• 제목/요약/키워드: Deterministic Algorithm

검색결과 330건 처리시간 0.034초

결정론적인 소수 생성에 관한 연구 (A Deterministic Method of Large Prime Number Generation)

  • 박중길;박봉주;백기영;천왕성;류재철
    • 한국정보처리학회논문지
    • /
    • 제7권9호
    • /
    • pp.2913-2919
    • /
    • 2000
  • 비대칭 암호 알고리즘을 설계하는 데 있어서 매우 큰 소수를 구하는 것은 필수적이다. 그러나 지금까지는 결정론적인(deterministic) 큰 소수를 발견하기는 매우 어려웠기 때문에, 일반적으로 확률적으로 소수일 가능성이 높은 의사소수(psedoprime)를 비대칭 암호 알고리즘에서 사용하였다. 이 논문에서 결정론적인 소수 생성 방법을 제안하며, 제안된 방법에 의해 생성된 소수는 증명이 가능한 100% 정확한 소수이다. 또한 이 방법에 의해 생성된 소수는 신뢰성, 비도, 원시원소(primitive element)생성 능력 등을 보장한다.

  • PDF

통신채널 할당 최적화 규칙 (An Optimization Rule for Channel Assignment Problem (CAP))

  • 이상운
    • 한국컴퓨터정보학회논문지
    • /
    • 제18권6호
    • /
    • pp.37-45
    • /
    • 2013
  • 통신채널 최적 할당 문제는 아직까지 결정론적 규칙이 알려지지 않고 있어 비결정론적 방법인 휴리스틱 알고리즘으로 대부분 해를 구하고 있다. 본 논문은 통신채널 최적 할당 문제에 대해 결정론적 방법으로 채널 배정을 할 수 있음을 보인다. 채널 배정 규칙을 적용하여 필라델피아의 9개 사례에 대해 적용한 결과 최적해를 구하였다.

Ensuring Data Confidentiality and Privacy in the Cloud using Non-Deterministic Cryptographic Scheme

  • John Kwao Dawson;Frimpong Twum;James Benjamin Hayfron Acquah;Yaw Missah
    • International Journal of Computer Science & Network Security
    • /
    • 제23권7호
    • /
    • pp.49-60
    • /
    • 2023
  • The amount of data generated by electronic systems through e-commerce, social networks, and data computation has risen. However, the security of data has always been a challenge. The problem is not with the quantity of data but how to secure the data by ensuring its confidentiality and privacy. Though there are several research on cloud data security, this study proposes a security scheme with the lowest execution time. The approach employs a non-linear time complexity to achieve data confidentiality and privacy. A symmetric algorithm dubbed the Non-Deterministic Cryptographic Scheme (NCS) is proposed to address the increased execution time of existing cryptographic schemes. NCS has linear time complexity with a low and unpredicted trend of execution times. It achieves confidentiality and privacy of data on the cloud by converting the plaintext into Ciphertext with a small number of iterations thereby decreasing the execution time but with high security. The algorithm is based on Good Prime Numbers, Linear Congruential Generator (LGC), Sliding Window Algorithm (SWA), and XOR gate. For the implementation in C, thirty different execution times were performed and their average was taken. A comparative analysis of the NCS was performed against AES, DES, and RSA algorithms based on key sizes of 128kb, 256kb, and 512kb using the dataset from Kaggle. The results showed the proposed NCS execution times were lower in comparison to AES, which had better execution time than DES with RSA having the longest. Contrary, to existing knowledge that execution time is relative to data size, the results obtained from the experiment indicated otherwise for the proposed NCS algorithm. With data sizes of 128kb, 256kb, and 512kb, the execution times in milliseconds were 38, 711, and 378 respectively. This validates the NCS as a Non-Deterministic Cryptographic Algorithm. The study findings hence are in support of the argument that data size does not determine the execution.

Attitude Control of Planar Space Robot based on Self-Organizing Data Mining Algorithm

  • Kim, Young-Woo;Matsuda, Ryousuke;Narikiyo, Tatsuo;Kim, Jong-Hae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.377-382
    • /
    • 2005
  • This paper presents a new method for the attitude control of planar space robots. In order to control highly constrained non-linear system such as a 3D space robot, the analytical formulation for the system with complex dynamics and effective control methodology based on the formulation, are not always obtainable. In the proposed method, correspondingly, a non-analytical but effective self-organizing modeling method for controlling a highly constrained system is proposed based on a polynomial data mining algorithm. In order to control the attitude of a planar space robot, it is well known to require inputs characterized by a special pattern in time series with a non-deterministic length. In order to correspond to this type of control paradigm, we adopt the Model Predictive Control (MPC) scheme where the length of the non-deterministic horizon is determined based on implementation cost and control performance. The optimal solution to finding the size of the input pattern is found by a solving two-stage programming problem.

  • PDF

부분적 분산형 수동적 중복 알고리즘 (Partially Decentralized Passive Replication Algorithm)

  • 안진호
    • 정보처리학회논문지A
    • /
    • 제12A권6호
    • /
    • pp.507-514
    • /
    • 2005
  • 본 논문에서는 메시지 전달 분산시스템서 결정적 서버를 위한 부분적 분산형 수동적 중복 알고리즘을 제안한다. 이 알고리즘은 반드시 주 서버가 아니더라도 임의의 보조서버가 자신이 수신한 클라이언트 요구에 대해 서버로부터 그 요구의 전달일련번호를 얻은 후, 그 보조서버가 직접 해당 요구를 처리하고, 이에 대한 다른 중복 서버들과의 조정에 대한 책임자 역할을 수행할 수 있도록 한다. 이러한 바람직한 특성 때문에, 제안된 알고리즘이 기존의 부하균등 기법과 결합된다면, 주 서버에의 급격한 부하 발생을 효율적으로 피할 수 있다. 따라서, 이 알고리즘은 기존의 수동적 중복 알고리즘보다 결정적 중복 서버 시스템에 대한 높은 확장성을 제공할 수 있다. 본 논문에서 수행한 시뮬레이션에서 기존 알고리즘에 비해 제안한 알고리즘이 클라이언트 요구 당 평균응답시간을 $16.5\%{\~}52.3\%$까지 줄일 수 있다는 것을 보여준다.

GF($2^n$) 위에서의 다항식 일수분해 (The polynomial factorization over GF($2^n$))

  • 김창한
    • 정보보호학회논문지
    • /
    • 제9권3호
    • /
    • pp.3-12
    • /
    • 1999
  • 공개키 암호법은 정수 인수분해의 어려움에 바탕을 둔 RSA와 이산대수문제의 어려움에 근거한 EIGamal 암호법을 대표된다. GF(qn)*에서 index-calculus 이산대수 알고리즘을 다항식 인수분해를 필요로 한다. 최근에 Niederreiter에 의하여 유한체위에서의 다항식 인수분해 알고리즘이 제안되었다. 이 논문에서는 정규기저(normal basis)를 이용한 유한체의 연산을 c-언어로 구현하고, 이것을 이용한 Niederreiter의 알고리즘을 기반으로 유한체위에서의 다항식 인수분해 알고리즘과 구현한 결과를 제시한다. The public key crytptosystem is represented by RSA based on the difficulty of integer factorization and ElGamal cryptosystem based on the intractability of the discrete logarithm problem in a cyclic group G. The index-calculus algorithm for discrete logarithms in GF(qn)* requires an polynomial factorization. The Niederreiter recently developed deterministic facorization algorithm for polynomial over GF(qn) In this paper we implemented the arithmetic of finite field with c-language and gibe an implementation of the Niederreiter's algorithm over GF(2n) using normal bases.

스마트 TMD 제어를 위한 강화학습 알고리즘 성능 검토 (Performance Evaluation of Reinforcement Learning Algorithm for Control of Smart TMD)

  • 강주원;김현수
    • 한국공간구조학회논문집
    • /
    • 제21권2호
    • /
    • pp.41-48
    • /
    • 2021
  • A smart tuned mass damper (TMD) is widely studied for seismic response reduction of various structures. Control algorithm is the most important factor for control performance of a smart TMD. This study used a Deep Deterministic Policy Gradient (DDPG) among reinforcement learning techniques to develop a control algorithm for a smart TMD. A magnetorheological (MR) damper was used to make the smart TMD. A single mass model with the smart TMD was employed to make a reinforcement learning environment. Time history analysis simulations of the example structure subject to artificial seismic load were performed in the reinforcement learning process. Critic of policy network and actor of value network for DDPG agent were constructed. The action of DDPG agent was selected as the command voltage sent to the MR damper. Reward for the DDPG action was calculated by using displacement and velocity responses of the main mass. Groundhook control algorithm was used as a comparative control algorithm. After 10,000 episode training of the DDPG agent model with proper hyper-parameters, the semi-active control algorithm for control of seismic responses of the example structure with the smart TMD was developed. The simulation results presented that the developed DDPG model can provide effective control algorithms for smart TMD for reduction of seismic responses.

Construction Algorithm of Grassmann Space Parameters in Linear Output Feedback Systems

  • Kim Su-Woon
    • International Journal of Control, Automation, and Systems
    • /
    • 제3권3호
    • /
    • pp.430-443
    • /
    • 2005
  • A general construction algorithm of the Grassmann space parameters in linear systems - so-called, the Plucker matrix, 'L' in m-input, p-output, n-th order static output feedback systems and the Plucker matrix, $'L^{aug}'$ in augmented (m+d)-input, (p+d)-output, (n+d)-th order static output feedback systems - is presented for numerical checking of necessary conditions of complete static and complete minimum d-th order dynamic output feedback pole-assignments, respectively, and also for discernment of deterministic computation condition of their pole-assignable real solutions. Through the construction of L, it is shown that certain generically pole-assignable strictly proper mp > n system is actually none pole-assignable over any (real and complex) output feedbacks, by intrinsic rank deficiency of some submatrix of L. And it is also concretely illustrated that this none pole-assignable mp > n system by static output feedback can be arbitrary pole-assignable system via minimum d-th order dynamic output feedback, which is constructed by deterministic computation under full­rank of some submatrix of $L^{aug}$.

퍼지 K-최장공정기법을 이용한 공정관리모형 개발에 관한 연구 (A Study on the Development of Progress Control Algorithm Using the Fuzzy K-longest Path Algorithm)

  • 신동호;김충영
    • 한국경영과학회지
    • /
    • 제18권2호
    • /
    • pp.23-43
    • /
    • 1993
  • This paper employs fuzzy variables instead of deterministic variables for job times in a project network. A fuzzy variable has its value restricted by a possibility distribution. This paper utilizes the triangular possibility distribution which has three estimated times. That is normal, resonable, and crash job times. This paper develops a fuzzy k-longest path algorithm, by utilizing the k-longest path algorithm. This algorithm will be useful to control the project the project network by considering the project completion possibility.

  • PDF

On IPv6 Traceback using Deterministic Packet Marking

  • Amin, Syed Obaid;Hong, Choong-Seon;Kim, Il-Joong
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2005년도 추계학술발표대회 및 정기총회
    • /
    • pp.977-980
    • /
    • 2005
  • The motivation of IP traceback is to identify the true source of an IP datagram in internet. These techniques now emerging as effective deterrent for current cyber threats, especially (D)DoS. Deterministic Packet Marking (DPM) is one of the algorithm used for IP traceback. This paper elucidates the implementation of deterministic packet marking scheme on IPv6 networks. The proposed scheme is capable of single packet traceback. We also examined the issues regarding IPv6 header and show that this scheme is practical, scalable, efficient and can be implemented on existing IPv6 networks easily.

  • PDF