• Title/Summary/Keyword: Key Exchange System

Search Result 228, Processing Time 0.024 seconds

Evaluation of ATC in Haenam-Cheju HVDC System Using Cost Calculation (해남-제주간 직류송전시스템의 비용산정을 통한 ATC계산)

  • Son Hyun-Il;Lee Hyo-Sang;Shin Dong-Joon;Kim Jin-O
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.54 no.4
    • /
    • pp.193-198
    • /
    • 2005
  • As the electrical power industry is restructured, the electrical power exchange is extended. One of the key information used to determine how much power can be transferred through the network is known as available transfer capability (ATC). To calculate ATC, traditional deterministic approach is based on the severest case, but the approach has the complexity of procedure. Therefore, novel approach for ATC calculation is proposed using cost optimization in this paper Cheju Island interconnected HVDC system with mainland in KEPCO (Korean Electric Power Corporation) systems, and the demand of Cheju Island increases about 10 ($\%$) every year. To supply for increasing demand, the supply of HVDC system must be increased. This paper proposed the optimal transfer capability of HVDC system between Haenam in mainland and Cheju in Chju Island through cost optimization. The cost optimization is considered production cost in Cheju Island, wheeling charge through Haenam-Cheju HVDC system and outage cost with one depth (N-1 contingency)

Design and Implementation of a Client Mail Security System for Secure Mail Exchange using Public Key Infrastructure (공개키 기반 구조에서 안전한 메일 전송을 위한 클라이언트 메일 보안 시스템 설계 및 구현)

  • 정창렬;고진광
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.1
    • /
    • pp.149-157
    • /
    • 2003
  • Recently, the Internet enhanced by development of IT makes the processing and exchanging of information, As the Internet is sending and receiving digitized documents over the Internet e-mail system. The security of document information is being threated when exchanging digitized documents over an open network such as the Internet. The degree of threat is even higher when sensitive documents are involved Therefore, in this paper, the secure e-mail system on a client is designed and implemented in order to make secure exchanging of digitized documents. By using the public key infrastructure in which encrypted mail transmission, proof of delivery and integrity of the message are garanted, unauthorized manipulation, illegal acquisition and mutual authentication problem can be prevented in order to secure the document information which is crucial and sensible when exchanging the digitized document over the Internet. Futhenmore, by using the SET protocol based on public key cryptography, the secure mail system is designed and implemented in order for the users not having any professional knowledge to deal with the system easily and friendly in GUI environment.

Design of RSA cryptographic circuit for small chip area using refined Montgomery algorithm (개선된 몽고메리 알고리즘을 이용한 저면적용 RSA 암호 회로 설계)

  • 김무섭;최용제;김호원;정교일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.5
    • /
    • pp.95-105
    • /
    • 2002
  • This paper describes an efficient method to implement a hardware circuit of RSA public key cryptographic algorithm, which is important to public-key cryptographic system for an authentication, a key exchange and a digital signature. The RSA algorithm needs a modular exponential for its cryptographic operation, and the modular exponential operation is consists of repeated modular multiplication. In a numerous algorithm to compute a modular multiplication, the Montgomery algorithm is one of the most widely used algorithms for its conspicuous efficiency on hardware implementation. Over the past a few decades a considerable number of studies have been conducted on the efficient hardware design of modular multiplication for RSA cryptographic system. But many of those studies focused on the decrease of operating time for its higher performance. The most important thing to design a hardware circuit, which has a limit on a circuit area, is a trade off between a small circuit area and a feasible operating time. For these reasons, we modified the Montgomery algorithm for its efficient hardware structure for a system having a limit in its circuit area and implemented the refined algorithm in the IESA system developed for ETRI's smart card emulating system.

An Information Sharing System for Product Design Data Using WWW and STEP (웹과 STEP을 이용한 제품 설계 정보 공유 시스템)

  • 김철영;김남국;김영호;강석호
    • Korean Journal of Computational Design and Engineering
    • /
    • v.1 no.3
    • /
    • pp.203-214
    • /
    • 1996
  • An information sharing system, namely World Design View, is developed for browsing product design data on the World Wide Web environment. For the last few years information sharing has been rapidly emerging as an important research issue in the areas of concurrent engineering, product data management, virtual manufacturing, and so on. Since we are mainly concerned with product development, the key information that needs be communicated and shared is product data. The developed system puts the major advantages of STEP, OODB, and VRML together. The STEP standard provides a consistent data exchange format and application interfaces among different CAD/CAM systems. OODB is efficient and effective in dealing with complex data structures often found in engineering applications. Virtual worlds for 3-D product models can be created by VRML which is networked via the global Internet and hyperlinked with WWW. The World Design View system can support for members of virtual design teams, possibly distributed all over the world, to share 3-D shape information quickly and easily.

  • PDF

An object-oriented design methodology for manufacturing information system (객체지향적 접근방법에 의한 생산정보시스템 설계방법)

  • 김철한;김광수
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10a
    • /
    • pp.595-600
    • /
    • 1991
  • A competitive automated manufacturing system integrates the various control processes and data used in service of products. design, manufacturing, and, sale. CIM is a way to achieve such integration through computers and computational techniques in manufacturing, planning, and design. Developing effective CIM architectures is hampered by integration problems. The key to resolving these problems lies in a better understanding of manufacturing function and how it is related to other manufacturing functions. Integration of CIM environment requires coordinated solutions to data management problems for individual application system as well as for exchange of data between these applications. This requires a common framework for data management throughout the CIM environment. This paper discusses the design paradigm as a framework for this purpose. Designing an organizational structure to meet those goals invloves 1) analyzing the functions through functional decomposition, 2) developing a data model to coordinate functions. As a result, we propose an object-oriented design methodology for manufacturing information system.

  • PDF

Design and FPGA Implementation of Scalar Multiplication for A CryptoProcessor based on ECC(Elliptic Curve Cryptographics) (ECC(Elliptic Curve Crptographics) 기반의 암호프로세서를 위한 스칼라 곱셈기의 FPGA 구현)

  • Hwang Jeong-Tae;Kim Young-Chul
    • Proceedings of the IEEK Conference
    • /
    • 2004.06b
    • /
    • pp.529-532
    • /
    • 2004
  • The ECC(Elliptic Curve Cryptogrphics), one of the representative Public Key encryption algorithms, is used in Digital Signature, Encryption, Decryption and Key exchange etc. The key operation of an Elliptic curve cryptosystem is a scalar multiplication, hence the design of a scalar multiplier is the core of this paper. Although an Integer operation is computed in infinite field, the scalar multiplication is computed in finite field through adding points on Elliptic curve. In this paper, we implemented scalar multiplier in Elliptic curve based on the finite field GF($2^{163}$). And we verified it on the Embedded digital system using Xilinx FPGA connected to an EISC MCU. If my design is made as a chip, the performance of scalar multiplier applied to Samsung $0.35 {\mu}m$ Phantom Cell Library is expected to process at the rate of 8kbps and satisfy to make up an encryption processor for the Embedded digital doorphone.

  • PDF

Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions

  • Kirsal-Ever, Yoney;Eneh, Agozie;Gemikonakli, Orhan;Mostarda, Leonardo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4604-4623
    • /
    • 2014
  • Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. In this study, Communicating Sequential Processes (CSP) which is an abstract language designed especially for the description of communication patterns is employed. Rank functions are also used for verification and analysis which are helpful to establish that some critical information is not available to the intruder. In order to establish this, by assigning a value or rank to each critical information, it is shown that all the critical information that can be generated within the network have a particular characterizing property. This paper presents an application of rank functions approach to an authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results are presented and discussed.

Eddy-Resolving Simulations for the Asian Marginal Seas and Kuroshio Using Nonlinear Terrain-Following Coordinate Model

  • Song, Y.-Tony;Tang, Tao
    • Journal of the korean society of oceanography
    • /
    • v.37 no.3
    • /
    • pp.169-177
    • /
    • 2002
  • An eddy-resolving free-surface primitive-equation model with nonlinear terrain-following coordinates is established to study the exchange of water masses among the Asian marginal seas and their adjacent waters. A curvilinear coordinate system is used to generate the horizontal grid with a variable resolution for the regional oceans from $5^{\circ}$S to $45^{\circ}$N and $100^{\circ}$E to $155^{\circ}$E. The higher resolution region has about a 10 km by 10 km grid covering the complex geometry of the coastal marginal seas, while the lower resolution region has about a 30 km by 30 km grid covering the eastern Pacific. The model is initialized by the Levitus annual climitology and forced by the monthly mean air-sea fluxes of momentum, heat, and freshwater derived from the Comprehensive Ocean-Atmosphere Data Set. High-resolution and low-viscosity are identified as the key factors for a better representation of the exchange of waters through narrow straits and passages between the marginal seas and their adjacent waters. The dynamics of the loop currents and eddies in the South China Sea and Celebes Sea are examined in detail. It has found that the anticyclonic loop and detached eddies from the Kuroshio through the Luzon Strait play an important role in transporting warm and salty water into the South China Sea, while the cyclonic circulation of the Mindanao Current in the Celebes Sea plays a role in contributing cold water to the Indonesian throughflow. The deep undercurrent of the western Pacific is shown to provide fresher water to the South China Sea and Celebes Sea. These modeling results suggest that the exchange processes via the narrow straits and passages are of fundamental importance to the maintenance of water masses for the marginal sea region.

A study on the development of Gas-Vent Automatic Exchange Machine with Vision System (영상정보를 이용한 가스벤트자동교환 장치)

  • Kwon, Jang-Woo;Hong, Jun-Eui;Yoon, Dong-Eop;Kil, Gyung-Suk;Lee, Dong-Hoon;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.6
    • /
    • pp.1141-1149
    • /
    • 2007
  • This paper describes two major techniques; image processing and gas vent insert and rejection control, for efficient gas vent exchange and holes detecting on the shoes mold. The key idea is to detect holes on the mold to select which holes to insert and to reject automatically guide center of hole's position. This allows us to save labor time while minimizing defective rate of PU shoes mold forming and production costs for gas vent exchange such as insertion and rejection.. Our experimental results have demonstrated that the hole's detection and gasvent exchange mechanism are more efficient and provide accurate mechanism to mitigate risks of vent injection/rejection failures.

Research Trend in Electrocatalysts for Anion Exchange Membrane Water Electrolysis (음이온교환막 수전해 촉매기술 동향)

  • Kim, Jiyoung;Lee, Kiyoung
    • Journal of the Korean Electrochemical Society
    • /
    • v.25 no.2
    • /
    • pp.69-80
    • /
    • 2022
  • The anion exchange membrane (AEM) water electrolysis for high purity hydrogen production is attracting attention as a next-generation green hydrogen production technology by using inexpensive non-noble metal-based catalysts instead of conventional precious metal catalysts used in proton exchange membrane (PEM) water electrolysis systems. However, since AEM water electrolysis technology is in the early stages of development, it is necessary to develop research on AEM, ionomers, electrode supports and catalysts, which are key elements of AEM water electrolysis. Among them, current research in the field of catalysts is being studied to apply a previously developed half-cell catalyst for alkali to the AEM system, and the applied catalyst has disadvantages of low activity and durability. Therefore, this review presented a catalyst synthesis technique that promoted oxygen evolution reaction (OER) and hydrogen evolution reaction (HER) using a non-noble metal-based catalyst in an alkaline medium.