• Title/Summary/Keyword: Key Technology

Search Result 9,620, Processing Time 0.034 seconds

Efficient key generation leveraging wireless channel reciprocity and discrete cosine transform

  • Zhan, Furui;Yao, Nianmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2701-2722
    • /
    • 2017
  • Key generation is essential for protecting wireless networks. Based on wireless channel reciprocity, transceivers can generate shared secret keys by measuring their communicating channels. However, due to non-simultaneous measurements, asymmetric noises and other interferences, channel measurements collected by different transceivers are highly correlated but not identical and thus might have some discrepancies. Further, these discrepancies might lead to mismatches of bit sequences after quantization. The referred mismatches significantly affect the efficiency of key generation. In this paper, an efficient key generation scheme leveraging wireless channel reciprocity is proposed. To reduce the bit mismatch rate and enhance the efficiency of key generation, the involved transceivers separately apply discrete cosine transform (DCT) and inverse discrete cosine transform (IDCT) to pre-process their measurements. Then, the outputs of IDCT are quantified and encoded to establish the bit sequence. With the implementations of information reconciliation and privacy amplification, the shared secret key can be generated. Several experiments in real environments are conducted to evaluate the proposed scheme. During each experiment, the shared key is established from the received signal strength (RSS) of heterogeneous devices. The results of experiments demonstrate that the proposed scheme can efficiently generate shared secret keys between transceivers.

Efficient Key Management Protocol for Secure RTMP Video Streaming toward Trusted Quantum Network

  • Pattaranantakul, Montida;Sanguannam, Kittichai;Sangwongngam, Paramin;Vorakulpipat, Chalee
    • ETRI Journal
    • /
    • v.37 no.4
    • /
    • pp.696-706
    • /
    • 2015
  • This paper presents an achievable secure videoconferencing system based on quantum key encryption in which key management can be directly applied and embedded in a server/client videoconferencing model using, for example, OpenMeeting. A secure key management methodology is proposed to ensure both a trusted quantum network and a secure videoconferencing system. The proposed methodology presents architecture on how to share secret keys between key management servers and distant parties in a secure domain without transmitting any secrets over insecure channels. The advantages of the proposed secure key management methodology overcome the limitations of quantum point-to-point key sharing by simultaneously distributing keys to multiple users; thus, it makes quantum cryptography a more practical and secure solution. The time required for the encryption and decryption may cause a few seconds delay in video transmission, but this proposed method protects against adversary attacks.

Study in Mechanism of Hydrogen Retention by C-SiC Films with IR

  • Huang, N.K.;Xiong, Q.;Liu, Y.G.;Yang, B.;Wang, D.Z.
    • Journal of Korean Vacuum Science & Technology
    • /
    • v.6 no.1
    • /
    • pp.46-50
    • /
    • 2002
  • C-SiC films with different content of SiC on stainless steel substrate were prepared with ion beam mixing. It was found that hydrogen concentrations in C-SiC coatings was higher than that in stainless steel after H$\^$+/ ion implantation followed by thermal annealing. Infrared (IR) transmission measurement was used to study the mechanism of hydrogen retention by C-SiC films. The vibrational features in the range between 400 and 3200 cm$\^$-1/ in IR transmission spectra show the Si-CH$_3$, Si-CH$_2$, Si-H, CH$_2$and CH$_3$bonds, which are responsible for retaining hydrogen.

  • PDF

Provably secure attribute based signcryption with delegated computation and efficient key updating

  • Hong, Hanshu;Xia, Yunhao;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2646-2659
    • /
    • 2017
  • Equipped with the advantages of flexible access control and fine-grained authentication, attribute based signcryption is diffusely designed for security preservation in many scenarios. However, realizing efficient key evolution and reducing the calculation costs are two challenges which should be given full consideration in attribute based cryptosystem. In this paper, we present a key-policy attribute based signcryption scheme (KP-ABSC) with delegated computation and efficient key updating. In our scheme, an access structure is embedded into user's private key, while ciphertexts corresponds a target attribute set. Only the two are matched can a user decrypt and verify the ciphertexts. When the access privileges have to be altered or key exposure happens, the system will evolve into the next time slice to preserve the forward security. What's more, data receivers can delegate most of the de-signcryption task to data server, which can reduce the calculation on client's side. By performance analysis, our scheme is shown to be secure and more efficient, which makes it a promising method for data protection in data outsourcing systems.

CKGS: A Way Of Compressed Key Guessing Space to Reduce Ghost Peaks

  • Li, Di;Li, Lang;Ou, Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.1047-1062
    • /
    • 2022
  • Differential power analysis (DPA) is disturbed by ghost peaks. There is a phenomenon that the mean absolute difference (MAD) value of the wrong key is higher than the correct key. We propose a compressed key guessing space (CKGS) scheme to solve this problem and analyze the AES algorithm. The DPA based on this scheme is named CKGS-DPA. Unlike traditional DPA, the CKGS-DPA uses two power leakage points for a combined attack. The first power leakage point is used to determine the key candidate interval, and the second is used for the final attack. First, we study the law of MAD values distribution when the attack point is AddRoundKey and explain why this point is not suitable for DPA. According to this law, we modify the selection function to change the distribution of MAD values. Then a key-related value screening algorithm is proposed to obtain key information. Finally, we construct two key candidate intervals of size 16 and reduce the key guessing space of the SubBytes attack from 256 to 32. Simulation experimental results show that CKGS-DPA reduces the power traces demand by 25% compared with DPA. Experiments performed on the ASCAD dataset show that CKGS-DPA reduces the power traces demand by at least 41% compared with DPA.

PZT membrane Piezoelectric Traveling Wave Motor

  • xin, Shen-De;an, Zhang-Bao;Lu jinan-guo;qing, Yang-Gen;yuan, Wang-Wei
    • Journal of the Korean Vacuum Society
    • /
    • v.6 no.S1
    • /
    • pp.89-95
    • /
    • 1997
  • A new type of piexoelectric membrane traveling wave motor has been designed and forbricated. The small motor is composed by the stator which is the combination of annular/circular membrane and metal elastic base using as the common electrode at some time and the rotor which is placed on the metal elastic body. Thus the motor structure is simple and easy to fabricate. The material of a piezoelectric membrane is fabricated by sol-gel method or wear-down method. A piezoelectric traveling wave motor has been fabricated with the stator diameter 8mm The total thickness of the stator is 350$\mu$m. Under the alternative excitation voltage 10-12V the revolving speed of the rotor is more than 100RPM.

  • PDF

Method Development for Electrotransformation of Acidithiobacillus caldus

  • Chen, Linxu;Lin, Jianqun;Li, Bing;Lin, Jianqiang;Liu, Xiangmei
    • Journal of Microbiology and Biotechnology
    • /
    • v.20 no.1
    • /
    • pp.39-44
    • /
    • 2010
  • Acidithiobacillus caldus is an acidophilic, chemolithotrophic bacterium that plays an important role in bioleaching. Gene transformation into A. caldus is difficult, and only the conjugation method was reported successful, which was a relatively sophisticated method. In this research, electrotransformation of A. caldus species was achieved for the first time using A. caldus Y-3 and plasmid pJRD215. Transformants were confirmed by colony PCR specific to the str gene on pJRD215, and the recovery of the plasmid from the presumptive transformants. Optimizations were made and the transformation efficiency was increased from 0.8 to $3.6{\times}10^4$ transformants/${\mu}g$ plasmid DNA. The developed electrotransformation method was convenient in introducing foreign genes into A. caldus.