• Title/Summary/Keyword: Pseudo-symmetric

Search Result 70, Processing Time 0.022 seconds

1D FN-MLCA and 3D Chaotic Cat Map Based Color Image Encryption (1차원 FN-MLCA와 3차원 카오틱 캣 맵 기반의 컬러 이미지 암호화)

  • Choi, Un Sook
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.3
    • /
    • pp.406-415
    • /
    • 2021
  • The worldwide spread of the Internet and the digital information revolution have resulted in a rapid increase in the use and transmission of multimedia information due to the rapid development of communication technologies. It is important to protect images in order to prevent problems such as piracy and illegal distribution. To solve this problem, I propose a new digital color image encryption algorithm in this paper. I design a new pseudo-random number generator based on 1D five-neighborhood maximum length cellular automata (FN-MLCA) to change the pixel values of the plain image into unpredictable values. And then I use a 3D chaotic cat map to effectively shuffle the positions of the image pixel. In this paper, I propose a method to construct a new MLCA by modeling 1D FN-MLCA. This result is an extension of 1D 3-neighborhood CA and shows that more 1D MLCAs can be synthesized. The safety of the proposed algorithm is verified through various statistical analyses.

Enhanced Key Distribution Scheme in Wireless Sensor Networks (무선 센서 네트워크에서의 향상된 키 분배 기법)

  • Cho Jung-Sik;Yeo Sang-Soo;Kim Sung Kwon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.151-153
    • /
    • 2005
  • 무선 센서 네트워크는 방대한 응용분야와 유비쿼터스 환경 하에서 중요한 한 부분을 차지하며 그 유용성을 입증하고 있다. 이런 무선 센서 네트워크의 센서 노드는 작은 크기를 바탕으로 목표 장소에 임의로 배치되어 다양한 데이터를 수집하는 능력이 탁월하다 하지만 이런 장점은 센서 노드의 한정된 하드웨어 능력과 전원공급 문제, 물리적 노출 문제로 인해 스스로를 위험에 노출시키는 여지를 만들게 되었다. 즉 일반적으로 사용되어지는 네트워크 보안 방법을 무선 센서 네트워크에 적응하기에는 센서 노드 능력에 한계가 있으며, 환경적 요소로 인해 불가능하다. 따라서 무선 센서 네트워크의 특성을 감안한 효과적인 보안 방법이 필요하며, 이런 맥락에 본 논문은 무선 센서 네트워크의 하드웨어적인 한계를 감안한 대칭키(Symmetric key) 기반의 키 분배 기법을 제안하고자 한다. 제안하는 기법에서는 모든 노드가 공통으로 소유한 전체 마스터 키(master key)와 의사 난수 생성기(pseudo random number generator:PRNG), 그리고 특정 대상으로부터 분배되는 난수(random number)의 조합을 통해 임의의 키를 생성, 갱신함으로써 다양한 종류의 무선 센서 네트워크 모델에 유연하게 대처할 수 있도록 하였다. 또한 이를 위한 통신 회수를 최소화함으로써 효율성을 제공해 준다.

  • PDF

Belt and Road Initiatives and the Competitiveness of Natural Rubber Exports: Evidence from the BRI Region

  • MOHAMAD, Abdul Hayy Haziq;ZAINUDDIN, Muhamad Rias K.V.
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.11
    • /
    • pp.145-155
    • /
    • 2021
  • This study examines the export competitiveness of four major natural rubber exporters in the Belt and Road Initiative (BRI) region and investigates the factors affecting bilateral natural rubber export. This study utilized the revealed symmetric comparative advantage (RSCA) to measure export competitiveness. Next, this study employed the gravity model using the Poisson Pseudo Maximum Likelihood (PPML) estimation to analyze the factors affecting bilateral export from the four major natural rubber exporters to 46 countries in the region. The analysis is conducted by using annual data from 2001 till 2018. The findings showed that all four major exporters maintained their export competitiveness. Indonesia and Vietnam notably exhibited increasing trends in the early 2000s. Besides, the market share for Malaysia and Vietnam have increased from 2013 to 2015 with the BRI implementation in 2013. In addition, this study discovered that non-tariff measures (NTM) have a positive and significant impact on the bilateral export of natural rubber. The overall findings strongly indicate that the natural rubber export has increased post BRI announcement. The outcome highlighted the benefits of BRI implementation on the natural rubber export. This study is the first attempt to apply the gravity model on the natural rubber exports within the BRI region.

Estimation of 3D active earth pressure under nonlinear strength condition

  • Zhang, D.B.;Jiang, Y.;Yang, X.L.
    • Geomechanics and Engineering
    • /
    • v.17 no.6
    • /
    • pp.515-525
    • /
    • 2019
  • The calculation of active earth pressure behind retaining wall is a typical three-dimensional (3D) problem with spatial effects. With the help of limit analysis, this paper firstly deduces the internal energy dissipation power equations and various external forces power equations of the 3D retaining wall under the nonlinear strength condition, such as to establish the work-energy balance equation. The pseudo-static method is used to consider the effect of earthquake on active earth pressure in horizontal state. The failure mode is a 3D curvilinear cone failure mechanism. For the different width of the retaining wall, the plane strain block is inserted in the symmetric plane. By optimizing all parameters, the maximum value of active earth pressure is calculated. In order to verify the validity of the new expressions obtained by the paper, the solutions are compared with previously published solutions. Agreement shows that the new expressions are effective. The results of different parameters are given in the forms of figures to analysis the influence caused by nonlinear strength parameters.

Seismic Traveltime Tomography in Inhomogeneous Tilted Transversely Isotropic Media (불균질 횡등방성 매질에서의 탄성파 주시토모그래피)

  • Jeong, Chang-Ho;Suh, Jung-Hee
    • Geophysics and Geophysical Exploration
    • /
    • v.10 no.4
    • /
    • pp.229-240
    • /
    • 2007
  • In this study, seismic anisotropic tomography algorithm was developed for imaging the seismic velocity anisotropy of the subsurface. This algorithm includes several inversion schemes in order to make the inversion process stable and robust. First of all, the set of the inversion parameters is limited to one slowness, two ratios of slowness and one direction of the anisotropy symmetric axis. The ranges of the inversion parameters are localized by the pseudobeta transform to obtain the reasonable inversion results and the inversion constraints are controlled efficiently by ACB(Active Constraint Balancing) method. Especially, the inversion using the Fresnel volume is applied to the anisotropic tomography and it can make the anisotropic tomography more stable than ray tomography as it widens the propagation angle coverage. The algorithm of anisotropic tomography is verified through the numerical experiments. And, it is applied to the real field data measured at limestone region and the results are discussed with the drill log and geological survey data. The anisotropic tomography algorithm will be able to provide the useful tool to evaluate and understand the geological structure of the subsurface more reasonably with the anisotropic characteristics.

An Efficient Encryption Scheme Combining PRNG and Permutation for Mobile Multimedia Data (모바일 멀티미디어 데이타를 위한, 의사난수생성기와 순열 기법을 결합한 효율적인 암호화 기법)

  • Han, Jung-Kyu;Cho, Yoo-Kun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.11
    • /
    • pp.581-588
    • /
    • 2007
  • In Digital Right Management, symmetric cipher is used for content encryption to reduce encryption cost, AES, advanced encryption standard is usually used to multimedia encryption under desktop environment because of its reasonable security level and computation cost. But mobile handheld device often uses slow speed processor and operates under battery-powered environment. Therefore it requires low computation cost and low energy consumption. This paper proposes new stream cipher scheme which combines pseudo random number generator(PRNG) and dynamically generated permutations. Proposed scheme activates PRNG and generates original key streams. Then it generates extended key streams by applying permutation to original sequence. These extended key streams are XORed with plaintext and generate ciphertext. Proposed scheme reduces the usage of PRNG. Therefore this scheme is fast and consumes less energy in comparison with normal stream cipher. Especially, this scheme shows great speed up (almost 2 times) than normal stream cipher scheme in random access.

Strongly Coupled Method for 2DOF Flutter Analysis (강성 결합 기법을 통한 2계 자유도 플러터 해석)

  • Ju, Wan-Don;Lee, Gwan-Jung;Lee, Dong-Ho;Lee, Gi-Hak
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.34 no.1
    • /
    • pp.24-31
    • /
    • 2006
  • In the present study, a strongly coupled analysis code is developed for transonic flutter analysis. For aerodynamic analysis, two dimensional Reynolds-Averaged Navier-Stokes equation was used for governing equation, and ε-SST for turbulence model, DP-SGS(Data Parallel Symmetric Gauss Seidel) Algorithm for parallelization algorithm. 2 degree-of-freedom pitch and plunge model was used for structural analysis. To obtain flutter response in the time domain, dual time stepping method was applied to both flow and structure solver. Strongly coupled method was implemented by successive iteration of fluid-structure interaction in pseudo time step. Computed results show flutter speed boundaries and limit cycle oscillation phenomena in addition to typical flutter responses - damped, divergent and neutral responses. It is also found that the accuracy of transonic flutter analysis is strongly dependent on the methodology of fluid-structure interaction as well as on the choice of turbulence model.

A Study on the Design of Key Scheduler Block Cryptosystem using PRN (PRN을 이용한 키 스케줄러 블록암호시스템 설계에 관한 연구)

  • 김종협;김환용
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.2
    • /
    • pp.112-121
    • /
    • 2003
  • Information Protection and cryptography technology is developed with if but solved problem of real time processing and secret maintain. Therefore this paper is Proposed new PRN-SEED(Pseudo-Random Number-SEED) for the increasing secret rate and processing rate perform performance analysis with existed other cryptography algorithms. Proposed new PRN-SEED crypto-algorithm increase in the processing rate than existed algorithms use bit and byte mixed operation with RNG(Random Number Generator). PRN-SEED that performs simultaneous operations have higher 1.03 in the processing rate and 2 in the cryptosystem performance than existed cryptosystems. Implementation for PRN-SEED use Synopsys Design Analyser Ver. 1999.10, samsung KG75 library and Synopsys VHDL Debegger. As a simulation result, symmetric cryptosystem DES operate 416Mbps at the 40MHz and Rijndael operate 612Mbps at the 50MHz. PRN-SEED cryptosystem have gate counting 10K and operate 430Mbps at the 40MHz and 630Mbps at the 50MHz.

  • PDF

An Study on the Analysis of Design Criteria for S-Box Based on Deep Learning (딥러닝 기반 S-Box 설계정보 분석 방법 연구)

  • Kim, Dong-hoon;Kim, Seonggyeom;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.337-347
    • /
    • 2020
  • In CRYPTO 2019, Gohr presents that Deep-learning can be used for cryptanalysis. In this paper, we verify whether Deep-learning can identify the structures of S-box. To this end, we conducted two experiments. First, we use DDT and LAT of S-boxes as the learning data, whose structure is one of mainly used S-box structures including Feistel, MISTY, SPN, and multiplicative inverse. Surprisingly, our Deep-learning algorithms can identify not only the structures but also the number of used rounds. The second application verifies the pseudo-randomness of and structures by increasing the nuber of rounds in each structure. Our Deep-learning algorithms outperform the theoretical distinguisher in terms of the number of rounds. In general, the design rationale of ciphers used for high level of confidentiality, such as for military purposes, tends to be concealed in order to interfere cryptanalysis. The methods presented in this paper show that Deep-learning can be utilized as a tool for analyzing such undisclosed design rationale.

Pseudo-Static Behaviors of U-shaped PSC Girder with Wide Flanges (확폭플랜지를 갖는 U형 프리스트레스 거더의 유사정적거동)

  • Rhee, In-Kyu;Lee, Joo-Beom;Kim, Lee-Hyeon;Park, Joo-Nam;Kwak, Jong-Won
    • Proceedings of the KSR Conference
    • /
    • 2008.11b
    • /
    • pp.993-999
    • /
    • 2008
  • A girder height limitation is the critical parameter for rapid construction of bridge deck and construction space limitation especially in urban area such as high population area and high density habitats. A standard post-tensioned I-shaped concrete girder usually demands relatively higher girder height in order to retain sufficient moment arm between compression force and tensile force. To elaborate this issue, a small U-shaped section with wide flanges can be used as a possible replacement of I-shaped standard girder. This prestressed concrete box girder allows more flexible girder height adjustment rather than standard I-shaped post-tensioned girder plus additional torsion resistance benefits of closed section. A 30m-long, 1.7m-high and 3.63m-wide actual small prestressed concrete box girder is designed and a laboratory test for its static behaviors by applying 6,200kN amount of load in the form of 4-point bending test was performed. The load-deflection curve and crack patterns at different loading stage are recorded. In addition, to extracting the dynamic characteristics such as natural frequency and damping ratio of this girder, several excitation tests with artificial mechanical exciter with un-symmetric mass are carried out using operational frequency sweep-up. Nonlinear finite element analysis of this 4 point bending test under monotonic static load is investigated and discussed with aids of concrete damaged plasticity formulation using ABAQUS program.

  • PDF