• Title/Summary/Keyword: S/KEY

Search Result 9,997, Processing Time 0.036 seconds

Performance Analysis of Key Distribution Protocol in Satellite Network (위성 통신망에서 키 분배 프로토콜의 성능분석)

  • 진상민;조동호;이상한;강건우
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.7A
    • /
    • pp.955-963
    • /
    • 1999
  • In this paper, in other to analyze the performance of efficient key distribution protocol, we evaluate the key distribution processing method of push model like the Kerberos and pull model such as X.9.17 used in wired network. Also, we evaluate the procedure of key distribution protocol in satellite network. Besides, we analyze the performance of key distribution protocol procedure in view of delay and throughput in the case that key distribution protocol is processed based on Inband/Outband channel.

  • PDF

A Dynamic Keyed Block Encryption Algorithm

  • Jiang, Wei;Kim, Sung-Je;Park, Kyoo-Seok
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.6
    • /
    • pp.852-859
    • /
    • 2008
  • In this paper, we propose a dynamic keyed block encryption algorithm. Most existing encryption algorithms are designed such that the key is not changed. Therefore, they have a disadvantage that plaintext could be easily exposed by differential and linear cryptanalysis. In the proposed algorithm, several key generators are designed, and a key generator is attached to the encryption procedure. After performing the encryption procedure, ciphertext and the initial key generating values are transferred to the receiver's key generator for decryption. Through simulation, the proposed algorithm is verified to satisfy the requirements of real-time processing and proved to have a high strength. It can be applied to practical use.

  • PDF

Efficient Password-based Key Exchange Protocol for Two users Registered in a Server (동일 서버를 사용하는 두 사용자간 효율적인 패스워드 기반의 키 교환 프로토콜)

  • Shin Seong-chul;Lee Sung-woon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.127-133
    • /
    • 2005
  • This paper presents a password-based key exchange protocol to guarantee secure communications for two users registered in a sever. In this protocol, the server is only responsible for the legality of the users but does not how the session key agreed between them. The protocol can resist the various attacks including server compromise attack and provide the perfect forward secrecy. The proposed protocol is efficient in terms of computation cost because of not employing the sewer's public key.

Taxonomical Studies of Genus Trichoderma in Korea (한국산 Trichoderma속의 분류)

  • 이훈구;이배함
    • Korean Journal of Microbiology
    • /
    • v.18 no.2
    • /
    • pp.73-90
    • /
    • 1980
  • Ninerty one of Trichoderma spp. were isolated from ginseng growing bed, dead trees and muchroom in Korea from March 1978 to June 1979. Six species were identified as T. hamatum(13 strains), T, roningii(17 strains), T. aureoviride(4 strains), but other six strains(strain No. 111, 125, 127, 130, and 503) unidentified by Rifai's key. The reason which is not identified is as following. According to Rifai's key, phialid, phialospore and colony's colour of four strains (strain No. 125, 126, 127 and 130) are like T. longibrachiatum, but they are different from Rifai's method, because sterile-hypha often appears. the fature of standard strain ATCC no. 13631 T. longibrachiatum is like ster9ile-hypha that is used strains in this experiment. The morphology of strain No.503 is the same as T. hamatum except phialospore. Gnerally, T. hamatum's phialospore is subcylindrical, but strain No. 503 is regular ovoid. Therefore, strain No.503 cannot be identified by Rifai's key. The property, strain No.111's phialid is very irregular $(5{\sim}20{\times}2{\sim}2.5{\mu})$) and its phialospore $(4.0{\sim}6.0{\times}3.0{\sim}4.0{\mu})$) is subcylindrical, is uncomfortable to Rifai's method. The standard strains used in this experiment are 7 kinds of Trichoderma spp. received from ATCC.

  • PDF

Association between PCR-RFLP Polymorphisms of Five Gene Loci and Milk Traits in Chinese Holstein

  • Zhang, R.F.;Chen, H.;Lei, C.Z.;Fang, X.T.;Zhang, Y.D.;Hu, S.R.;Su, L.H.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.20 no.2
    • /
    • pp.166-171
    • /
    • 2007
  • The objective of this study was to assess the association of polymorphisms in ${\kappa}$-cn, ${\beta}$-lg, ${\beta}$-lg 5′ flanking region, CSN1S2, and IGFBP-3 genes with milk production traits and mastitis-related traits in Chinese Holstein. Traits analyzed were 305 day standard milk yield, protein percentage, fat percentage, the ratio of fat percentage and protein percentage, pre-somatic cell count, somatic cell count, and somatic cell score, respectively. CSN1S2 locus was uninformative because only one genotype BB was found in Chinese Holstein. Allele frequencies of A and B in IGFBP-3 gene were 0.5738 and 0.4262 in Chinese Holstein population, which was different from reported Qinchuan cattle population. The genotypes of animals at IGFBP-3 locus significantly affected 305 day standard milk yield, protein percentage, and somatic cell score. The ${\beta}$-lg genotypes had a significant effect on protein percentage and the ratio of fat percentage and protein percentage. Polymorphism in ${\beta}$-lg 5′ flanking region was associated with 305 day standard milk yield, protein percentage, fat percentage, pre-somatic cell count, and somatic cell count. No significant associations of the polymorphism in ${\kappa}$-cn gene were observed for any trait.

Response of Saccharomyces cerevisiae to Ethanol Stress Involves Actions of Protein Asr1p

  • Ding, Junmei;Huang, Xiaowei;Zhao, Na;Gao, Feng;Lu, Qian;Zhang, Ke-Qin
    • Journal of Microbiology and Biotechnology
    • /
    • v.20 no.12
    • /
    • pp.1630-1636
    • /
    • 2010
  • During the fermentation process of Saccharomyces cerevisiae, yeast cells must rapidly respond to a wide variety of external stresses in order to survive the constantly changing environment, including ethanol stress. The accumulation of ethanol can severely inhibit cell growth activity and productivity. Thus, the response to changing ethanol concentrations is one of the most important stress reactions in S. cerevisiae and worthy of thorough investigation. Therefore, this study examined the relationship between ethanol tolerance in S. cerevisiae and a unique protein called alcohol sensitive RING/PHD finger 1 protein (Asr1p). A real-time PCR showed that upon exposure to 8% ethanol, the expression of Asr1 was continuously enhanced, reaching a peak 2 h after stimulation. This result was confirmed by monitoring the fluorescence levels using a strain with a green fluorescent protein tagged to the C-terminal of Asr1p. The fluorescent microscopy also revealed a change in the subcellular localization before and after stimulation. Furthermore, the disruption of the Asr1 gene resulted in hypersensitivity on the medium containing ethanol, when compared with the wild-type strain. Thus, when taken together, the present results suggest that Asr1 is involved in the response to ethanol stress in the yeast S. cerevisiae.

Exploration of the Glycosyltransferase BmmGT1 from a Marine-Derived Bacillus Strain as a Potential Enzyme Tool for Compound Glycol-Diversification

  • Liu, Quanquan;Ren, Pengfei;Liu, Yang;Qin, Wen;Li, Huayue;Li, Wenli
    • Journal of Microbiology and Biotechnology
    • /
    • v.28 no.6
    • /
    • pp.931-937
    • /
    • 2018
  • Glycosyltransferases (GTs) from microbes are an emerging and rich source for efficient glycol-transformation of natural/unnatural compounds. Here, we probed the catalytic capability and substrate promiscuity of BmmGT1 from marine-derived Bacillus methylotrophicus B-9987. The regioselectivity of BmmGT1 on macrolactin A (1) was explored by optimization of the reaction conditions, in which a series of O-glycosylated macrolactins (1a-1e) were generated, including two new di/tri-O-glucosyl analogs (1b and 1e). Furthermore, BmmGT1 was able to catalyze the glycosylation of the thiol (S-) or amine (N-) sites of phenolic compounds (2 and 3), leading to the generation of N- (2a) or S-glycosides (3a and 3b). The present study demonstrates that BmmGT1 could serve as a potential enzyme tool for O-, N-, or S-glycosyl structural diversification of compounds for drug discovery.

A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model

  • Lu, Yang;Li, Jiguo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1502-1522
    • /
    • 2019
  • Leakage of secret keys may be the most devastating problem in public key cryptosystems because it means that all security guarantees are missing. The forward security mechanism allows users to update secret keys frequently without updating public keys. Meanwhile, it ensures that an attacker is unable to derive a user's secret keys for any past time, even if it compromises the user's current secret key. Therefore, it offers an effective cryptographic approach to address the private key leakage problem. As an extension of the forward security mechanism in certificate-based public key cryptography, forward-secure certificate-based signature (FS-CBS) has many appealing merits, such as no key escrow, no secure channel and implicit authentication. Until now, there is only one FS-CBS scheme that does not employ the random oracles. Unfortunately, our cryptanalysis indicates that the scheme is subject to the security vulnerability due to the existential forgery attack from the malicious CA. Our attack demonstrates that a CA can destroy its existential unforgeability by implanting trapdoors in system parameters without knowing the target user's secret key. Therefore, it is fair to say that to design a FS-CBS scheme secure against malicious CAs without lying random oracles is still an unsolved issue. To address this problem, we put forward an enhanced FS-CBS scheme without random oracles. Our FS-CBS scheme not only fixes the security weakness in the original scheme, but also significantly optimizes the scheme efficiency. In the standard model, we formally prove its security under the complexity assumption of the square computational Diffie-Hellman problem. In addition, the comparison with the original FS-CBS scheme shows that our scheme offers stronger security guarantee and enjoys better performance.

Public Key Encryption with Keyword Search in Multi-Receiver Setting (다중 수신자 환경에서 키워드 검색 가능한 공개키 암호시스템)

  • Rhee, Hyun-Sook;Park, Jong-Hwan;Rhee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.31-38
    • /
    • 2009
  • To provide the privacy of a keyword, a public key encryption with keyword search(PEKS) firstly was propsed by Boneh et al. The PEKS scheme enables that an email sender sends an encrypted email with receiver's public key to an email server and a server can obtain the relation between the given encrypted email and an encrypted query generated by a receiver. In this email system, we easily consider the situation that a user sends the one identical encrypted email to multi-receiver like as group e-mail. Hwang and Lee proposed a searchable public key encryption considering multi-receivers. To reduce the size of transmission data and the server's computation is important issue in multi-receiver setting. In this paper, we propose an efficient searchable public key encryption for multi-receiver (mPEKS) which is more efficient and reduces the server's pairing computation.

Deformation mechanisms of shallow-buried pipelines during road widening: Field and numerical investigation

  • Long Chen;Chenlei Xie;Zi Ye;Yonghui Chen;Zhewei Chai;Yun Li
    • Geomechanics and Engineering
    • /
    • v.38 no.1
    • /
    • pp.15-28
    • /
    • 2024
  • The rapid development of the economy has compelled the widen of highways, and the main challenge of this undertaking lies in the uneven settlement of road embankments. Through field and numerical experiments, this study explores the deformation mechanism of shallow buried pipelines due to road widening. The utilization of Plaxis3D software, which is adapt at simulating complex engineering geological conditions, enables the simulation of the settlement of both the central and right-side road embankments. Comparing with other numerical software such as ABAQUS and COMSOL, Plaxis provided more constitutive models including HS, HSS and Hoek-Brown model. The work concludes that the uneven settlement of road cross-sections is positively correlated with the horizontal distance from the pipeline, with a maximum settlement of 73 mm observed after construction. Furthermore, based on the Winkler's assumption, theoretical settlement and stress calculation methods are established. Results indicate that the maximum difference between the calculated values of this formula and simulated values is 1.9% and 7%, respectively. Additionally, the study investigates the stress and settlement of the pipeline's top under different angles to understand its behavior under various conditions. It finds that with traffic loads applied to the new embankment, a lever effect occurs on the lower pipeline, with the fulcrum located within the central isolation zone, leading to a transition in curve type from "single peak and single valley" to "double peak and single valley." Moreover, the settlement of pipelines on both sides of the central isolation zone and the normal stress of the pipeline's top section are symmetrical.