• Title/Summary/Keyword: Key Recovery System

Search Result 124, Processing Time 0.025 seconds

Key Management and Recovery Scheme over SCADA System Using ID-based Cryptosystem (ID 기반 암호 기법을 이용한 SCADA 시스템에서 비밀 키 관리 및 복구 방안)

  • Oh, Doo-Hwan;Choi, Doo-Sik;Na, Eun-Sung;Kim, Sang-Chul;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.427-438
    • /
    • 2012
  • The SCADA(Supervisory Control and Data Acquisition) systems are used to control some critical national infrastructures such as electricity, gas, and water distribution systems. Recently, there are many researches on key management scheme for secure communication due to change to the open network environment. We propose a new key management method which is established on ID-based cryptosystem using pairing on MTU(Master Terminal Unit), Sub-MTU, and RTU(Remote Terminal Unit). Furthermore, we present a redistribution protocol of private key of each device and a system recovery protocol as a countermeasure of exposure of KMS(Key Management System) master key which is occurred by some unexpected accidents or malicious attacks.

Investigation of a Hybrid HVDC System with DC Fault Ride-Through and Commutation Failure Mitigation Capability

  • Guo, Chunyi;Zhao, Chengyong;Peng, Maolan;Liu, Wei
    • Journal of Power Electronics
    • /
    • v.15 no.5
    • /
    • pp.1367-1379
    • /
    • 2015
  • A hybrid HVDC system that is composed of line commutated converter (LCC) at the rectifier side and voltage source converter (VSC) in series with LCC at the inverter side is studied in this paper. The start-up strategy, DC fault ride-through capability, and fault recovery strategy for the hybrid HVDC system are proposed. The steady state and dynamic performances under start-up, AC fault, and DC fault scenarios are analyzed based on a bipolar hybrid HVDC system. Furthermore, the immunity of the LCC inverter in hybrid HVDC to commutation failure is investigated. The simulation results in PSCAD/EMTDC show that the hybrid HVDC system exhibits favorable steady state and dynamic performances, in particular, low susceptibility to commutation failure, excellent DC fault ride-through, and fast fault recovery capability. Results also indicate that the hybrid HVDC system can be a good alternative for large-capacity power transmission over a long distance byoverhead line.

An Access Code Key for Verification Service Model on the Blockchain in a Door Security (출입문 보안을 위한 블록체인 기반의 출입코드키 검증 서비스 모델)

  • Hong, Ki Hyeon;Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.10
    • /
    • pp.1416-1432
    • /
    • 2022
  • The access control system is a system that allows users to selectively enter the building by granting an access key to the user for security. Access keys with weak security are easily exposed to attackers and cannot properly perform the role that authenticates users. Access code keys should be protected from forgery or spoofing. For this reason, access key verification service models is important in security. However, most models manage all access keys on one central server. This method not only interrupts all services due to server errors, but also risks forgery and spoofing in the process of transmitting access keys. Therefore, blockchain algorithms are used to reduce this risk. This paper proposes a blockchain-based access key verification service model that used distributed stored blockchain gateways on storing access keys and authenticates the user's identity based on them. To evaluate the performance of this model, an experiment was conducted to confirm the performance of the access key forgery recovery rate and the blockchain network performance. As a result, the proposed method is 100% forgery recovery rate, and the registration and verification process is evaluated at 387.58 TPS and 136.66 TPS.

A Study on Multi_Kerberos Authentication Mechanism based on Certificate (인증서기반의 Multi_Kerberos 인증시스템에 관한 연구)

  • Shin, Kwang-Cheul;Cho, Sung-Je
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.3
    • /
    • pp.57-66
    • /
    • 2006
  • In this paper. proposes Multi_Kerberos certification mechanism that improve certification service of based on PKINIT that made public in IETF CAT Working Group. This paper proposed to a certificate other realm because search position of outside realm through DNS and apply X.509 directory certification system, to get public key from DNS server by chain (CertPath) between realms by certification and key exchange way that provide service between realms applying X.509, DS/DNS of based on PKINIT, in order to provide regional services. This paper proposed mechanism that support efficient certification service about cross realm including key management. the path generation and construction of Certificate using Validation Server, and recovery of Session Key. A Design of Multi_Kerberos system that have effects simplify of certification formality that reduce procedures on communication.

  • PDF

Bioproduction of trans-10,cis-12-Conjugated Linoleic Acid by a Highly Soluble and Conveniently Extracted Linoleic Acid Isomerase and an Extracellularly Expressed Lipase from Recombinant Escherichia coli Strains

  • Huang, Mengnan;Lu, Xinyao;Zong, Hong;Zhuge, Bin;Shen, Wei
    • Journal of Microbiology and Biotechnology
    • /
    • v.28 no.5
    • /
    • pp.739-747
    • /
    • 2018
  • The low solubility and high-cost recovery of Propionibacterium acnes polyunsaturated fatty acid isomerase (PAI) are key problems in the bioproduction of high value-added conjugated linoleic acid (CLA). To improve the solubility of recombinant PAI, six chaperone proteins were coexpressed with PAI. Introduction of GroELS proteins dramatically improved the PAI solubility from 29% to 97%, with increased activity by 57.8%. Combined expression of DnaKJ-GrpE and GroELS proteins increased the activity by 11.9%. In contrast, coexpression of DnaKJ-GrpE proteins significantly reduced the activity by 57.4%. Plasmids pTf16 harboring the tig gene and pG-Tf2 containing the tig and groEL-groES genes had no visible impact on PAI expression. The lytic protein E was then introduced into the recombinant Escherichia coli to develop a cell autolysis system. A 35% activity of total intracellular PAI was released from the cytoplasm by suspending the lysed cells in distilled water. The PAI recovery was further improved to 81% by optimizing the release conditions. The lipase from Rhizopus oryzae was also expressed in E. coli, with an extracellular activity of 110.9 U/ml. By using the free PAI and lipase as catalysts, a joint system was established for producing CLA from sunflower oil. Under the optimized conditions, the maximum titer of t-10,c-12-CLA reached 9.4 g/l. This work provides an effective and low-cost strategy to improve the solubility and recovery of the recombinant intracellular PAI for further large-scale production of CLA.

SE-PKI Key Recovery system with multiple escrow agents (다수의 위탁 기관 참여가 가능한 SE-PKI 키 복구 시스템)

  • 유희종;최희봉;오수현;원동호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.1
    • /
    • pp.25-33
    • /
    • 2001
  • In 1998, A. Young and M. Yung introduced the concept of ARC that conjugates functionalities of a typical PKI with the ability to escrow privte keys of the system users. Also in 1999, P. Paillier and M. Yung proposed a new notion - called SE-PKI -which presents other additional advantages beyond ARC. But SE-PKI system uses only one escrow agent. The storage of users secret information at a single agent can make it significant point of attack and arouse controversy about invasion of privacy. This paper presents SE-PKI key recovery system that multiple escrow agents can participate in it. Also, in our system, escrow agents can\`t recover user\`s ciphertext.

Research on Data Replication Method for Building an Enterprise Disaster Recovery System (엔터프라이즈 재해복구시스템 구축을 위한 데이터 복제 방안 연구)

  • Hyun-sun Kang
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.411-417
    • /
    • 2024
  • In the event of a disaster, it is essential to establish a disaster recovery plan and disaster recovery system to minimize disruption to major IT infrastructure and provide continuous business services. In the process of building a disaster recovery system, data replication is a key element of data recovery to provide uninterrupted and continuous business services in the event of a disaster. The data replication method can be determined depending on the system configuration environment and disaster recovery goal level. In this paper, we present a method for determining a data replication method suitable for the configuration environment and disaster recovery target level when building a disaster recovery system. In addition, the replication method decision procedure is applied to build a disaster recovery system and analyze the construction results. After establishing the disaster recovery system, a test was conducted to determine whether the service was transferred to the disaster recovery center in a disaster situation and normal service was provided, and the results were analyzed. As a result, it was possible to systematically select the optimal data replication method during the disaster recovery system construction phase. The established disaster recovery system has an RTO of 3.7 hours for service conversion to the disaster recovery center to provide continuous business services, and the disaster recovery level, which was Tier 2, has been improved to the target level within 4 hours of RTO and RPO=0.

Adaptive Selective Compressive Sensing based Signal Acquisition Oriented toward Strong Signal Noise Scene

  • Wen, Fangqing;Zhang, Gong;Ben, De
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3559-3571
    • /
    • 2015
  • This paper addresses the problem of signal acquisition with a sparse representation in a given orthonormal basis using fewer noisy measurements. The authors formulate the problem statement for randomly measuring with strong signal noise. The impact of white Gaussian signals noise on the recovery performance is analyzed to provide a theoretical basis for the reasonable design of the measurement matrix. With the idea that the measurement matrix can be adapted for noise suppression in the adaptive CS system, an adapted selective compressive sensing (ASCS) scheme is proposed whose measurement matrix can be updated according to the noise information fed back by the processing center. In terms of objective recovery quality, failure rate and mean-square error (MSE), a comparison is made with some nonadaptive methods and existing CS measurement approaches. Extensive numerical experiments show that the proposed scheme has better noise suppression performance and improves the support recovery of sparse signal. The proposed scheme should have a great potential and bright prospect of broadband signals such as biological signal measurement and radar signal detection.

The empirical study on the effect of service recovery effort to service quality perception and customer satisfaction (서비스 회복 노력이 서비스 품질인지와 고객만족에 미치는 영향에 관한 연구)

  • Suh, Chang-Juck;Kwon, Yeong-Hoon
    • Journal of Korean Society for Quality Management
    • /
    • v.28 no.4
    • /
    • pp.47-66
    • /
    • 2000
  • In recent, keeping and developing relationships with current customers is a key service business goal, and service recovery efforts is to be the essence of service business strategy. But many researchers have neglected to focus on that issue. So this research is intended to explore service quality factors that include service recovery efforts and grip those difference among service operations systems. Service operations systems are divided into three categories. Our study results suggest that customer oriented firms need to develop a comprehensive service recovery system and must include service recovery as a service quality factor.

  • PDF

A Study on the Recovery System (II) (키 복구 시스템에 관한 고찰 II)

  • 채승철;이임영
    • Review of KIISC
    • /
    • v.8 no.4
    • /
    • pp.97-112
    • /
    • 1998
  • 암호가 법 질서에 위배되는 목적으로 사용되는 것을 막기 위해 선진 각국에서는 여러 가지 암호 정책을 수립하고 있다. 그 중에서 현재 가장 주목을 받고 있는 것이 키 복구( Key Recovery) 개념이다. 이 개념은 정부 수사기관에게 암호 통신에 대해 수사권을 행사할 수 있는 능력을 부여하는 것이다. 또한 수사권 행사 이외의 프라이버시 침해를 보호할 수 있어야 한다. 본 고에서는 현재까지 제안된 복구 방식과 동향 등을 살펴본다.

  • PDF