• Title/Summary/Keyword: Sender

Search Result 467, Processing Time 0.03 seconds

Signcryption Schemes with Forward Secrecy (Forward Secrecy를 제공하는 Signcryption 기법들)

  • 정희윤;이동훈;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.5
    • /
    • pp.43-52
    • /
    • 2001
  • Y. Zheng introduced a new type of cryptograghic primitive as \"signcryption\", which combines a function of digital signature scheme with a symmetric key encryption algorithm. Signcryption doesn\`t only provide authenticity and confidentiality in a single step, but also give more efficient computation than the traditional \"signature-then-encryption\". And C. Gamage proposed a proxy-signcryption that efficiently combines a proxy signature with the signcryption. But, in the proposed signcryption schemes, one who obtains the sender\`s private key can recover the original message of a signcrypted text. That is, forward secrecy is not offered by the signcryption scheme with respect to the sender\`s private key. In this paper, we will propose a modified signcryption of Zheng\`s signcryption and a variant of proxy-signcryption with forward secrecy.ith forward secrecy.

Secure Device to Device Communications using Lightweight Cryptographic Protocol

  • Ajith Kumar, V;Reddy, K Satyanarayan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.354-362
    • /
    • 2021
  • The device to device (D2D) communication is an important and emerging area for future cellular networks. It is concerned about all aspect of secure data transmission between end devices along with originality of the data. In this paradigm, the major concerns are about how keys are delivered between the devices when the devices require the cryptographic keys. Another major concern is how effectively the receiver device verifies the data sent by the sender device which means that the receiver checks the originality of the data. In order to fulfill these requirements, the proposed system able to derive a cryptographic key using a single secret key and these derived keys are securely transmitted to the intended receiver with procedure called mutual authentication. Initially, derived keys are computed by applying robust procedure so that any adversary feel difficulties for cracking the keys. The experimental results shows that both sender and receiver can identify themselves and receiver device will decrypt the data only after verifying the originality of the data. Only the devices which are mutually authenticated each other can interchange the data so that entry of the intruder node at any stage is not possible.

An Improvement of Performance for Data Downstream in IEEE 802.11x Wireless LAN Networks (IEEE 802.11x 무선 랜에서의 데이터 다운스트림 성능 향상)

  • Kim, Ji-Hong;Kim, Yong-Hyun;Hong, Youn-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.149-158
    • /
    • 2006
  • We proposed a method for improving a performance of TCP downstream between a desktop PC as a fixed host and a PDA as a mobile host in a wired and wireless network based on IEEE 802.11x wireless LAN. With data transmission between these heterogeneous terminals a receiving time during downstream is slower than that during upstream by 20% at maximum. The reason is that their congestion window size will be oscillated due to a significantly lower packet processing rate at receiver compared to a packet sending rate at sender. Thus it will cause to increase the number of control packets to negotiate their window size. To mitigate these allergies, we proposed two distinct methods. First, by increasing a buffer size of a PDA at application layer an internal processing speed of a socket receive buffer of TCP becomes faster and then the window size is more stable. However, a file access time in a PDA is kept nearly constant as the buffer size increases. With the buffer size of 32,768bytes the receiving time is faster by 32% than with that of 512bytes. Second, a delay between packets to be transmitted at sender should be given. With an inter-packet delay of 5ms at sender a resulting receiving time is faster by 7% than without such a delay.

An Efficient TCP Buffer Tuning Algorithm based on Packet Loss Ratio(TBT-PLR) (패킷 손실률에 기반한 효율적인 TCP Buffer Tuning 알고리즘)

  • Yoo Gi-Chul;Kim Dong-kyun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.121-128
    • /
    • 2005
  • Tho existing TCP(Transmission Control Protocol) is known to be unsuitable for a network with the characteristics of high RDP(Bandwidth-Delay Product) because of the fixed small or large buffer size at the TCP sender and receiver. Thus, some trial cases of adjusting the buffer sizes automatically with respect to network condition have been proposed to improve the end-to-end TCP throughput. ATBT(Automatic TCP fluffer Tuning) attempts to assure the buffer size of TCP sender according to its current congestion window size but the ATBT assumes that the buffer size of TCP receiver is maximum value that operating system defines. In DRS(Dynamic Right Sizing), by estimating the TCP arrival data of two times the amount TCP data received previously, the TCP receiver simply reserves the buffer size for the next arrival, accordingly. However, we do not need to reserve exactly two times of buffer size because of the possibility of TCP segment loss. We propose an efficient TCP buffer tuning technique(called TBT-PLR: TCP buffer tuning algorithm based on packet loss ratio) since we adopt the ATBT mechanism and the TBT-PLR mechanism for the TCP sender and the TCP receiver, respectively. For the purpose of testing the actual TCP performance, we implemented our TBT-PLR by modifying the linux kernel version 2.4.18 and evaluated the TCP performance by comparing TBT-PLR with the TCP schemes of the fixed buffer size. As a result, more balanced usage among TCP connections was obtained.

Development and Performance Study of a Zero-Copy File Transfer Mechanism for Ink-based PC Cluster Systems (VIA 기반 PC 클러스터 시스템을 위한 무복사 파일 전송 메커니즘의 개발 및 성능분석)

  • Park Sejin;Chung Sang-Hwa;Choi Bong-Sik;Kim Sang-Moon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.11_12
    • /
    • pp.557-565
    • /
    • 2005
  • This paper presents the development and implementation of a zero-copy file transfer mechanism that improves the efficiency of file transfers for PC cluster systems using hardware-based VIA(Virtual Interface Architecture) network adapters. VIA is one of the representative user-level communication interfaces, but because there is no library for file transfer, one copy occurs between kernel buffer and user boilers. Our mechanism presents a file transfer primitive that does not require the file system to be modified and allows the NIC to transfer data from the kernel buffer to the remote node directly without copying. To do this, we have developed a hardware-based VIA network adapter, which supports the PCI 64bit/66MHz bus and Gigabit Ethernet, as a NIC, and implemented a zero-copy file transfer mechanism. The experimental results show that the overhead of data coy and context switching in the sender is greatly reduced and the CPU utilization of the sender is reduced to $30\%\~40\%$ of the VIA send/receive mechanism. We demonstrate the performance of the zero-copy file transfer mechanism experimentally. and compare the results with those from existing file transfer mechanisms.

A Study on the Character Type and Image-telling in Drama (<미스터 션샤인>의 인물유형과 이미지텔링)

  • Jo, Mi-Sook
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.5
    • /
    • pp.73-85
    • /
    • 2020
  • This paper analyzes the types of characters in the drama by applying Gremas's Actantial model and Enneagram's character typology and examines how they are shaped. As the Korean Wave is important, it is necessary to study the type of characters and how to describe them. Character is the most important factor in the influence of drama. As a result of applying to the Actantial model, and the following results were obtained. The main subjects are Yu-jin Choi and Ko Ae-sin, the Helpers are many people helping the subject, the opponent is the pro-Japanese figures, the Sender is Gojong, and the recivers are the people of Joseon. Analysis results by personality type of Enneagram, it was found that the subjects are 3 and 5 type, the Helpers are various types, the opponent is 3 type, the Sender is 5 type, and the receivers all types. In the method of describing the subject, internal description (direct description) is used, and the other is only formed by indirect description. Some of the Helpers and the Sender are used an image-telling method to show the inside. However, the opponent is image-telling only to show indirectly. As a result, it was possible to confirm the differences and effects on the method of image-telling by character type.

REMARK OF Pi,k ON ELLIPTIC CURVES AND APPLICATION FOR MANCHESTER CODING

  • Kim, Dae-Yeoul;Kim, Min-Soo
    • Honam Mathematical Journal
    • /
    • v.33 no.2
    • /
    • pp.153-161
    • /
    • 2011
  • Greg([Greg]) considered that $$N_k= \sum\limits_{i=1}^k(-1)^{i+1}P_{i,k}(p)N_1^i$$ where the $P_{i,k}$'s were polynomials with positive integer coefficients. In this paper, we will give the equations for $\sum\limits{P_{i,k}$ modulo 3. Using this, if we send a information for elliptic curve to sender, we can make a new checksum method for Manchester coding in IEEE 802.3 or IEEE 802.4.

Implementation of FAS Protocol of FOUNDATION Fieldbus (FOUNDATION Fieldbus 프로토콜의 FAS 구현)

  • 백인찬;홍승호
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.90-90
    • /
    • 2000
  • The FAS protocol of FOUNDATION Fieldbus playes the roles of interface between Data Link Layer and application layer and establishment of connection between receiver and sender. In this study, the FAS protocol of FOUNDATION Fieldbus was developed. The method of implementation is described in this paper. Software of FAS protocol was implemented by Window-based program and DOS-based program for PC and sensor module, respectively.

  • PDF

Power Transmission Determined by the Mutual Impedance and the Transducer Power Gain in the Near Field Region

  • Kim, Che-Young
    • Journal of electromagnetic engineering and science
    • /
    • v.11 no.3
    • /
    • pp.152-155
    • /
    • 2011
  • This paper describes the role of mutual impedance and the transducer power gain which comes from key parameters to determine the amount of wireless power especially in a near-field environment. These two key parameters are applied to the two configurations; one is a dipole-dipole, and the other is a dipole-metal plate-loop configuration. Discussions are given on the achievable maximum power transfer between the sender and the receiver affected by the matching and the pass blockage.