• Title/Summary/Keyword: Key

Search Result 33,532, Processing Time 0.046 seconds

Specification and Analysis of Key Recovery System using ECTPN (ECTPN을 이용한 키복구 시스템의 명세 및 분석)

  • Go, Jeong-Ho;Gang, Sang-Seung;Jeon, Eun-A;Lee, Gang-Su
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.6
    • /
    • pp.1874-1885
    • /
    • 2000
  • When a receiver of ciphertext message can not decrypt a message because he has lost his private-key, the private-key of receiver and session-key of the message should be recovered. In this paper, we developed an Encapsulation based Key Recovery System (EKRS). EKRS is a new key encapsulation based key recovery system which is characterized by secretly choice of KRA, randomized target keys. n-way recovery type, and useful for commercial key recovery. EKRS is formally specified by a pictorial model, an Extended Cryptographic Timed Petri Net (ECTPN). Secure information flow and reachability of a session-key are verified by using reachability graph of ECTPN. EKRS, executing over a Public Key Infrastructure, can be used as a security solution in Web based applications such as CALS, EC an EDI.

  • PDF

Reducing Rekeying Time Using an Integrated Group Key Agreement Scheme

  • Gu, Xiaozhuo;Zhao, Youjian;Yang, Jianzu
    • Journal of Communications and Networks
    • /
    • v.14 no.4
    • /
    • pp.418-428
    • /
    • 2012
  • With the requirement for providing multiple levels of access control for group members, many group key management schemes designed for hierarchical access control have been put forward. However, most of these schemes focus on the efficiency of group key establishment and rekeying in centralized environments. This paper proposes an integrated group key agreement (IGK) scheme for contributory environments. The IGK scheme employs the integrated key graph to remove key redundancies existing in single key trees, and reduces key establishment and rekeying time while providing hierarchical access control. Performance analyses and simulations conducted with respect to computation and communication overheads indicate that our proposed IGK scheme is more efficient than the independent group key agreement scheme.

Dynamic Session Key based Pairwise Key Management Scheme for Wireless Sensor Networks

  • Premamayudu, B;Rao, Koduganti Venkata;Varma, P. Suresh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5596-5615
    • /
    • 2016
  • Security is one of the major challenges in the Wireless Sensor Networks (WSNs). WSNs are more vulnerable to adversarial activities. All cryptographic security services indirectly depend on key management. Symmetric key management is the best key establishment process for WSNs due to the resource constraints of the sensors. In this paper, we proposed dynamic session key establishment scheme based on randomly generated nonce value and sensor node identity, in which each sensor node is equipped with session key on expire basis. The proposed scheme is compare with five popular existing key management systems. Our scheme is simulated in OMNET++ with MixiM and presented experimental results. The analytical study and experimental results show the superiority of the proposed scheme over the existing schemes in terms of energy, storage, resilience and communication overhead.

An Analysis of Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting (안전한 브로드 캐스팅을 위한 Time-Bound Hierarchical Key Management 스킴 비교 분석)

  • Kim, Hyun-Cheol;Goo, Woo-Guen;Lee, Jun-Ho;Lee, Dong-Hoon
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.556-558
    • /
    • 2008
  • Secure broadcasting is requirement for payment of TV systems, government or company. Hierarchical key management for access control provides efficient key management in those environment. Also, time-bound hierarchical key management technique generates different keys in each time period. In 2004, Tzeng proposed a time-bound cryptgraphic key assignment scheme for access control in a hierarchy and in 2008, Bertino et al proposed an efficient time-bound hierarchical key management scheme for secure broadcasting. Tzeng's scheme and Bertino et al's scheme are organized in different environment and primitive. In this paper, we analysis above two time-bound hierarchical key management scheme.

  • PDF

Key Account Management: Towards a Multidimensional Definition

  • Ahmmed, Kawsar;Noor, Nor Azila Mohd.
    • Asian Journal of Business Environment
    • /
    • v.2 no.1
    • /
    • pp.5-13
    • /
    • 2012
  • The aim of this paper is to propose an integrative definition of key account management (KAM) at the organizational level through a content analysis of the existing definitions of KAM available in the business literatures. A representative pool of definitions of key account management was generated through literature review from twenty three journals that covers the divergence of name variety like global account management, strategic account management, national account management, international key account management, key client management, major account management, key customers management and key account management. Relating to the definition of key account management various attributes are identified through content analysis and according to the relevance, profile for each attributes are developed. On the basis of these attributes a diagrammatic and textual definition is proposed that covers the different standpoints and aspects of key account management approach and captures its essence as well. Eventually, several strategic implications are derived that create the field for further empirical investigation.

  • PDF

Low area field-programmable gate array implementation of PRESENT image encryption with key rotation and substitution

  • Parikibandla, Srikanth;Alluri, Sreenivas
    • ETRI Journal
    • /
    • v.43 no.6
    • /
    • pp.1113-1129
    • /
    • 2021
  • Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultralightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary-coded decimal-based key generation used in image encryption. The key rotation and substitution-based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field-programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture.

Current Evidence on the Association between rs3757318 of C6orf97 and Breast Cancer Risk: a Meta-Analysis

  • Hong, Yuan;Chen, Xue-Qin;Li, Jiao-Yuan;Liu, Cheng;Shen, Na;Zhu, Bei-Bei;Gong, Jing;Chen, Wei
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.19
    • /
    • pp.8051-8055
    • /
    • 2014
  • Background: A common genetic variant rs3757318, located in intron of C6orf97, was firstly identified to be associated with breast cancer (BC) risk by a genome-wide association (GWA) study. However, subsequent validation studies with different ethnicities have yielded conflicting results. Materials and Methods: We performed a meta-analysis to synthesize all available data for evaluating the precise effect of this variant on BC susceptibility. Results: A total of 8 articles containing 11 studies with 62,891 cases and 65,635 controls were included in this meta-analysis. When compared to the G allele, the rs3757318-A allele was significantly associated with BC risk with the pooled OR of 1.21 (95% CI=1.15 - 1.29, P<0.001) but with obvious between-study heterogeneity (P=0.040). Stratified analysis suggested that diversity of ethnicity along with control source may explain part of the heterogeneity. Similarly, significant associations were also identified in heterozygote, homozygote, dominant and recessive genetic models. Sensitivity and publication bias analyses indicated robust stability of our results. Conclusions: Our present meta-analysis demonstrated that the variant rs3757318 is associated with increased BC risk. Nevertheless, further studies are needed to clarify the underlying biological mechanisms.

Estimation of L-threonine requirements for Longyan laying ducks

  • Fouad, A.M.;Zhang, H.X.;Chen, W.;Xia, W.G.;Ruan, D.;Wang, S.;Zheng, C.T.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.30 no.2
    • /
    • pp.206-210
    • /
    • 2017
  • Objective: A study was conducted to test six threonine (Thr) levels (0.39%, 0.44%, 0.49%, 0.54%, 0.59%, and 0.64%) to estimate the optimal dietary Thr requirements for Longyan laying ducks from 17 to 45 wk of age. Methods: Nine hundred Longyan ducks aged 17 wk were assigned randomly to the six dietary treatments, where each treatment comprised six replicate pens with 25 ducks per pen. Results: Increasing the Thr level enhanced egg production, egg weight, egg mass, and the feed conversion ratio (FCR) (linearly or quadratically; p<0.05). The Haugh unit score, yolk color, albumen height, and the weight, percentage, thickness, and breaking strength of the eggshell did not response to increases in the Thr levels, but the albumen weight and its proportion increased significantly (p<0.05), whereas the yolk weight and its proportion decreased significantly as the Thr levels increased. Conclusion: According to a regression model, the optimal Thr requirement for egg production, egg mass, and FCR in Longyan ducks is 0.57%, while 0.58% is the optimal level for egg weight from 17 to 45 wk of age.

Hybrid medium model for conjugate heat transfer modeling in the core of sodium-cooled fast reactor

  • Wang, X.A.;Zhang, Dalin;Wang, Mingjun;Song, Ping;Wang, Shibao;Liang, Yu;Zhang, Yapei;Tian, Wenxi;Qiu, Suizheng;Su, G.H.
    • Nuclear Engineering and Technology
    • /
    • v.52 no.4
    • /
    • pp.708-720
    • /
    • 2020
  • Core-wide temperature distribution in sodium-cooled fast reactor plays a key role in its decay heat removal process, however the prediction for temperature distribution is quite complex due to the conjugate heat transfer between the assembly flow and the inter-wrapper flow. Hybrid medium model has been proposed for conjugate heat transfer modeling in the core. The core is modeled with a Realistic modeled inter-wrapper flow and hybrid medium modeled assembly flow. To validate present model, simulations for a three-assembly model were performed with Realistic modeling, traditional porous medium model and hybrid medium model, respectively. The influences of Uniform/Non-Uniform power distribution among assemblies and the Peclet number within the assembly flow have been considered. Compared to traditional porous medium model, present model shows a better agreement with in Realistic modeling prediction of the temperature distribution and the radial heat transfer between the inter-wrapper flow and the assembly flow.