• Title/Summary/Keyword: Message Communication

Search Result 1,629, Processing Time 0.027 seconds

Reverse Baby-step 2k-ary Adult-step Method for 𝜙((n) Decryption of Asymmetric-key RSA (비대칭키 RSA의 𝜙(n) 해독을 위한 역 아기걸음- 2k-ary 성인걸음법)

  • Lee, Sang-Un
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.25-31
    • /
    • 2014
  • When the public key e and the composite number n=pq are disclosed but not the private key d in an asymmetric-key RSA, message decryption is carried out by obtaining ${\phi}(n)=(p-1)(q-1)=n+1-(p+q)$ and subsequently computing $d=e^{-1}(mod{\phi}(n))$. The most commonly used decryption algorithm is integer factorization of n/p=q or $a^2{\equiv}b^2$(mod n), a=(p+q)/2, b=(q-p)/2. But many of the RSA numbers remain unfactorable. This paper therefore applies baby-step giant-step discrete logarithm and $2^k$-ary modular exponentiation to directly obtain ${\phi}(n)$. The proposed algorithm performs a reverse baby-step and $2^k$-ary adult-step. As a results, it reduces the execution time of basic adult-step to $1/2^k$ times and the memory $m={\lceil}\sqrt{n}{\rceil}$ to l, $a^l$ > n, hence obtaining ${\phi}(n)$ by executing within l times.

An Integrated Processing Method for Image and Sensing Data Based on Location in Mobile Sensor Networks (이동 센서 네트워크에서 위치 기반의 동영상 및 센싱 데이터 통합 처리 방안)

  • Ko, Minjung;Jung, Juyoung;Boo, Junpil;Kim, Dohyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.65-71
    • /
    • 2008
  • Recently, the research is progressing on the SWE(Sensor Web Enablement) platform of OGC(Open Geospatial Consortium) to provide the sensing data and moving pictures collected in a sensor network through the Internet Web. However, existed research does not deal with moving objects like cars, trains, ships, and person. Therefore, we present a method to deal with integrated sensing data collected by GPS device, sensor network, and image devices. Also, this paper proposes an integrated processing method for image and sensing data based on location in mobile sensor networks. Additionally, according to proposed methods, we design and implement the combine adapter. This combine adapter receives a contexts data, and provides the common interface included parsing, queueing, creating unified message function. We verity the proposed method which deal with the integrated sensing data based on combine adapter efficiently. Therefore, the research is expected to help the development of a various context information service based on location in future.

  • PDF

A Study of the Value of Psychological Recognition on The Pictorial Composition (화면구성에 있어서 심리적 인식에 관한 연구)

  • Moon, Chul
    • Archives of design research
    • /
    • v.13 no.1
    • /
    • pp.111-120
    • /
    • 2000
  • Certain complex forces are existing at the other side of a canvas. These are visual arrangements and within the arrangement, even the simple combination of dots and lines create more than visual patterns. No matter what form that visual art has taken, it is performed in a certain space and it is constucted with various visual elements. For effective communication, visual elements must form a stable sturcture by extablishing organic relationship among each other. These requires an understanding of the human visual characteristics and psychonology, because human sight senses the same biological and psychological visual elements differently in its force and weight, according to the position within a given space. Although the structure which controls such force and weight exists within a peice of work, it is a internal plan of the work that actually controls the communication through a man\ulcorner psychological reactions towards the horizontal and virtical structures within it. Moreover it is a visual statement that effectively expresses a theme or a message. This thesis has studied visual structures through the analysis of art pieces regarding of these kind of a visual picture plane, characteristics of a picture plane formed by a structure of force existing on the other side of the picture and the theory of visual balance. In addition, the aim of this study is to help designers who deals with visual image works to understand the visual structures and psychological recognitions and to apply these picture plane compositions at their real work by recognizing the psychological power within the construction elements.

  • PDF

A Remote Control System for Home Appliance using Low Speed Network (저속 네트워크 기반의 가전기기를 위한 원격 제어 시스템)

  • 김용호;이종환;유동희;김경석
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.6
    • /
    • pp.699-711
    • /
    • 2003
  • Home networking and Internet control technologies must satisfy three requirements with a view to being applied to home for raising the qualify of human life. Firstly, the cost of adding home networking ability to the traditional appliance must be minimized. Secondly, the mutual accessibility between home network and Internet must be guaranteed in the various Internet service environment of home. Finally, communication must be possible between the home network and the Internet that use different communications protocols. This paper proposes the ARCS (Appliance Remote Control System) that controls appliances based on LnCP (Living network Control Protocol) via the Internet. LnCP is the most cost-effective network and control protocol for home network. ARCS guarantees the accessibility from the Internet to home network and provides users with the virtual interface designed for controlling appliances using the Internet application program. In addition, this paper proposes AICS (Appliance Internet Control Specification). AICS, is based on LnCP, defines the message structure and control commands for the Internet control communication. ARCS and home gateway are developed to meet AICS.

Understanding of Visual storytelling in Information design (정보디자인에서 비주얼 스토리텔링의 이해)

  • Choi, Hyang-Ji;You, Sicheon
    • Smart Media Journal
    • /
    • v.3 no.2
    • /
    • pp.29-36
    • /
    • 2014
  • Human beings in their perception of the objects perceive the overall characteristics first rather than any parts of the object. In the process of 'information structuralization' and 'information visualization', therefore, it is needed the methods of narrative information representation based on a relationship of cause and effect in order to express effectively the whole messages which designers want to deliver. In this study, according to the concept of narrative information representation, we reviewed the meanings of the visual storytelling. As a result, we found that the visual storytelling has the three key roles which are 'narrative', 'visual communication catalyst', 'interacting'. First, the narrative describes the information logistics flow and it has a role to provide a specific story into information in the process of users' information understanding. Second, in the information design, the visual story telling not only expresses the information structure(story) but also uses the visual expressions to deliver the specific message, which is called visual communication catalyst. Third, the information design goes through the information structuralization and the information visualization stages through the visual storytelling to provide the experience factors to the information users, which is called the interactivity. The research implication is to provide the basis developing an approach method which is able to convey information messages effectively by improving information users' visual cognition and raising information users' memory.

An Analysis on the Prevention Effects of Forward and Chain Collision based on Vehicle-to-Vehicle Communication (차량 간 통신 기반 전방추돌 및 연쇄추돌 방지 효과 분석)

  • Jung, Sung-Dae;Kim, Tae-Oh;Lee, Sang-Sun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.4
    • /
    • pp.36-43
    • /
    • 2011
  • The forward collision of vehicles in high speed can cause a chain collisions and high fatality rate. Most of the forward collisions are caused by insufficient braking distance due to detection time of driver and safe distance. Also, accumulated detection time of driver is cause of chain collisions after the forward collision. The FVCWS prevents the forward collision by maintaining the safety distance inter-vehicle and reducing detection time of driver. However the FVCWS can cause chain collisions because the system that interacts only forward vehicle has accumulated detection time of driver. In this paper, we analyze forward and chain collisions of normal vehicles and FVCWS vehicles on static traveling scenario. And then, we analyze and compare V2V based FVCWS with them after explaining the system. The V2V FVCWS reduces detection time of driver alike FVCWS as well as remove accumulated detection time of driver by broadcasting emergence message to backward vehicles at the same time. Therefore, the system decrease possibility of forward and chain collisions. All backward normal vehicles and 3~4 backward FVCWS vehicles have possibility of forward and chain collisions in result of analysis. However V2V FVCWS vehicles almost do not chain collisions in the result.

A Study on the Securing Technological Safety of Mobile Electronic Notification Service in Public and Administrative Agencies (공공·행정기관 모바일전자고지서비스의 기술적인 안전성 확보 방안에 대한 연구)

  • Kim, Jong-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.7-16
    • /
    • 2020
  • The mobile electronic notification service delivers notifications through mobile phone text or app-based message push to solve various problems of the paper-based mail service. And it is a service that an electronic document relay company proves to prove delivery. In order for public and administrative agencies to provide mobile electronic notification service, the user's identification information of the mobile phone number or the subscribed app is required. To overcome these limitations, ICT-regulated sandbox system was used to allow collective conversion of users' resident registration numbers into connecting information (CI). Therefore, in this paper, we propose a technical method for safe management of user CI in mobile electronic notice service, identity verification of electronic notice readers, and prevention of forgery and forgery of electronic notices. Through the proposed method, it is confirmed that the service can be activated by minimizing the adverse function of the mobile electronic notification service by securing the user's convenience and technical safety for the CI.

The Design and Implementation of Secure Instant Messaging System (안전한 단문 전송 시스템 설계 및 구현)

  • Song, Gi-Pyeung;Sohn, Hong;Jo, In-June;Ju, Young-Ki;Lee, Dal-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.2
    • /
    • pp.357-364
    • /
    • 2001
  • The Instant Messenger(IM) is the most popular personal communication tool today. IM is a tool that can substitute E-mail for a person, and can secure the user for a company. Further, it is claimed as it has a limitless potential. However, there has been several reports on security issues. It has known that the transmitting message is not secured for the attacks, and hacking tools has been developed. In addition, several reports has been made regards to the vulnerability. In other words, anyone can peep through and manipulate the messages that are sent or received via IM. This is a barrier for the IM to be developed as a corporate's strategic tool, and furthermore, it will create serious personal privacy issue. IETF IMPP Working (:roup is preparing a standard mutual relationship between IM. However, it is complicated due to the American On-Lines's absence, whom has ensured the most number of IM users. There was a discussion only about the form of the transmitting data, but it is insufficient state to discuss the security service for general. In this paper, 1 design and implement the Secure Instant Messaging System, to solve the IM's vulnerability and the security issue presented above.

  • PDF

A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment (클라우드 환경에서 안전한 스토리지 접근 제어를 위한 권한 관리 프로토콜 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.12-20
    • /
    • 2016
  • With the enhancements in existing major industries, cloud computing-based converging services have been created, as well as value-added industries. A variety of converging services are now provided, from personalized services up to industrial services. In Korea, they have become the driving force behind existing industries throughout the whole economy, but mainly in finance, mobile systems, social computing, and home services, based on cloud services. However, not only denial of service (DOS) and distributed DOS (DDOS) attacks have occurred, but also attack techniques targeting core data in storage servers. Even security threats that are hardly detected, such as multiple attacks on a certain target, APT, and backdoor penetration have also occurred. To supplement defenses against these, in this article, a protocol for authority management is designed to provide users with safe storage services. This protocol was studied in cases of integration between a cloud environment and big data-based technology, security threats, and their requirements. Also studied were amalgamation examples and their requirements in technology-based cloud environments and big data. With the protocol suggested, based on this, security was analyzed for attack techniques that occur in the existing cloud environment, as well as big data-based techniques, in order to find improvements in session key development of approximately 55%.

Route Optimization Scheme using Routing Protocol in Nested Mobile Networks (중첩된 이동 네트워크환경에서 동적 라우팅 프로토콜을 이용한 경로 최적화 기법)

  • Kim, Eui-Kook;Lee, Jong-Hyup
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.1966-1975
    • /
    • 2008
  • NEMO Basic Support Protocol standardized in IETF provides the seamless communication environment to all nodes within the mobile network regardless of the network movement while the network is moving. According to the standard, when the mobile network moves outside of its home network the network can make use of the binding update message or dynamic routing protocol in order to register the mobility information into the Home Agent(HA). But because these two methods don't consider the route optimization, all packets destined to Mobile Network Nodes(MNNs) attached into the Mobile Router(MR) have to go through HAs of MRs so that they bring on the transmission delay and the waste of the bandwidth. This situation is to be worse and causes the packet fragmentation problem if MRs within the mobile network are nested. Even though there have been some researches about the route optimization to recover the problems, they have problems in the packet transmission performance side. In this paper, we propose a new scheme to improve the network performance by using a dynamic routing protocol and minimizing the number of HAs on the end-to-end path. Various performance evaluations show that the proposed mechanism gives better performance in view of the packet transmission compared to the existing schemes.