• Title/Summary/Keyword: Key block

Search Result 688, Processing Time 0.026 seconds

Design and Implementation of a Improved Cipher Web Mail System using a Chaos Cipher (카오스 암호를 이용한 개선된 암호화 웹 메일 시스템의 설계와 구현)

  • Kim Dae-Young;Kim Tae-Sik
    • The KIPS Transactions:PartD
    • /
    • v.13D no.3 s.106
    • /
    • pp.437-444
    • /
    • 2006
  • A chaos cipher system that focuses on the stream cipher system has a demerit that the longer the text is, the slower the speed of the encryption and description and the transmission and reception. On this study, we designed the cipher web mail system showing much better capabilities than the existing web mail system as the text is longer. In the embodiment of the cipher web mail system, we developed the key stream, the encryption and description of the text and the inside and outside mail viewer and so on. After the efficiency test, it was valued high in the respect of the speed of the encryption and description and the transmission and reception. And it made up for the defect of the stream cipher system. We expect that we can use it through the persistent applied study in the server system security, the file security, the security of the internet information, the protection of the e-commerce system information and other fields based on the cipher technique as the wide use cipher system that can replace the block cipher system.

Replantation of Multi-level Amputated Digit (다중절단수지의 재접합술)

  • Kwon, Soon-Beom;Park, Ji-Ung;Cho, Sang-Hun;Seo, Hyung-Kyo;Whang, Jong-Ick
    • Archives of Plastic Surgery
    • /
    • v.38 no.5
    • /
    • pp.642-648
    • /
    • 2011
  • Purpose: The recent advances in microsurgical techniques and their refinement over the past decade have greatly expanded the indications for digital replantations and have enabled us to salvage severed fingers more often. Many studies have reported greater than 80% viability rates in replantation surgery with functional results. However, replantation of multi-level amputations still remain a challenging problem and the decision of whether or not to replant an amputated part is difficult even for an experienced reconstructive surgeon because the ultimate functional result is unpredictable. Methods: Between January of 2002 and May of 2008, we treated 10 multi-level amputated digits of 7 patients. After brachial plexus block, meticulous replantation procedure was performed under microscopic magnification. Postoperatively, hand elevation, heat lamp, drug therapy and hyperbaric oxygen therapy were applied with careful observation of digital circulation. Early rehabilitation protocol was performed for functional improvement. Results: Among the 19 amputated segments of 10 digits, 16 segments survived completely without any complications. Overall survival rate was 84%. Complete necrosis of one finger tip segment and partial necrosis of two distal amputated segments developed and subsequent surgical interventions such as groin flap, local advancement flap and skin graft were performed. The overall result was functionally and aesthetically satisfactory. Conclusion: We experienced successful replantations of multi-level amputated digits. When we encounter a multi-level amputation, the key question is whether or not it is a contraindication to replantation. Despite the demand for skillful microsurgical technique and longer operative time, the authors' results prove it is worth attempting replantations in multi-level amputation because of the superiority in aesthetic and functional results.

Evaluation of Risk Factors to Detect Anomaly in Water Supply Networks Based on the PROMETHEE and ANP (상수도관망의 이상징후 판정을 위한 위험요소 평가 - PROMETHEE와 ANP 기법 중심으로)

  • Hong, Sung-Jun;Lee, Yong-Dae;Kim, Sheung-Kown;Kim, Joong-Hoon
    • Journal of Korea Water Resources Association
    • /
    • v.39 no.1 s.162
    • /
    • pp.35-46
    • /
    • 2006
  • In this study, we proposed a layout of the integrated decision support system in order to prevent the contamination and to manage risk in water supply networks for safe and smooth water supply. We evaluated the priority of risk factors to detect anomaly in water supply networks using PROMETHEE and ANP techniques, which are applied to various Multi-Criteria Decision Making area in Europe and America. To develop the model, we selected pH, residual chlorine concentration, discharge, hydraulic pressure, electrical conductivity, turbidity, block leakage and water temperature as the key data item. We also chose pipe corrosion, pipe burst and water pollution in pipe as the criteria and then we present the results of PROMETHEE and ANP analysis. The evaluation results of the priority of risk factors in water supply networks will provide basic data to establish a contingency plan for accidents so that we can establish the specific emergency response procedures.

A Study on the Estimation Process of Material handling Equipment for Offshore Plant Using System Engineering Approach (시스템엔지니어링 기반 해양플랜트 Material handling 장비 수량산출 프로세스에 관한 연구)

  • Han, Seong-Jong;Seo, Young-Kyun;Cho, Mang-Ik;Kim, Hyung-Woo;Park, Chang-soo
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.22 no.6
    • /
    • pp.785-795
    • /
    • 2019
  • This paper is a study on the modeling of the quantity estimation model for offshore plant Material handling equipment in FEED(Front End Engineering Design) verification stage using system engineering approach which is an engineering design methods. The relevant engineering execution procedure is not systemized although the operation method and Material handling equipment selection with weight and space constraints is a key part of the FEED. Using the system engineering process, the stakeholder requirements analysis process, the system requirements analysis, and the final system architecture design were sequentially performed, and the process developed through the functional development diagram and Requirement traceability matrix (RTM) was verified. In addition, based on the established process, we propose a Material handling quantity estimation model and Quantity calculation verification Table that can be applied at the FEED verification stage and we verify the applicability through case studies.

Design of a Wide Tuning Range DCO for Mobile-DTV Applications (Mobile-DTV 응용을 위한 광대역 DCO 설계)

  • Song, Sung-Gun;Park, Sung-Mo
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.5
    • /
    • pp.614-621
    • /
    • 2011
  • This paper presents design of a wide tuning range digitally controlled oscillator(DCO) for Mobile-DTV applications. DCO is the key element of the ADPLL block that generates oscillation frequencies. We proposed a binary delay chain(BDC) structure, for wide tuning range DCO, modifying conventional fixed delay chain. The proposed structure generates oscillation frequencies by delay cell combination which has a variable delay time of $2^i$ in the range of $0{\leq}i{\leq}n-1$. The BOC structure can reduce the number of delay cells because it make possible to select delay cell and resolution. We simulated the proposed DCO by Cadence's Spectre RF tool in 1.8V chartered $0.18{\mu}m$ CMOS process. The simulation results showed 77MHz~2.07GHz frequency range and 3ps resolution. The phase noise yields -101dBc/Hz@1MHz at Mobile-DTV maximum frequency 1675MHz and the power consumption is 5.87mW. The proposed DCO satisfies Mobile-DTV standards such as ATSC-M/H, DVB-H, ISDB-T, T-DMB.

A Study on Maturity Model for the Assessment of Cyber Resilience Level in the Defence Information System (국방정보시스템 사이버복원력 수준 평가를 위한 성숙도모델에 관한 연구)

  • Choi, Jae-hyeok;Kim, Wan-ju;Lim, Jae-sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1153-1165
    • /
    • 2019
  • Recently, threats of hacking have been increasing on the national intelligence service network and key infrastructure, including the defense field. The defense information system responds to threats from the outside through the network separation, but if the defense information system is hacked, it has a serious impact on the operations of wartime or peacetime military forces. Today, cyberattacks and threats are rising to unpredictable levels and making it practically impossible to completely block and prevent hacking threats completly. So, in this study proposed a maturity model to assess the level of cyber-resilience, which is the ability to ensure the system's viability and maintain continuity through rapid response and recovery if signs of cyberattacks by the defense information system are expected or occurred. The proposed maturity model is expected to contribute to improving the cyber security level of the defense information system by assessing the level of cyber resilience of the defense information system and identifying and supplementing fields that are lacking.

Anti-tumorigenic and Invasive Activity of Colon Cancer Cells Transfected with the Retroviral Vector Encoding Tissue Inhibitor of Metalloproteinase-2 (레트로바이러스를 이용한 Tissue Inhibitor of Metalloproteinase-2 유전자 발현이 대장암 세포의 전이 및 종양형성에 미치는 영향)

  • 오일웅;정자영;장석기;이수해;김연수;손여원
    • YAKHAK HOEJI
    • /
    • v.48 no.3
    • /
    • pp.189-196
    • /
    • 2004
  • Matrix metalloproteinases (MMPs) and tissue inhibitors of MMPs (TIMPs) playa key role in tumor invasion and metastasis. As an inhibitor of MMP-2, TIMP-2 is known to block both the invasive and metastatic behavior of cancer cells, and decrease tumor growth activity. We performed this study to investigate the effects of TIMP-2 over-expression induced by retroviral mediated gene transfer in vitro and in vivo. The human colon cancer cell line SW480 was transfected with the retroviral vector encoding TIMP-2. The effects of TIMP-2 over-expression were analyzed by invasion assay and gelatinase activity test in colon cancer cells and tumorigencity in nude mice. In evaluation of the transfection efficiency of the retroviral vector encoding TIMP-2 in colon cancer cells, we confirmed up-regulation of TIMP-2 expression dependent on the time of cell culture. In addition, inhibition of MMP-2 expression in SW480/TIMP-2 was shown by gelatin zymography. In the in vitro invasion assay SW480/TIMP-2 inhibited the invasiveness on matrigel coated with collagen. To determine whether TIMP-2 can modulate in vivo tumorigenicity and metastasis, SW480/TIMP-2 cells were injected subcutaneously in nude mice. The tumor mass formation of SW480/TIMP-2 cells in nude mice was markedly decreased compared to nontransfected cancer cells. These results showed that colon cancer cells transfected with the retroviral vector encoding TIMP-2 inhibits the invasiveness in vitro and tumorigenicity in vivo.

Performance Improvement of Distributed Compressive Video Sensing Using Reliability Estimation (신뢰성 예측을 이용한 분산 압축 비디오 센싱의 성능 개선)

  • Kim, Jin-soo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.6
    • /
    • pp.47-58
    • /
    • 2018
  • Recently, remote sensing video applications have become increasingly important in many wireless networks. Distributed compressive video sensing (DCVS) framework in these applications has been studied to reduce encoding complexity and to simultaneously capture and compress video data. Specially, a motion compensated block compressed sensing with smoothed projected Landweber (MC-BCS-SPL) has been actively researched for one useful algorithm of DCVS schemes, However, conventional MC-BCS-SPL schemes do not provide good visual qualities in reconstructed Wyner-Ziv (WZ) frames. In this paper, the conventional schemes of MC-BCS-SPL are described and then upgraded to provide better visual qualities in WZ frames by introducing reliability estimate between adjacent key frames and by constructing efficiently motion-compensated interpolated frames. Through experimental results, it is shown that the proposed algorithm is effective in providing better visual qualities than conventional algorithm.

A Design of Security SoC Prototype Based on Cortex-M0 (Cortex-M0 기반의 보안 SoC 프로토타입 설계)

  • Choi, Jun-baek;Choe, Jun-yeong;Shin, Kyung-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.251-253
    • /
    • 2019
  • This paper describes an implementation of a security SoC (System-on-Chip) prototype that interfaces a microprocessor with a block cipher crypto-core. The Cortex-M0 was used as a microprocessor, and a crypto-core implemented by integrating ARIA and AES into a single hardware was used as an intellectual property (IP). The integrated ARIA-AES crypto-core supports five modes of operation including ECB, CBC, CFB, CTR and OFB, and two master key sizes of 128-bit and 256-bit. The integrated ARIA-AES crypto-core was interfaced to work with the AHB-light bus protocol of Cortex-M0, and the crypto-core IP was expected to operate at clock frequencies up to 50 MHz. The security SoC prototype was verified by BFM simulation, and then hardware-software co-verification was carried out with FPGA implementation.

  • PDF

Blockchain-based Personal Information Authentication Method using Zero Knowledge Proofs (영지식을 활용한 블록체인 기반 개인정보 인증 기법)

  • Lee, Kwang Kyu
    • Smart Media Journal
    • /
    • v.10 no.3
    • /
    • pp.48-53
    • /
    • 2021
  • The authentication process is a key step that should be used to verify that a user is legitimate, and it should be used to verify that a user is a legitimate user and grant access only to that user. Recently, two-factor authentication and OTP schemes are used by most applications to add a layer of security to the login process and to address the vulnerability of using only one factor for authentication, but this method also allows access to user accounts without permission. This is a known security vulnerability. In this paper, we propose a Zero Knowledge Proofs (ZKP) personal information authentication scheme based on a Smart Contract of a block chain that authenticates users with minimal personal information exposure conditions. This has the advantage of providing many security technologies to the authentication process based on blockchain technology, and that personal information authentication can be performed more safely than the existing authentication method.