• Title/Summary/Keyword: Symmetric Scheme

Search Result 235, Processing Time 0.024 seconds

Net Residual Dispersion in Inline Dispersion Managed Optical Transmission Link (Inline 분산 제어 광전송 링크에서 전체 잉여 분산)

  • Lee, Seong-Real
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.4
    • /
    • pp.311-316
    • /
    • 2008
  • A configuration scheme of optical link effectively compensating chromatic dispersion and nonlinear effects accumulated in optical link with single mode fibers (SMFs) is proposed. The proposed optical link configuration consist of optical phase conjugator (OPC) placed at middle of total transmission length and inline dispersion management (DM) as a role of compensating cumulated in each optical repeater of SMF by dispersion compensating fiber (DCF). Net residual dispersion (NRD) of this optical link is designed to be controlled through precompensation and postcompensating. The precompensation and postcompensation are designed to be determined by DCF after transmitter and before receiver, respectively. It is confirmed that optical link configuration with symmetric dispersion map with respect to OPC, which is implemented by controlling NRD through both precompensation and postcompensation, is better to be effective and adaptive than other configuration with NRD controlled by only precompensation or postcompensation.

  • PDF

BACS : An Experimental Study For Access Control System In Public Blockchain (BACS : 퍼블릭 블록체인 접근 통제 시스템에 관한 실험적 연구)

  • Han, Sejin;Lee, Sunjae;Lee, Dohyeon;Park, Sooyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.1
    • /
    • pp.55-60
    • /
    • 2020
  • In this paper, we propose an access control system using cryptography as a method to protect personal data in public blockchain. The proposed system is designed to encrypt data according to the access policy, store it in the blockchain, and decrypt only the person who satisfy the access policy. In order to improve performance and scalability, an encryption mechanism is implemented outside the blockchain. Therefore, data access performance could be preserved while cryptographic operations executed Furthermore it can also improve the scalability by adding new access control modules while preserving the current configuration of blockchain network. The encryption scheme is based on the attribute-based encryption (ABE). However, unlike the traditional ABE, the "retention period", is incorporated into the access structure to ensure the right to be forgotten. In addition, symmetric key cryptograpic algorithms are used for the performance of ABE. We implemented the proposed system in a public blockchain and conducted the performance evaluation.

Development of a Parallel Cell-Based DSMC Method Using Unstructured Meshes (비정렬격자에서 병렬화된 격자중심 직접모사 기법 개발)

  • Kim, Hyeong-Sun;Kim, Min-Gyu;Gwon, O-Jun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.30 no.2
    • /
    • pp.1-11
    • /
    • 2002
  • In the present study, a parallel DSCM technique based on a cell-based data structure is developed for the efficient simulation of rarefied gas flows especially od PC clusters. Dynamic load balancing is archieved by decomposing the computational domain into several sub-domains and accounting for the number of particles and the number cells of each domain. Mesh adaptation algorithm is also applied to improve the resolution of the solution and to reduce the grid dependency. It was demonstrated that accurate solutions can be obtained after several levels of mesh adapation starting from a coars initial grid. The method was applied to a two-dimensioanal supersonic leading-edge flow and the axi-symmetric Rothe nozzle flow to validate the efficiency of the present method. It was found that the present method is a very effective tool for the efficient simulation of rarefied gas flow on PC-based parallel machines.

The One Time Biometric Key Generation and Authentication Model for Portection of Paid Video Contents (상용 비디오 콘텐츠 보호를 위한 일회용 바이오메트릭 키 생성 및 인증 모델)

  • Yun, Sunghyun
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.101-106
    • /
    • 2014
  • Most peoples are used to prefer to view the video contents rather than the other contents since the video contents are more easy to understand with both their eyes and ears. As the wide spread use of smartphones, the demands for the contents services are increasing rapidly. To promote the contents business, it's important to provide security of subscriber authentication and corresponding communication channels through which the contents are delivered. Generally, symmetric key encryption scheme is used to protect the contents in the channel, and the session key should be upadated periodically for the security reasons. In addition, to protect viewing paid contents by illegal users, the proxy authentication should not be allowed. In this paper, we propose biometric based user authentication and one time key generation models. The proposed model is consist of biometric template registration, session key generation and chanel encryption steps. We analyze the difference and benefits of our model with existing CAS models which are made for CATV contents protection, and also provides applications of our model in electronic commerce area.

Flow Visualization and Unstructured Grid Computation of Flow over a High-Speed Projectile (고속탄자 유동의 가시화 실험 및 비정렬격자 계산)

  • 이상길;최서원;강준구;임홍규;백영호;김두연;강호철
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.6 no.2
    • /
    • pp.12-20
    • /
    • 1998
  • Exter ballistics of a typical high-speed projectile is studied through a flow-visualization experiment and an unstructured grid Navier-Srokes computation. Experiment produced a schlieren photograph that adequately shows the characteristic features of this complex flow, namely two kinds of oblique cone shocks and turbulent wake developing into the downstream. A hybrid scheme of finite volume-element method is used to simulate the compressible Reynolds-Averaged Navier-Stok- es solution on unstructured grids. Osher's approximate Riemann solver is used to discretize the cinvection term. Higher-order spatial accuracy is obtained by MUSCL extension and van Albada ty- pe flux limiter is used to stabilize the numerical oscillation near the solution discontinuity. Accurate Gakerkin method is used to discretize the viscous term. Explict fourth-order Runge-Kutta method is used for the time-stepping, which simplifies the application of MUSCL extension. A two-layer k-$\varepsilon$ turbulence model is used to simulate the turbulent wakes accurately. Axisymmetric folw and two-dimensional flow with an angle of attack have been computed. Grid-dependency is also checked by carrying out the computation with doubled meshes. 2-D calculation shows that effect of angle of attack on the flow field is negligible. Axi-symmetric results of the computation agrees well with the flow visualization. Primary oblique shock is represented within 2-3 meshes in numerical results, and the varicose mode of the vortex shedding is clearly captured in the turbulent wake region.

  • PDF

Stress Intensity factor Calculation for the Axial Semi-Elliptical Surface Flaws on the Thin-Wall Cylinder Using Influence Coefficients (영향계수를 이용한 원통용기 축방향 표면결함의 응력확대계수의 계산)

  • Jang, Chang-Heui;Moon, Ho-Rim;Jeong, Ill-Seok;Kim, Tae-Ryong
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.26 no.11
    • /
    • pp.2390-2398
    • /
    • 2002
  • For integrity analysis of nuclear reactor pressure vessel, including the Pressurized thermal shock analysis, the fast and accurate calculation of the stress intensity factor at the crack tip is needed. For this, a simple approximation scheme is developed and the resulting stress intensity factors for axial semi-elliptical cracks in cylindrical vessel under various loading conditions are compared with those of the finite element method and other approximation methods, such as Raju-Newman's equation and ASME Sec. Xl approach. For these, three-dimensional finite-element analyses are performed to obtain the stress intensity factors for various surface cracks with t/R = 0.1. The approximation methods, incorporated in VINTIN (Vessel INTegrity analysis-INner flaws), utilizes the influence coefficients to calculate the stress intensity factor at the crack tip. This method has been compared with other solution methods including 3-D finite clement analysis for internal pressure, cooldown, and pressurized thermal shock loading conditions. The approximation solutions are within $\pm$2.5% of the those of FEA using symmetric model of one-forth of a vessel under pressure loading, and 1-3% higher under pressurized thermal shock condition. The analysis results confirm that the VINTIN method provides sufficiently accurate stress intensity factor values for axial semi-elliptical flaws on the surface of the reactor pressure vessel.

Numerical Study of Rocket Exhaust Plume with Equilibrium Chemical Reaction and Thermal Radiation (평형화학반응과 복사열전달을 고려한 로켓 플룸 유동 해석)

  • Shin J.-R.;Choi J.-Y.;Choi H.-S.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2004.03a
    • /
    • pp.146-153
    • /
    • 2004
  • The Numerical study has been carried out to investigate the effects of chemical reaction and thermal radiation on the rocket plume flow-field at various altitudes. The theoretical formulation is based on the Navier-Stokes equations for compressible flows along with the infinitely fast chemistry and thermal radiation. The governing equations were solved by a finite volume fully-implicit TVD(Total Variation Diminishing) code which uses Roe's approximate Riemann solver and MUSCL(Monotone Upstream-centered Schemes for Conservation Laws) scheme. LU-SGS (Lower Upper Symmetric Gauss Seidel) method is used for the implicit solution strategy. An equilibrium chemistry module for hydrocarbon mixture with detailed thermo-chemical properties and a thermal radiation module for optically thin media were incorporated with the fluid dynamics code. In this study, kerosene-fueled rocket was assumed operating at O/F ratio of 2.34 with a nozzle expansion ratio of 6.14. Flight conditions considered were Mach number zero at ground level, Mach number 1.16 at altitude 5.06km and Mach number 2.9 at altitude 17.34km. Numerical results gave the understandings on the detailed plume structures at different altitude conditions. The diffusive effect of the thermal radiation on temperature field and the effect of chemical recombination during the expansion process could be also understood. By comparing the results from frozen flow and infinitely fast chemistry assumptions, the excess temperature of the exhaust gas resulting from the chemical recombination seems to be significant and cannot be neglected in the view point of performance, thermal protection and flow physics.

  • PDF

Secure Routing with Time-Space Cryptography for Mobile Ad-Hoc Networks (이동 애드혹 망을 위한 시공간 방식의 보안 라우팅 프로토콜)

  • Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1B
    • /
    • pp.11-16
    • /
    • 2007
  • This paper describes the design and performance of a secure routing protocol with time-space cryptography for mobile ad-hoc networks. The proposed time-space scheme works in the time domain for key distribution between source and destination as well as in the space domain for intrusion detection along the route between them. For data authentication, it relies on the symmetric key cryptography due to high efficiency and a secret key is distributed using a time difference from the source to the destination. Also, a one-way hash chain is formed on a hop-by-hop basis to prevent a compromised node or an intruder from manipulating the routing information. In order to evaluate the performance of our routing protocol, we compare it with the existing AODV protocol by simulation under the same conditions. The proposed protocol has been validated using the ns-2 network simulator with wireless and mobility extensions.

Implementation of Encrypted Mail Program using SMTP and POP3 (SMTP와 POP3를 활용한 암호화 메일 프로그램 구현)

  • Kong, Keon-Woong;Won, Yonggwan
    • Journal of Digital Contents Society
    • /
    • v.18 no.7
    • /
    • pp.1403-1409
    • /
    • 2017
  • As the Internet evolves, security becomes more important. Especially, e-mail has become one of the most important services that companies and ordinary users use on the Internet. However, security vulnerabilities such as sniffing attacks, IDs, and password spoofs are causing many problems. This paper introduces an example of implementation of encrypted mailing program with which the secured mail is encrypted by symmetric key methode and the encrypted message can not be read without proper decryption. In order to use the current mailing systems, we keep the rules related to SMTP and POP3, and only the encrypted message is stored in the mail server system and the message can be decrypted only at the terminals of the senders and the receivers with the key which is shared in advanced by independent route between them. This implementation scheme can provide an efficiency that it does not request any change of current mailing system, which can be an additional security protection.

Image Encryption using the chaos function and elementary matrix operations (혼돈함수와 기본 행렬 연산을 이용한 영상의 암호화)

  • Kim Tae-Sik
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.1
    • /
    • pp.29-37
    • /
    • 2006
  • Due to the spread of mobile communication with the development of computer network, nowadays various types of multimedia data play an important role in many areas such as entertainments, culture contents, e-commerce or medical science. But for the real application of these data, the security in the course of saving or transferring them through the public network should be assured. In this sense, many encryption algorithm have been developed and utilized. Nonetheless, most of them have focused on the text data. So they may not be suitable to the multimedia application because of their large size and real time constraint. In this paper, a chaotic map has been employed to create a symmetric stream type of encryption scheme which may be applied to the digital images with a large amounts of data. Then an efficient algebraic encryption algorithm based on the elementary operations of the Boolean matrix and image data characteristics.

  • PDF