• Title/Summary/Keyword: One way Function

Search Result 880, Processing Time 0.029 seconds

On the Enciphering by Using One-Way Function of the Finite Ring (유한환의 일향함수를 이용한 암호화에 대하여)

  • Kim, Chul
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.1 no.1
    • /
    • pp.79-84
    • /
    • 1991
  • We construct one-way function based on a finite ring. One-way function in this paper means that to find the inverse of the function is hard computationally. We have used the extension of group action to construct this function and applied it to encipher the given plain text. To decipher the enciphered text generated by this function is considerd\ed a hard problem. but not impossible theoretically. However, a successful enciphering system. for example, RSA system which depends on the difficulty of factoring, need not have mathematically perfectness.

Study on One-Way Functions for the Construction of Secure Encryption Schemes (Secure Encryption Schemes의 구축에 따른 One-Way 함수의 연구)

  • Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.75-80
    • /
    • 2003
  • One way Functions are similar to the passwords in the sense that are easy to compute and hard to invert. So they are the most basic primitive for cryptographic applications. Especially, it is well known that it needs to exist of one way functions for the existence of the encryption schemes. In this note, we devote to study the various properties of the one way functions to give the base for the construction of the secure encryption schemes. They include the study for a sort and part of one way functions. Also, we deal with the theoretical relationship between one way function and trapdoor function.

  • PDF

Evaluation of the Performance of One-way Drainage Filter by Field Test (시험시공을 통한 일방향 배수필터의 성능 평가)

  • Seo, Dong-Uk;Kim, Hyeon-Tae
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.54 no.4
    • /
    • pp.47-53
    • /
    • 2012
  • It is needed to install a one-way drainage filter to prevent a seepage from lake or river outside of embankment and to promote a drainage from a flood inside of embankment when dikes such as lake dike, river dike, etc are constructed. However, the results of research for one-way drainage filter are insufficient. Therefore, through the field test of one-way drainage filter, this study checked a function of one-way drainage filter with a test of performance. As a result of field test, water flow in dike was blocked in the interception direction of the section that one-way drainage filter was installed, but water passed to the flow allowance direction of the section. Therefore we confirmed the function of one-way drainage filter. Seepage quantity in the flow allowance direction of the one-way drainage filter section was low as 74.6~80.5 % than that in the section without installation of filter because of a reduction effect of seepage with filter. And seepage quantity of field test was low as 64.3~90.0 % than that in results of seepage analysis because the coefficient of permeability of embankment in field is different from the results of laboratory test. In the future, more study will be needed to solve several problems which are related to fix the filter on slide, durability of filter, etc.

ELKH, Efficient Group Key Management Protocol Using One-Way Function and XOR (일방향 함수와 XOR을 이용한 효율적인 그룹키 관리 프로토콜: ELKH)

  • 권정옥;황정연;김현정;이동훈;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.93-112
    • /
    • 2002
  • Since the multicast group which is composed of various members is dynamic, members of the group frequently join or leave. So, for a new session, group keys are efficiently updated and distributed. In this paper, we describe very simple and new efficient logical key hierarchy(ELKH) protocol which is based on an one-way function. In the previous schemes, when the group controller distributes new created keys or updated keys to the members the information is usally encryted and then transmited over a multicast channel. But ELKH secretes the multicast message by using the one-way function and XOR operator instead of encrypting it. Hence our main construction improves the computational efficiency required from the group controller and group memebers while doesn't increase size of re-keying message when compared to $EHBT^{[12]}$. Assuming the security of an underlying one-way function, we prove that our scheme satisfies forward secrecy and backward secrecy.

Secure Multicast Protocol Using One-way Function Trees (OFT를 사용한 안전한 멀티캐스트 프로토콜)

  • Cho, Hyun-Ho;Park, Young-Ho;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.391-394
    • /
    • 2001
  • 본 논문에서는 OFT(One-way Function Trees)를 사용한 안전한 멀티캐스트 프로토콜을 제안한다. 그룹 키의 생성시 모든 멤버의 참여를 보장하며, 각 멤버는 독립적으로 그룹키를 계산한다. 제안하는 프로토콜은 그룹키의 생성시 해쉬 함수와 비트단위 XOR 연산만을 수행하기 때문에 속도가 빠르며, 멤버의 가입, 탈퇴가 빈번히 발생하는 동적인 환경에서도 적합하다.

  • PDF

Interval Two-dimensional Hash Chains and Application to a DRM system

  • Jung, Chae-Duk;Shin, Weon;Hong, Young-Jin;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1663-1670
    • /
    • 2007
  • One-way hash chains are important cryptographic primitives and have been used as building blocks of various cryptographic applications. Advantages of one-way hash chains are their simplicity and efficiency for generation based on low-powered processors with short time. However, a drawback of one-way hash chains is their difficulty of control to compute interval values of one-way hash chains. That is, when hash values in one-way hash chain are used as encryption keys, if one hash value is compromised, then the attacker can compute other encryption keys from the compromised hash value. Therefore, direct use of one-way hash chains as encryption keys is limited to many cryptographic applications, such as pay per view system and DRM system. In this paper, we propose a new concept which is called interval hash chain using a hash function. In particular, proposed hash chains are made for only computing interval hash values by using two different one-way hash chains. The proposed scheme can be applied to contents encryption scheme for grading and partially usable contents in DRM system.

  • PDF

Study on Gear Meshing Force Signature Recovery Using Inverse Filter (역필터를 이용한 기어의 맞물림 힘 재생에 관한 연구)

  • 채장범
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.15 no.5
    • /
    • pp.28-33
    • /
    • 1998
  • In monitoring and diagnosing machinery with gear trains, gear meshing force are the important signature indicating the operating condition. The gear meshing forces, however, are extremely difficult to be measured while gears are rotating. One easy possible way is to measure vibrations which are produced and transferred by the gear meshing forces. While the gear meshing forces are traveling, the force waveforms are shaped by the path transfer function. In the paper, the way to recover the source waveform by eliminating the path effects is discussed using inverse filter.

  • PDF

Kirkwood-Buff Solution Theory (커크우드-버프 용액 이론)

  • Lim, Kyung-Hee
    • Journal of the Korean Applied Science and Technology
    • /
    • v.27 no.4
    • /
    • pp.452-460
    • /
    • 2010
  • Any theory of liquid should account for interactions between molecules, since molecules in a liquid are close to each other. For this matter statistical-mechanical methodology has been used and various models have been proposed on the basis of this methodology. Among them Kirkwood-Buff solution theory has attracted a lot of interest, because it is regarded as being the most powerful. In this article Kirkwood-Buff solution theory is revisited and its key equations are derived. On the way to these equations, the concepts of pair correlation function, radial distribution function, Kirkwood-Buff integration are explained and implemented. Since complexity of statical mechanics involved in this theory, the equations are applied to one-component systems and the results are compared to those obtained by classical thermodynamics. This may be a simple way for Kirkwood-Buff solution theory to be examined for its validity.

The Social Function of Clothes (Focusing on distinction)

  • Chyu, Sun
    • Proceedings of the Korea Society of Costume Conference
    • /
    • 2003.10a
    • /
    • pp.65-65
    • /
    • 2003
  • The clothing at present is a way which express one's personality and one can communicate with the others by means of the symbolism of clothing without language. This clothing has several functions. In this article, I would like to classify functions into three parts and particularly focus on the social function in clothing.

  • PDF

TOPOLOGICAL ENTROPY OF ONE DIMENSIONAL ITERATED FUNCTION SYSTEMS

  • Nia, Mehdi Fatehi;Moeinaddini, Fatemeh
    • Honam Mathematical Journal
    • /
    • v.42 no.4
    • /
    • pp.681-699
    • /
    • 2020
  • In this paper, topological entropy of iterated function systems (IFS) on one dimensional spaces is considered. Estimation of an upper bound of topological entropy of piecewise monotone IFS is obtained by open covers. Then, we provide a way to calculate topological entropy of piecewise monotone IFS. In the following, some examples are given to illustrate our theoretical results. Finally, we have a discussion about the possible applications of these examples in various sciences.