol;Jung, Da-Un
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.12
    • /
    • pp.2549-2554
    • /
    • 2011
  • This paper describes on development of integrated interface and applications to support stable digital data communication service for small and midium sized crafts exploiting SSB modems and HF wireless sets. Firstly, integrated interface module between GPS (Global Positioning System) and communication devices was developed. Secondly, maritime map was implemented into a display terminal to provide location tracking service and voyage planning function. In addition, condition monitoring service of crafts and fishing report functions as well as alarm functions were developed to support secure fishery. Results of performance measure on developed application services shows that error rate was less than 3% and communication delay was shorter than 1 second when a message length was less than 1 Kbyte along with one-to-many communication type.