• Title/Summary/Keyword: Quantum communication

Search Result 189, Processing Time 0.02 seconds

Lasing Characteristics of GaAs-Based 1300 nm Wavelength Region InAs Quantum Dot Laser Diode (GaAs 기반 1300 nm 파장대역 InAs 양자점 레이저 다이오드의 발진 특성)

  • Kim, K.W.;Choa, N.K.;Song, J.D.;Lee, J.I.;Park, Jeong-Ho;Lee, Y.J.;Choi, W.J.
    • Journal of the Korean Vacuum Society
    • /
    • v.18 no.4
    • /
    • pp.266-271
    • /
    • 2009
  • We have investigated the lasing characteristics of GaAs-based 1300 nm wavelength region InAs Quantum Dot Laser Diode grown by Migration Enhanced Molecular Beam Epitaxy. Under a pulsed and CW operation, we observed the state switching of lasing wavelength from ground state (1302 nm) to excited state (1206 nm) due to the gain saturation of ground state. Under a pulsed operation, $J_{th}=92A/cm^2$, $\lambda_L=1311\;nm$ and under a CW operation, $J_{th}=247A/cm^2$, $\lambda_L=1320\;nm$.

A Proposal for Drone Entity Identification and Secure Information Provision Technology Using Quantum Entropy Chip-Based Cryptographic Module in WLAN Environment (무선랜 환경에서 양자 엔트로피 칩 기반 암호모듈을 적용한 드론 피아식별과 안전한 정보 제공 기술 제안)

  • Jung, Seowoo;Yun, Seunghwan;Yi, Okyeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.891-898
    • /
    • 2022
  • Along with global interest, drones are expanding the base of utilization such as transportation of goods, forest protection, and safety management, and cluster flights are being applied in various fields such as military operations and environmental monitoring. Currently, specialized networks such as e-UM 5G for services in specific industries are being established in Korea. In this regard, drone systems are also moving to establish specialized networks to provide services that are fused with AI and autonomous flight. As drones converge with various services, various security threats in various environments are also subordinated, and in response, requirements and guidelines for drone security are being prepared in Korea. In this paper, we propose a technology method for peer identification and safe information provision between cluster flight drones by utilizing a cryptographic module equipped with wireless LAN and quantum entropy-based random number generator in a cluster flight system and a mobile communication network such as e-UM 5G.

Proposed that Application of the Security Algorithm for Implement Smart m-Gov (스마트 전자정부 구현을 위한 보안 알고리즘 응용 제안)

  • Rim, Kwang-Cheol;Choung, Young-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.11-17
    • /
    • 2014
  • As ICT Ecosystem does, electronic government changes in its form. Accordingly, in order to realize Smarter m-Gov, the governments need to vitalize m-Gov services and enact technology policy. Therefor, this manuscript suggests possible model of m-Gov realization and security algorithm as a technology policy which applies quantum cryptography system to server security for the construction of secured m-Gov's infrastructure. What the manuscript suggests seeks administrative ideas of Smarter m-Gov's services which contain security, stability, and economic feasibility for the benefits of nation and enterprises.

Design of Extendable QCA 4-to-2 Encoder Based on Majority Gate (확장성을 고려한 다수결 게이트 기반의 QCA 4-to-2 인코더 설계)

  • Kim, Tae-Hwan;Jeon, Jun-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.603-608
    • /
    • 2016
  • Encoding means converting or processing form or format of information into the other forms to standardize, secure, improve processing speed, store saving spaces and etc. Also, Encoding is converting the information so as to do transmit other form on the sender's information to the receiver in Information-Communication. The device that is conducting the processing is called the encoder. In this dissertation, proposes an encoder of the most basic 4-to-2 encoder. proposed encoder consists of two OR-gate and the proposed structure designs and optimize the spacing of the cell for the purpose of minimizing noise between wiring. Through QCADesigner conducts simulation of the proposed encoder and analyzes the results confirm the effectiveness.

Examination of different socioeconomic factors that contribute to the public acceptance of nuclear energy

  • Nguyen, Viet Phuong;Yim, Man-Sung
    • Nuclear Engineering and Technology
    • /
    • v.50 no.5
    • /
    • pp.767-772
    • /
    • 2018
  • Public acceptance is a major issue that will determine the future of nuclear energy. In this article, we review relevant studies and identify several common patterns of nuclear public acceptance. Based on these patterns and four categories of factors, we propose hypotheses on the impact of different socioeconomic factors on the public opinion of nuclear energy. These factors were demographic and social influences, politico-economic, energy conditions, and nuclear accidents and natural risks. We tested these hypotheses using a data set including survey results on public opinion of nuclear energy in 59 countries from 1987 to 2014. Results of the regression analysis generally verified the proposed hypotheses, especially regarding the positive impact of education or geological suitability and the negative effect of improved living standards and democracy on nuclear acceptance. We propose policy recommendations, including a better focus on education and communication and a thorough consideration of the social and geological conditions a country needs to make before deciding to go nuclear. Potential weaknesses of this study are also discussed, including the possible causal relation between independent variables and the binary nature of the dependent variable.

Proposing a Simple Radiation Scale for the Public: Radiation Index

  • Cho, Gyuseong;Kim, Jong Hyun;Park, Tae Soon;Cho, Kunwoo
    • Nuclear Engineering and Technology
    • /
    • v.49 no.3
    • /
    • pp.598-608
    • /
    • 2017
  • A new radiation scale is proposed. With empathy toward the vast majority of people who are not well versed in radiation and related matters, and thus suffering from misunderstanding that breeds unnecessary fear of radiation, the aim of proposing a new radiation scale, radiation index (RAIN), is to put the general public at ease with the concept of radiation. RAIN is defined in dimensionless numbers that relate any specific radiation dose to a properly defined reference level. As RAIN is expressed in plain numbers without an attached scientific unit, the public will feel comfortable with its friendly look, which in turn should help them understand radiation dose levels easily and allay their anxieties about radiation. The expanded awareness and proper understanding of radiation will empower the public to feel that they are not hopeless victims of radiation. The correspondence between RAIN and the specific accumulated dose is established. The equivalence will allow RAIN to serve as a common language of communication for the general public with which they can converse with radiation experts to discuss matters related to radiation safety, radiation diagnosis and therapy, nuclear accidents, and other related matters. Such fruitful dialogues will ultimately enhance public acceptance of radiation and associated technologies.

Montgomery Multiplier with Very Regular Behavior

  • Yoo-Jin Baek
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.17-28
    • /
    • 2024
  • As listed as one of the most important requirements for Post-Quantum Cryptography standardization process by National Institute of Standards and Technology, the resistance to various side-channel attacks is considered very critical in deploying cryptosystems in practice. In fact, cryptosystems can easily be broken by side-channel attacks, even though they are considered to be secure in the mathematical point of view. The timing attack(TA) and the simple power analysis attack(SPA) are such side-channel attack methods which can reveal sensitive information by analyzing the timing behavior or the power consumption pattern of cryptographic operations. Thus, appropriate measures against such attacks must carefully be considered in the early stage of cryptosystem's implementation process. The Montgomery multiplier is a commonly used and classical gadget in implementing big-number-based cryptosystems including RSA and ECC. And, as recently proposed as an alternative of building blocks for implementing post quantum cryptography such as lattice-based cryptography, the big-number multiplier including the Montgomery multiplier still plays a role in modern cryptography. However, in spite of its effectiveness and wide-adoption, the multiplier is known to be vulnerable to TA and SPA. And this paper proposes a new countermeasure for the Montgomery multiplier against TA and SPA. Briefly speaking, the new measure first represents a multiplication operand without 0 digits, so the resulting multiplication operation behaves in a very regular manner. Also, the new algorithm removes the extra final reduction (which is intrinsic to the modular multiplication) to make the resulting multiplier more timing-independent. Consequently, the resulting multiplier operates in constant time so that it totally removes any TA and SPA vulnerabilities. Since the proposed method can process multi bits at a time, implementers can also trade-off the performance with the resource usage to get desirable implementation characteristics.

A Study on the Establishment of Entropy Source Model Using Quantum Characteristic-Based Chips (양자 특성 기반 칩을 활용한 엔트로피 소스 모델 수립 방법에 관한 연구)

  • Kim, Dae-Hyung;Kim, Jubin;Ji, Dong-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.140-142
    • /
    • 2021
  • Mobile communication technology after 5th generation requires high speed, hyper-connection, and low latency communication. In order to meet technical requirements for secure hyper-connectivity, low-spec IoT devices that are considered the end of IoT services must also be able to provide the same level of security as high-spec servers. For the purpose of performing these security functions, it is required for cryptographic keys to have the necessary degree of stability in cryptographic algorithms. Cryptographic keys are usually generated from cryptographic random number generators. At this time, good noise sources are needed to generate random numbers, and hardware random number generators such as TRNG are used because it is difficult for the low-spec device environment to obtain sufficient noise sources. In this paper we used the chip which is based on quantum characteristics where the decay of radioactive isotopes is unpredictable, and we presented a variety of methods (TRNG) obtaining an entropy source in the form of binary-bit series. In addition, we conducted the NIST SP 800-90B test for the entropy of output values generated by each TRNG to compare the amount of entropy with each method.

  • PDF

Design and Implementation of CAN IP using FPGA (FPGA를 이용한 CAN 통신 IP 설계 및 구현)

  • Son, Yeseul;Park, Jungkeun;Kang, Taesam
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.22 no.8
    • /
    • pp.671-677
    • /
    • 2016
  • A Controller Area Network (CAN) is a serial communication protocol that is highly reliable and efficient in many aspects, such as wiring cost and space, system flexibility, and network maintenance. Therefore, it is chosen for the communication protocol between a single chip controller based on Field Programmable Gate Array (FPGA) and peripheral devices. In this paper, the design and implementation of CAN IP, which is written in VHSIC Hardware Description Language (VHDL), is presented. The implemented CAN IP is based on the CAN 2.0A specification. The CAN IP consists of three processes: clock generator, bit timing, and bit streaming. The clock generator process generates a time quantum clock. The bit timing process does synchronization, receives bits from the Rx port, and transmits bits to the Tx port. The bit streaming process generates a bit stream, which is made from a message received from a micro controller subsystem, receives a bit stream from the bit timing process, and handles errors depending on the state of the CAN node and CAN message fields. The implemented CAN IP is synthesized and downloaded into SmartFusion FPGA. Simulations using ModelSim and chip test results show that the implemented CAN IP conforms to the CAN 2.0A specification.

Mode Behavior of Circular Vertical-Cavity Surface-Emitting Laser (원형 수직 캐비티 표면 광방출 레이저의 모드특성)

  • Ho, Kwang-Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.51-56
    • /
    • 2012
  • The resonance properties of circular vertical-cavity surface-emitting lasers (VCSELs) are studied by using a newly developed equivalent network approach. Optical parameters, such as the stop-band or the reflectivity of periodic Bragg mirrors and the resonance wavelength, are explored for the design of these structures. To evaluate the differential quantum efficiency and the threshold current density, a transverse resonance condition of circular modal transmission-line theory is also utilized. This approach dramatically reduces the computational time as well as gives an explicit insight to explore the optical characteristics of circular VCSELs.