• Title/Summary/Keyword: Key Recovery System

Search Result 123, Processing Time 0.022 seconds

Numerical Analysis on Energy Reduction of an Exhaust-Air-Heat-Recovery Type Air Washer System for Semiconductor Manufacturing Clean Rooms (반도체 클린룸용 배기 열회수식 에어와셔 시스템의 에너지절감에 관한 수치해석)

  • Song, Gen-Soo;Kim, Hyung-Tae;Yoo, Kyung-Hoon;Son, Seung-Woo;Shin, Dae-Kun;Kim, Young-Il
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.22 no.10
    • /
    • pp.697-703
    • /
    • 2010
  • In recent semiconductor manufacturing clean rooms, air washers are used to remove airborne gaseous contaminants from the outdoor air introduced into a clean room. Meanwhile, there is a large amount of exhaust air from a clean room. From an energy conservation point of view, heat recovery is useful for reducing the outdoor air conditioning load required to maintain a clean room. Therefore it is desirable to recover heat from the exhaust air and use it to cool or heat the outdoor air. In the present study, numerical analysis was conducted to evaluate the recovered heat of an exhaust air heat recovery type air washer system, which is the key part of an energy saving outdoor air conditioning system for semiconductor clean rooms. The present numerical results showed relatively good agreement with the available experimental data.

A Study on National Control Policy for the Use of Encryption Technologies by an Accused Person (피의자 개인의 암호이용 통제정책에 대한 연구)

  • Baek, Seung-Jo;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.271-288
    • /
    • 2010
  • In this paper, we study the dysfunctions of cryptography as dual-use goods and national domestic encryption control policies like key recovery system and decryption order. And we examine risks of the breach of the peoples' constitutional rights like the right to privacy in these policies and analyze these policies by applying the principle of the ban on the over-restriction. Finally, we propose the direction and requirements of our national domestic encryption control policy that maintains the balance of peoples' constitutional rights and investigatory powers.

UN-Substituted Video Steganography

  • Maria, Khulood Abu;Alia, Mohammad A.;Alsarayreh, Maher A.;Maria, Eman Abu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.382-403
    • /
    • 2020
  • Steganography is the art of concealing the existence of a secret data in a non-secret digital carrier called cover media. While the image of steganography methods is extensively researched, studies on other cover files remain limited. Videos are promising research items for steganography primitives. This study presents an improved approach to video steganography. The improvement is achieved by allowing senders and receivers exchanging secret data without embedding the hidden data in the cover file as in traditional steganography methods. The method is based mainly on searching for exact matches between the secret text and the video frames RGB channel pixel values. Accordingly, a random key-dependent data is generated, and Elliptic Curve Public Key Cryptography is used. The proposed method has an unlimited embedding capacity. The results show that the improved method is secure against traditional steganography attacks since the cover file has no embedded data. Compared to other existing Steganography video systems, the proposed system shows that the method proposed is unlimited in its embedding capacity, system invisibility, and robustness. The system achieves high precision for data recovery in the receiver. The performance of the proposed method is found to be acceptable across different sizes of video files.

Detectio of Malonaldehyde-thiobarbituric Acid (MA-TBA) Complex by High Performance Liquid Chromatography(HPLC) in a Model System

  • Whang, Key
    • Preventive Nutrition and Food Science
    • /
    • v.4 no.3
    • /
    • pp.167-170
    • /
    • 1999
  • Various concentrations of malonaldehyde (MA) produced upon hydrolysis of 1, 1, 3,3-tetraethoxypropane (TEP) were reacted with 2-thiobarbituric acid (TBA)and th e contents of MA-TBA complex were measured both with spectrophotometer and high performance liquid chromatography (HPLC). As the concentrations of MA-TBA increased, their absorbances and the corresponding HPLC peak areas increased. The correlation coefficient between absorbances and HPLC peak areas of MA-TBA peaks from the other compounds and butanol extraction of the complex increased its recovery its recovery by 29.4% . Measurement of the content of MA-TBA complex for monitoring the development of lipid oxidation was proven to be successful with the use of high performance liquid chromatography.

  • PDF

Recovery Phrase Management Scheme for Public Blockchain Wallets based on OTP (공용 블록체인 지갑을 위한 OTP 기반 계정 복구 문자열 관리 체계)

  • Song, Seounghan;Kim, Suntae;Shin, Jung-Hoon;Lee, Jeong-Hyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.1
    • /
    • pp.35-44
    • /
    • 2020
  • The growing use of public blockchain-based virtual cryptocurrency calls for secure management of blockchain account information managed through cryptocurrency wallet programs. The previously proposed wallet program has high security in terms of managing an account's private key, but low security in managing an account's recovery phrase. Therefore, in this paper, we propose a safe management system of blockchain account recovery string based on the new user authentication method using the user's mobile device information and OTP technique to overcome the problem of the existing account recovery string management method. It also conducts an analysis of the proposed blockchain account recovery string management system based on the expected behavior scenario.

Acute and repeated dose 26-week oral toxicity study of 20(S)-ginsenoside Rg3 in Kunming mice and Sprague-Dawley rats

  • Li, Chunmei;Wang, Zhezhe;Li, Guisheng;Wang, Zhenhua;Yang, Jianrong;Li, Yanshen;Wang, Hongtao;Jin, Haizhu;Qiao, Junhua;Wang, Hongbo;Tian, Jingwei;Lee, Albert W.;Gao, Yonglin
    • Journal of Ginseng Research
    • /
    • v.44 no.2
    • /
    • pp.222-228
    • /
    • 2020
  • Background: 20(S)-ginsenoside-Rg3 (C42H72O13), a natural triterpenoid saponin, is extracted from red ginseng. The increasing use of 20(S)-ginsenoside Rg3 has raised product safety concerns. Methods: In acute toxicity, 20(S)-ginsenoside Rg3 was singly and orally administrated to Kunming mice and Sprague-Dawley (SD) rats at the maximum doses of 1600 mg/kg and 800 mg/kg, respectively. In the 26-week toxicity study, we used repeated oral administration of 20(S)-ginsenoside Rg3 in SD rats over 26 weeks at doses of 0, 20, 60, or 180 mg/kg. Moreover, a 4-week recovery period was scheduled to observe the persistence, delayed occurrence, and reversibility of toxic effects. Results: The result of acute toxicity shows that oral administration of 20(S)-ginsenoside Rg3 to mice and rats did not induce mortality or toxicity up to 1600 and 800 mg/kg, respectively. During a 26-week administration period and a 4-week withdrawal period (recovery period), there were no significant differences in clinical signs, body weight, food consumption, urinalysis parameters, biochemical and hematological values, or histopathological findings. Conclusion: The mean oral lethal dose (LD50) of 20(S)-ginsenoside Rg3, in acute toxicity, is above 1600 mg/kg and 800 mg/kg in mice and rats, respectively. In a repeated-dose 26-week oral toxicity study, the no-observed-adverse-effect level for female and male SD rats was 180 mg/kg.

Study on Weak-Key Classes for KeeLoq (블록 암호 KeeLoq에 대한 취약키 공간에 관한 연구)

  • Lee, Yu-Seop;Kim, Jong-Sung;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.25-32
    • /
    • 2009
  • KeeLoq is a very light block cipher with a 32-bit block and a 64-bit key. It is suitable for the wireless applications, and thus multiple automotive OEMs as Chrysler, GM, Honda, Toyota have used remote keyless entry systems and alarm systems in order to protect the their cars. In this paper, we introduce various weak-key classes that include $2^1{\sim}2^{32}$ keys and exploit the slide attack to propose key-recovery attacks under these weak-key classes.

A Study on Design and Fabrication of SRD Impulse Generator and Antenna for Ground Penetrating Radar System (지반투과 레이더 시스템을 위한 SRD 임펄스 발생기 및 안테나의 설계 및 제작에 관한 연구)

  • Kim, Hyoung-Jong;Shin, Suk-Woo;Choi, Gil-Wong;Choi, Jin-Joo;Shin, Shang-Youal
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.3
    • /
    • pp.509-516
    • /
    • 2011
  • In this paper, a ground penetrating radar(GPR) system is implemented for landmine detection. The performance of the GPR system is associated with the characteristics of local soil and buried target. The choice of the center frequency and the bandwidth of the GPR system are the key factors in the GPR system design. To detect a small and shallow target, the higher frequencies are needed for high depth resolution. We have been designed, fabricated and tested a new impulse generator using step recovery diodes. The measured impulse response has an amplitude of 6.2V and a pulse width of 250ps. The implemented GPR system has been tested real environmental conditions and has proved its ability to detect a small buried target.

A Study on the Design Model of the Key Escrow System (키 위탁 시스템 설계 모델에 관한 연구)

  • 채승철
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.1
    • /
    • pp.99-110
    • /
    • 2000
  • 암호 시스템에서 가장 중요한 정보는 키 정보이다. 키가 손상되거나 유실되면 모든정보가 유실되기 때문이다. 키 위탁 시스템이란 유사시의 상황에 대비해서 키를 특정한 위탁기관에 위탁함으로써 정보를 암호의 오용이나 키의 분실로부터 보호 할 수 있는 시스템이다. 키 위탁 시스템은 유사시에 확실하게 키를 복원할 수 있어야 하며, 동시에 복구 정보의 안전한 보관이 이루어져야 한다. 그리고 위탁 시스템으로 인해 사생활이 침해되지 않는 것 또한 중요하다. 이러한 요구사항들은 서로 상충되는 점이 있기 때문에 모든 요구사항을 만족시키는 키 위탁 시스템을 설계하기는 매우 어렵다. 본 논문에서는 키 위탁 시스템 설계시에 고려해야 할 요소를 도출하고, 키 위탁 시스템 설계 및 분석을 위한 모델을 제안한다. 이 모델은 정의된 요구사항을 만족시키는 키 복구 시스템을 설계할 때 유용하게 사용될 수 있으며, 이미 제안된 키 복구 시스템을 분석하는 도구로 활용될 수 있다.

CTaG: An Innovative Approach for Optimizing Recovery Time in Cloud Environment

  • Hung, Pham Phuoc;Aazam, Mohammad;Huh, Eui-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1282-1301
    • /
    • 2015
  • Traditional infrastructure has been superseded by cloud computing, due to its cost-effective and ubiquitous computing model. Cloud computing not only brings multitude of opportunities, but it also bears some challenges. One of the key challenges it faces is recovery of computing nodes, when an Information Technology (IT) failure occurs. Since cloud computing mainly depends upon its nodes, physical servers, that makes it very crucial to recover a failed node in time and seamlessly, so that the customer gets an expected level of service. Work has already been done in this regard, but it has still proved to be trivial. In this study, we present a Cost-Time aware Genetic scheduling algorithm, referred to as CTaG, not only to globally optimize the performance of the cloud system, but also perform recovery of failed nodes efficiently. While modeling our work, we have particularly taken into account the factors of network bandwidth and customer's monetary cost. We have implemented our algorithm and justify it through extensive simulations and comparison with similar existing studies. The results show performance gain of our work over the others, in some particular scenarios.