• Title/Summary/Keyword: Modular exponential

Search Result 5, Processing Time 0.025 seconds

Design of RSA cryptographic circuit for small chip area using refined Montgomery algorithm (개선된 몽고메리 알고리즘을 이용한 저면적용 RSA 암호 회로 설계)

  • 김무섭;최용제;김호원;정교일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.5
    • /
    • pp.95-105
    • /
    • 2002
  • This paper describes an efficient method to implement a hardware circuit of RSA public key cryptographic algorithm, which is important to public-key cryptographic system for an authentication, a key exchange and a digital signature. The RSA algorithm needs a modular exponential for its cryptographic operation, and the modular exponential operation is consists of repeated modular multiplication. In a numerous algorithm to compute a modular multiplication, the Montgomery algorithm is one of the most widely used algorithms for its conspicuous efficiency on hardware implementation. Over the past a few decades a considerable number of studies have been conducted on the efficient hardware design of modular multiplication for RSA cryptographic system. But many of those studies focused on the decrease of operating time for its higher performance. The most important thing to design a hardware circuit, which has a limit on a circuit area, is a trade off between a small circuit area and a feasible operating time. For these reasons, we modified the Montgomery algorithm for its efficient hardware structure for a system having a limit in its circuit area and implemented the refined algorithm in the IESA system developed for ETRI's smart card emulating system.

An Approximation Approach for Solving a Continuous Review Inventory System Considering Service Cost (서비스 비용을 고려한 연속적 재고관리시스템 해결을 위한 근사법)

  • Lee, Dongju;Lee, Chang-Yong
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.2
    • /
    • pp.40-46
    • /
    • 2015
  • The modular assembly system can make it possible for the variety of products to be assembled in a short lead time. In this system, necessary components are assembled to optional components tailor to customers' orders. Budget for inventory investments composed of inventory and purchasing costs are practically limited and the purchasing cost is often paid when an order is arrived. Service cost is assumed to be proportional to service level and it is included in budget constraint. We develop a heuristic procedure to find a good solution for a continuous review inventory system of the modular assembly system with a budget constraint. A regression analysis using a quadratic function based on the exponential function is applied to the cumulative density function of a normal distribution. With the regression result, an efficient heuristics is proposed by using an approximation for some complex functions that are composed of exponential functions only. A simple problem is introduced to illustrate the proposed heuristics.

Design and Implementation of a new XML-Signcryption scheme to protect the XML document (XML 문서 보안을 위한 새로운 XML-Signcryption scheme 설계 및 구현)

  • Han, Myung-Jin;Lee, Young-Kyung;Shin, Jung-Hwa;Rhee, Kyung-Hyung
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.405-412
    • /
    • 2003
  • As the XML is approved standard language by the UN, the progress which complemented the XML security has being processed rapidly. In this paper, we design and implement the "XML-Signcryption" as a security mechanism to protect the XML document that can operate between other platforms. The signature and encryption which is the standard specification in W3C needs to be able to proceed them separately. Generally the signature and encryption require four times modular exponential operation, however the signcryption only needed three times modular exponential operation. This will benefit overall system effectiveness in terms of cost. And this scheme offers to convenient the user, because the signature and encryption implement as a single XML format. This tool can save the parsing time as a number of tags is few within a document. And also, in this paper, based on a research of Web Services security, we can apply XML-Signcryption to the SOAP message to provide the security services. Based on the XML-Signcryption scheme which provides confidentiality, integrity, authentication and non-repudiation to the XML document and Web Service security simultaneously.

Development of Encryption System for Facsimile (팩시밀리용 암호 시스템 개발)

  • Yoo Byong-wook;Han Sang-soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.2
    • /
    • pp.344-352
    • /
    • 2006
  • We developed the facsimile encryption system that could send/receive the cipher text and plain text automatically. This facsimile encryption system is adopting the 128bits SEED encryption algorithm, 1024bits modular and 256bits exponential Diffie-Hellman key exchange method. We can reduce the cipher text transmitting time by developing the Dual Facsimile Server, it can make the real time encryption communication. Key is safely exchanged by the exchanging the listed serial numbers when the Diffie-Hellman key exchanging.

Analysis of activated colloidal crud in advanced and modular reactor under pump coastdown with kinetic corrosion

  • Khurram Mehboob;Yahya A. Al-Zahrani
    • Nuclear Engineering and Technology
    • /
    • v.54 no.12
    • /
    • pp.4571-4584
    • /
    • 2022
  • The analysis of rapid flow transients in Reactor Coolant Pumps (RCP) is essential for a reactor safety study. An accurate and precise analysis of the RCP coastdown is necessary for the reactor design. The coastdown of RCP affects the coolant temperature and the colloidal crud in the primary coolant. A realistic and kinetic model has been used to investigate the behavior of activated colloidal crud in the primary coolant and steam generator that solves the pump speed analytically. The analytic solution of the non-dimensional flow rate has been determined by the energy ratio β. The kinetic energy of the coolant fluid and the kinetic energy stored in the rotating parts of a pump are two essential parameters in the form of β. Under normal operation, the pump's speed and moment of inertia are constant. However, in a coastdown situation, kinetic damping in the interval has been implemented. A dynamic model ACCP-SMART has been developed for System Integrated Modular and Advanced Reactor (SMART) to investigate the corrosion due to activated colloidal crud. The Fickian diffusion model has been implemented as the reference corrosion model for the constituent component of the primary loop of the SMART reactor. The activated colloidal crud activity in the primary coolant and steam generator of the SMART reactor has been studied for different equilibrium corrosion rates, linear increase in corrosion rate, and dynamic RCP coastdown situation energy ratio b. The coolant specific activity of SMART reactor equilibrium corrosion (4.0 mg s-1) has been found 9.63×10-3 µCi cm-3, 3.53×10-3 µC cm-3, 2.39×10-2 µC cm-3, 8.10×10-3 µC cm-3, 6.77× 10-3 µC cm-3, 4.95×10-4 µC cm-3, 1.19×10-3 µC cm-3, and 7.87×10-4 µC cm-3 for 24Na, 54Mn, 56Mn, 59Fe, 58Co, 60Co, 99Mo, and 51Cr which are 14.95%, 5.48%, 37.08%, 12.57%, 10.51%, 0.77%, 18.50%, and 0.12% respectively. For linear and exponential coastdown with a constant corrosion rate, the total coolant and steam generator activity approaches a higher saturation value than the normal values. The coolant and steam generator activity changes considerably with kinetic corrosion rate, equilibrium corrosion, growth of corrosion rate (ΔC/Δt), and RCP coastdown situations. The effect of the RCP coastdown on the specific activity of the steam generators is smeared by linearly rising corrosion rates, equilibrium corrosion, and rapid coasting down of the RCP. However, the time taken to reach the saturation activity is also influenced by the slope of corrosion rate, coastdown situation, equilibrium corrosion rate, and energy ratio β.