• Title/Summary/Keyword: Elliptic system

Search Result 288, Processing Time 0.025 seconds

ECC-based IPTV Service Key Establishment Protocol With User Attribute (사용자 속성을 이용한 ECC 기반의 IPTV 서비스 키 설립 프로토콜)

  • Jeong, Yoon-Su;Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.105-111
    • /
    • 2012
  • Internet Protocol Television (IPTV) through broadband cable network is a subscriber-based system which consists of software and set-top box. However, a weakness for the current IPTV system is the lack of security between users and CAS. This paper proposes a user authentication protocol at STB, which limits the service by the user-valued attribute to prevent illegal IPTV users. User attribute values change the order with bit form according to the certain rule, and apply to one-way hash function and Diffie-Hellman's elliptic curve key-exchange algorithm. The proposed protocol is able to improve on user authentication and computation. Also, each user generates an authentication message by smart card and receives various services based on the user-valued attribute.

An Enhanced Mutual Key Agreement Protocol for Mobile RFID-enabled Devices

  • Mtoga, Kambombo;Yoon, Eun-Jun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.1
    • /
    • pp.65-71
    • /
    • 2012
  • Mobile RFID is a new application that uses a mobile phone as an RFID reader with wireless technology and provides a new valuable service to users by integrating RFID and ubiquitous sensor network infrastructures with mobile communication and wireless Internet. Whereas the mobile RFID system has many advantages, privacy violation problems on the reader side are very concerning to individuals and researchers. Unlike in regular RFID environments, where the communication channel between the server and reader is assumed to be secure, the communication channel between the backend server and the RFID reader in the mobile RFID system is not assumed to be safe. Therefore it has become necessary to devise a new communication protocol that secures the privacy of mobile RFID-enabled devices. Recently, Lo et al. proposed a mutual key agreement protocol that secures the authenticity and privacy of engaged mobile RFID readers by constructing a secure session key between the reader and server. However, this paper shows that this protocol does not meet all of the necessary security requirements. Therefore we developed an enhanced mutual key agreement protocol for mobile RFID-enabled devices that alleviates these concerns. We further show that our protocol can enhance data security and provide privacy protection for the reader in an unsecured mobile RFID environment, even in the presence of an active adversary.

  • PDF

An exosolar planetary system N-body simulator II

  • Hong, ChaeLin;van Putten, Maurice
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.43 no.1
    • /
    • pp.46.3-47
    • /
    • 2018
  • We present a general N-body exasolar system simulator in anticipation of upcoming searches for exoplanets and even exomoons by next generation telescopes such as James Webb Space Telescope. For habitable zones, traditionally defined by temperature, we here address the essential problem of dynamical stability of planetary orbits. Illustrative examples are presented on P-type orbits in stellar binary systems, that should be fairly common as in Kepler 16b. Specific attention is paid to reduced orbital lifetimes of exoplanets in the habitable zone by the stellar binary, that is propoesed by Maurice van Putten (2017). Especially, we focused on a classic work of complex three-body problem that is well known by Dvorak(1986). We charge his elliptic restricted three-body problem to extend unrestricted three-body problem to look into dynamical motions in view of circumbinary planet, furthermore, we suggest that opposite angular orientation of the planet is relative to the stability of orbits. In here, counter-rotation case is relatively more faster than co-rotation case for being stable. As a result, we find that various initial conditions and thresholds to approach dynamical stability and unstability with unexpectable isolated islands over enormous parameter space. Even, superkeplerian effect of binary is important to habitability of the exoplanet and we can verify that superfaster binary doesn't effect on th planet and increases survivality of planet around the binary.

  • PDF

An Efficient Security Protocol for Transaction in Mobile Data Network (모바일 데이터 망에서의 거래를 위한 효율적인 보안 프로토콜)

  • Kim, Jang-Hwan;Rhee, Chung-Sei
    • Convergence Security Journal
    • /
    • v.6 no.2
    • /
    • pp.43-51
    • /
    • 2006
  • The existing electronic transaction protocol uses a cryptography algorithm that is not suitable for mobile environment because of limited memory and process ability. In this paper, we propose an efficient transaction protocol suitable for mobile embedded system. The proposed protocol reduces computation and process time by using ID-based cryptography algorithm and ECC (elliptic curve cryptosystem). It uses vendor authentication only in the first transaction, and from the second transaction, it requires transaction after authentication with session created by applying ECC technique. Therefore, the creation number of authentication for the vendor can be reduced from n to one. And it reduces process time because it provides the same security with 160 bits as with 1024 bits of RSA.

  • PDF

EXISTENCE OF POSITIVE SOLUTIONS FOR A CLASS OF QUASILINEAR ELLIPTIC SYSTEM WITH CONCAVE-CONVEX NONLINEARITIES

  • Yin, Honghui;Yang, Zuodong
    • Journal of applied mathematics & informatics
    • /
    • v.29 no.3_4
    • /
    • pp.921-936
    • /
    • 2011
  • In this paper, our main purpose is to establish the existence of weak solutions of a weak solutions of a class of p-q-Laplacian system involving concave-convex nonlinearities: $$\{\array{-{\Delta}_pu-{\Delta}_qu={\lambda}V(x)|u|^{r-2}u+\frac{2{\alpha}}{\alpha+\beta}|u|^{\alpha-2}u|v|^{\beta},\;x{\in}{\Omega}\\-{\Delta}p^v-{\Delta}q^v={\theta}V(x)|v|^{r-2}v+\frac{2\beta}{\alpha+\beta}|u|^{\alpha}|v|^{\beta-2}v,\;x{\in}{\Omega}\\u=v=0,\;x{\in}{\partial}{\Omega}}$$ where ${\Omega}$ is a bounded domain in $R^N$, ${\lambda}$, ${\theta}$ > 0, and 1 < ${\alpha}$, ${\beta}$, ${\alpha}+{\beta}=p^*=\frac{N_p}{N_{-p}}$ is the critical Sobolev exponent, ${\Delta}_su=div(|{\nabla}u|^{s-2}{\nabla}u)$ is the s-Laplacian of u. when 1 < r < q < p < N, we prove that there exist infinitely many weak solutions. We also obtain some results for the case 1 < q < p < r < $p^*$. The existence results of solutions are obtained by variational methods.

Robot Target Tracking Method using a Structured Laser Beam (레이저 구조광을 이용한 로봇 목표 추적 방법)

  • Kim, Jong Hyeong;Koh, Kyung-Chul
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.12
    • /
    • pp.1067-1071
    • /
    • 2013
  • A 3D visual sensing method using a laser structured beam is presented for robotic tracking applications in a simple and reliable manner. A cylindrical shaped laser structured beam is proposed to measure the pose and position of the target surface. When the proposed laser beam intersects on the surface along the target trajectory, an elliptic pattern is generated. Its ellipse parameters can be induced mathematically by the geometrical relationship of the sensor coordinate and target coordinate. The depth and orientation of the target surface are directly determined by the ellipse parameters. In particular, two discontinuous points on the ellipse pattern, induced by seam trajectory, indicate mathematically the 3D direction for robotic tracking. To investigate the performance of this method, experiments with a 6 axis robot system are conducted on two different types of seam trajectories. The results show that this method is very suitable for robot seam tracking applications due to its excellence in accuracy and efficiency.

DRASTIC IMPROVEMENT OF THERMAL EFFICIENCY BY RAPID PISTON-MOVEMENT NEAR TDC

  • Moriyoshi, Y.;Sano, M.;Morikawa, K.;Kaneko, M.
    • International Journal of Automotive Technology
    • /
    • v.7 no.3
    • /
    • pp.295-301
    • /
    • 2006
  • A new combustion method of high compression ratio SI engine was studied and proposed in order to achieve high thermal efficiency, comparable to that of CI engine. Compression ratio of SI engine is generally restricted by the knocking phenomena. A combustion chamber profile and a cranking mechanism were studied to avoid knocking with high compression ratio. Because reducing the end-gas temperature will suppress knocking, a combustion chamber was considered to have a wide surface at the end-gas region. However, wide surface will lead to large heat loss, which may cancel the gain of higher compression ratio operation. Thereby, a special cranking mechanism was adapted which allowed the piston to move rapidly near TDC. Numerical simulations were performed to optimize the cranking mechanism for achieving high thermal efficiency. An elliptic gear system and a leaf-shape gear system were employed in numerical simulations. Livengood-Wu integral, which is widely used to judge knocking occurrence, was calculated to verify the effect for the new concept. As a result, this concept can be operated at compression ratio of fourteen using a regular gasoline. A new single cylinder engine with compression ratio of twelve and TGV(Tumble Generation Valve) to enhance the turbulence and combustion speed was designed and built for proving its performance. The test results verified the predictions. Thermal efficiency was improve over 10% with compression ratio of twelve compared to an original engine with compression ratio of ten when strong turbulence was generated using TGV, leading to a fast combustion speed and reduced heat loss.

Efficient Fault Injection Attack to the Miller Algorithm in the Pairing Computation using Affine Coordinate System (아핀좌표를 사용하는 페어링 연산의 Miller 알고리듬에 대한 효과적인 오류주입공격)

  • Bae, Ki-Seok;Park, Jea-Hoon;Sohn, Gyo-Yong;Ha, Jae-Cheol;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.11-25
    • /
    • 2011
  • The Miller algorithm is employed in the typical pairing computation such as Weil, Tate and Ate for implementing ID based cryptosystem. By analyzing the Mrabet's attack that is one of fault attacks against the Miller algorithm, this paper presents au efficient fault attack in Affine coordinate system, it is the most basic coordinates for construction of elliptic curve. The proposed attack is the effective model of a count check fault attack, it is verified to work well by practical fault injection experiments and can omit the probabilistic analysis that is required in the previous counter fault model.

Performance Analysis of Authentication Protocols of GPS, Galileo and BeiDou

  • Jeon, Da-Yeon;Gaybullaev, Turabek;Noh, Jae Hee;Joo, Jung-Min;Lee, Sang Jeong;Lee, Mun-Kyu
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.11 no.1
    • /
    • pp.1-9
    • /
    • 2022
  • Global Navigation Satellite System (GNSS) provides location information using signals from multiple satellites. However, a spoofing attack that forges signals or retransmits delayed signals may cause errors in the location information. To prevent such attacks, authentication protocols considering the navigation message structure of each GNSS can be used. In this paper, we analyze the authentication protocols of Global Positioning System (GPS), Galileo, and BeiDou, and compare the performance of Navigation Message Authentication (NMA) of the above systems, using several performance indicators. According to our analysis, authentication protocols are similar in terms of performing NMA and using Elliptic Curve Digital Signature Algorithm (ECDSA). On the other hand, they are different in several ways, for example, whether to perform Spreading Code Authentication (SCA), whether to use digital certificates and whether to use Timed Efficient Stream Loss-tolerant Authentication (TESLA). According to our quantitative analysis, the authentication protocol of Galileo has the shortest time between authentications and time to first authenticated fix. We also show that the larger the sum of the navigation message bits and authentication bits, the more severely affected are the time between authentications and the time to first authenticated fix.

Investigation of Growth Properties of Sputtered V2O5 Thin Films Using Spectroscopic Ellipsometry (분광타원법을 이용한 스퍼터된 V2O5 박막의 성장특성 조사)

  • Lim, Sung-Taek;Kang, Man-Il;Lee, Kyu-Sung;Kim, Yong-Gi;Ryu, Ji-Wook
    • Journal of the Korean Vacuum Society
    • /
    • v.16 no.2
    • /
    • pp.134-140
    • /
    • 2007
  • Optical structure of $V_{2}O_{5}$ thin films were analyzed and confirmed, the films were deposited in oxygen partial pressure 0% and 10% by RF magnetron sputtering system. Measurements of the elliptic constants were made in the range of $0.75{\sim}4.0\;eV$ by using phase modulated spectroscopic ellipsometer. The elliptic constants of the thin films were analyze by Double Amorphous dispersion relation. The calculated n, k spectra of $V_{2}O_{5}$ layer were obtained over the range of $0.75{\sim}4.0\;eV$ photon energy. SEM and XRD measurements were also made to validate the ellipsometric analysis and they give good agreement with the structural properties of the films. It was found that optical structure of the $V_{2}O_{5}$ layer has a 3 phase(roughness/film/substrate) and optical absorption properties are greatly depend on the partial pressure of the oxygen.