• Title/Summary/Keyword: Key Exchange System

Search Result 228, Processing Time 0.035 seconds

Evaluation of Optimal Transfer Capability in Power System Interconnection (연계된 계통간의 최적 송전 용량 산정)

  • Son, Hyun-Il;Bae, In-Su;Jeon, Dong-Hoon;Kim, Jin-O
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.59 no.4
    • /
    • pp.679-685
    • /
    • 2010
  • As the electrical power industry is restructured, the electrical power exchange is becoming extended. One of the key information used to determine how much power can be transferred through the network is known as available transfer capability (ATC). To calculate ATC, traditional deterministic approach is based on the severest case, but the approach has the complexity of procedure. Therefore, novel approach for ATC calculation is proposed using cost-optimization method, well-being method and risk-benefit method in this paper. This paper proposes the optimal transfer capability of HVDC system between mainland and a separated island in Korea through these three methods. These methods will consider production cost, wheeling charge through HVDC system and outage cost with one depth (N-1 contingency).

Evaluation of Optimal Transfer Capability in Power System interconnection (연계된 계통간의 최적 송전용량 산정)

  • Son, Hyun-Il;Choi, Ah-Reum;Lee, Sung-Hoon;Kim, Jin-O;Jeon, Dong-Hoon
    • Proceedings of the KIEE Conference
    • /
    • 2009.07a
    • /
    • pp.195_196
    • /
    • 2009
  • As the electrical power industry is restructured, the electrical power exchange is becoming extended. One of the key information used to determine how much power can be transferred through the network is known as available transfer capability (ATC). To calculate ATC, traditional deterministic approach is based on the severest case, but the approach has the complexity of procedure. Therefore, novel approach for ATC calculation is proposed using cost-optimization method in this paper, and is compared with well-being method and risk-benefit method. This paper proposes the optimal transfer capability of HVDC system between mainland and a separated island in Korea through these three methods. These methods will consider production cost, wheeling charge through HVDC system and outage cost with one depth (N-1 contingency).

  • PDF

An Information Modeling Methodolgy for CIM (통합생산을 위한 생산정보 모델에 관한 연구)

  • Kim, Cheol-Han;Kim, Kwang-Soo
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.17 no.2
    • /
    • pp.115-129
    • /
    • 1991
  • An ecconomically competitive automated manufacturing system integrates the various control processes and data used in design, manufacturing, sale and service of products. CIM is a way to achieve such integration through computers and computational techniques in design, planning, and manufacturing. Developing effective CIM architectures is hampered by integration problems. The key to resolving these problems lies in a better understanding of manufacturing function and how it is related to other manufacturing functions. Integration of CIM environment requires coordinated solutions to data management problems for individual application system as well as for exchange of data between these applications. This requires a common framework for data management throughout the CIM environment. This paper discusses the design paradigm as a framework for this purpose. Designing an organizational structure to meet those goals involves 1) analyzing the functions through functional decomposition, 2) developing a data model to coordinate functions. As a result, we propose an object-oriented design methodology for manufacturing information system.

  • PDF

Implementation of Secure Email System Using lava Crypto API (자바 암호 API를 사용한 안전한 전자메일 시스템의 설계 및 구현)

  • 이직수;김상국;이명선;이원구;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.744-747
    • /
    • 2004
  • Internet, media connecting global, has increased fast at every year. Many people have been used email as method of exchanging data. But, email has many problem. Existing email may reveal privacy and sensitive information because it ran read and modify email by simple method. So, It required development of strong cryptographic email system. This paper available that email system provide delivery and content proof and seure key-exchange using lava Crypto API

  • PDF

An Implementation and Verification of Performance Monitor for Parallel Signal Processing System (병렬신호처리시스템을 위한 성능 모니터의 구현 및 검증)

  • Lee Won-Joo;Kim Hyo-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.313-322
    • /
    • 2005
  • In this paper, we implement and verify performance monitor for parallel signal processing system, using DSP Starter Kit(DSK) of which the basic Processor is TMS302C6711 chip. The key ideas of this performance monitor is, using Real Time Data Exchange(RTDX) for the Purpose of real-time data transfer and function of DSP/BIOS, the ability to measure the Performance measure like DSP workload, memory usage, and bridge traffic. In the simulation, FFT, 2D FFT, Matrix Multiplication, and Fir Filter, which are widely used DSP algorithms, have been employed. Using performance monitor and Code Composer Studio from Texas Instrument(Tl) , the result has been recorded according to different frequencies, data sizes, and buffer sizes for a single wave file. The accuracy of our performance monitor has been verified by comparing those recorded results.

  • PDF

High-Frequency Targeted Mutagenesis in Pseudomonas stutzeri Using a Vector-Free Allele-Exchange Protocol

  • Gomaa, Ahmed E.;Deng, Zhiping;Yang, Zhimin;Shang, Liguo;Zhan, Yuhua;Lu, Wei;Lin, Min;Yan, Yongliang
    • Journal of Microbiology and Biotechnology
    • /
    • v.27 no.2
    • /
    • pp.335-341
    • /
    • 2017
  • The complexity of the bacterial recombination system is a barrier for the construction of bacterial mutants for the further functional investigation of specific genes. Several protocols have been developed to inactivate genes from the genus Pseudomonas. Those protocols are complicated and time-consuming and mostly do not enable easy construction of multiple knock-ins/outs. The current study describes a single and double crossover-recombination system using an optimized vector-free allele-exchange protocol for gene disruption and gene replacement in a single species of the family Pseudomonadaceae. The protocol is based on self-ligation (circularization) for the DNA cassette which has been obtained by overlapping polymerase chain reaction (Fusion-PCR), and carries an antibiotic resistance cassette flanked by homologous internal regions of the target locus. To establish the reproducibility of the approach, three different chromosomal genes (ncRNA31, rpoN, rpoS) were knocked-out from the root-associative bacterium Pseudomonas stutzeri A1501. The results showed that the P. stutzeri A1501 mutants, which are free of any plasmid backbone, could be obtained via a single or double crossover recombination. In order to optimize this protocol, three key factors that were found to have great effect on the efficiency of the homologous recombination were further investigated. Moreover, the modified protocol does not require further cloning steps, and it enables the construction of multiple gene knock-in/out mutants sequentially. This work provides a simple and rapid mutagenesis strategy for genome editing in P. stutzeri, which may also be applicable for other gram-negative bacteria.

Provable Security of PRF-based Key Derivation Functions according to Input Types of Counters (PRF-기반 키유도함수에서 카운터 입력 형태에 따른 증명가능 안전성)

  • Kim, Nayoung;Kang, Ju-Sung;Yeom, Yongjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.547-557
    • /
    • 2015
  • The security of all cryptographic algorithms and protocols is based on the confidentiality of secret keys. Key management mechanism is an indispensable part of the cryptographic system and this deals with the generation, exchange, storage, use, and replacement of keys. Within the key management mechanism there are key derivation functions (KDFs) which derive one or more keys from a master key. NIST specifies three families of PRF-based KDFs in SP 800-108. In this paper, we examine the difference of security models between the KDFs and the encryption modes of operations. Moreover we focus on the provable security of PRF-based KDFs according to input types of counters, and show that the counter and feedback modes of KDFs using XOR of counters are insecure, while these modes using concatenation of counters are secure.

Design and Analysis of Data File Protection based on the Stream Cipher (데이터파일의 보호를 위한 스트림 암호방식 설계와 해석)

  • 이경원;이중한;김정호;오창석
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.1
    • /
    • pp.55-66
    • /
    • 2004
  • Recently, as the personal computers are supplied rapidly, they formed the nucleus of the computer system. But, because of the easiness that anyone uses them to go near easily, it is the fact that the security of personal computer is weakness. So, in the paper, 1 propose the technical method that minimizes the loss and leakage of important data. This paper implemented a crypto system for security of data file on personal computer and assistance storage medium. The way of encryption/decryption is applied by complexity method which mixed Diffie-Hellman key exchange protocol, a typical RC4(Rivest Cipher version 4) algorithm of stream cipher and a typical MD5(Message Digest version 5) of Hash Function. For valuation implemented crypto system, three criteria is presented, which are crypto complexity, processing time and pattern matching. And according to analysis the three criteria the crypto system is verified the security, efficiency and usefulness. The crypto system is programmed with Visual C++ language of Microsoft. And so, as this is software system, we shall have a technical security system at a minimum cost for all personal computer.

  • PDF

An Efficient Authentication Protocol for GPS Information Exchange between Cars Using the Base Station (기지국을 이용한 차량간 GPS 정보 교환을 위한 효율적인 인증 프로토콜)

  • Cho, KookRae;Son, Jong-Wuk;Cho, HuiSup
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.3
    • /
    • pp.118-127
    • /
    • 2010
  • Inter-vehicle communication is one of the most important parts in Intelligent Vehicle System. Through this communication, drivers can recognize what is happening out of their sights, such as the freezing condition of the street, traffic accidents, and so on. Each car in IVS gives various services to the drivers after analyzing those received information from cars or a base station. If the message is, however, exchanged from car to car directly, the computation cost which is needed for all the car to authenticate the transmitted message between nearby cars is tremendously high. Therefore, one can naturally think that the message communication between cars is performed with the help of the base station to reduce the computation cost. In this case where the base station collects all the information transmitted from cars and broadcasts them nearby, there should be an efficient way both for the base station to authenticate the car message within its communication range and for the car to authenticate the information received from the base station. In this paper, we present a two-way authentication protocol using a hash chain to efficiently exchange GPS information between a car and a base station. This information can be used to provide a driver with the navigation which displays all the moving cars around him in real time. When a car goes into an area of a base station, the car authenticates itself to the base station using its private key of PKI, sends a commitment of a hash chain, then starts to send a message with the hash value for authentication. The message includes GPS information, driver's status and so on. The base station also authenticates itself to the nearby cars using its private key, transmits the commitment of the hash chain, and sends all the messages gathered from cars with authentication information.

A Study on the Performance Improvement in SEcure Neighbor Discovery (SEND) Protocol (보안 이웃 탐색 프로토콜 성능 향상 기법에 관한 연구)

  • Park, Jin-Ho;Im, Eul-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.85-96
    • /
    • 2008
  • Neighbor Discovery(ND) protocol is used to exchange an information of the neighboring nodes on the same link in the IPv6 protocol environment. For protecting the ND protocol, firstly utilizing Authentication Header(AH) of the IPsec protocol was proposed. But the method has some problems-uses of key exchange protocol is not available and it is hard to distribute manual keys. And then secondly the SEcure Neighbor Discovery(SEND) protocol which protects all of the ND message with digital signature was proposed. However, the digital signature technology on the basis of public key cryptography system is commonly known as requiring high cost, therefore it is expected that there is performance degradation in terms of the availability. In the paper, to improve performance of the SEND protocol, we proposed a modified CGA(Cryptographically Generated Address) which is made by additionally adding MAC(Media Access Control) address to the input of the hash function. Also, we proposed cache mechanism. We compared performance of the methods by experimentation.