• Title/Summary/Keyword: Symmetric key

Search Result 342, Processing Time 0.02 seconds

LARGE EDDY SIMULATION OF VORTEXING FLOW IN THE MOLD WITH DC MAGNETIC FIELD

  • Zhongdong Qian;Yulin Wu
    • Journal of computational fluids engineering
    • /
    • v.10 no.1
    • /
    • pp.56-62
    • /
    • 2005
  • Large eddy simulation of vortexing flow of molten steel in the continuous casting mold with and without DC magnetic field was conducted. The influence of the position of magnetic field to the residence time and depth of the vortex was analyzed. The mechanism of the influence of magnetic field to the vortexing flow was found. The computational results show that the vortexing flow is the result of shearing of the two un-symmetric surface flows from the mold narrow faces when they meet adjacent to the SEN; the un-symmetric flow for turbulent vortex is caused by turbulent energy of the fluid and that for biased vortex is caused by biased flow and the turbulent energy of fluid; with the moving of the magnetic field from the centerline of the outlet of the SEN to the free surface, the surface velocity is decreased gradually and the depth of the turbulent vortex and the biased vortex is decreased, the residence time is increased with the magnetic field moves from DL=120mm to DL=60mm and then decreased; the turbulent vortex and the biased vortex can be eliminated when the magnetic field is located at the free surface.

Fingerprinting Scheme for Contents Protection in Mobile Environment (모바일 환경에서의 콘텐츠 보호를 위한 핑거프린팅 기법)

  • Yong, Seung-Lim;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.15C no.3
    • /
    • pp.167-172
    • /
    • 2008
  • Fingerprinting scheme supports the copyright protection to track redistributors of digital content using cryptographic techniques. Fingerprinting schemes should guarantee buyer's anonymity and asymmetry for their privacy. Most of known fingerprinting schemes adopt public-key cryptosystems to achieve asymmetry and discrete logarithm problem or graph isomorphism problem to achieve anonymity. However, these schemes are not suited in mobile environment because of the drawbacks of requiring high computational complexity. In this paper, we propose an efficient fingerprinting scheme for mobile environment to provide not only asymmetry of the protocol but also transaction anonymity of the buyer. By employing symmetric encryption to encrypt the digital content and adopting agent to perform the protocols, the efficiency of the proposed scheme is improved.

Automatic Client Authentication Method in All-In-One Services (올인원 서비스에서 자동적인 고객 인증 기법)

  • Kim, Namyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.1-5
    • /
    • 2016
  • The all-in-one service, for example, mobile wallet enables users to have credit card, membership card, and coupon in one place. It has been one of important o2o services with offline payment. In order to take advantage of mobile commerce, it is necessary to authenticate clients automatically without entering their passwords. This paper proposes an automatic client authentication method in all-in-one service. At registration, clients receives and stores an authentication ticket from a company, which contains an user's identifier and password encrypted by company's symmetric key. Client can be authenticated by transferring authentication tickets to companies at service requests.

Internet Banking Login with Multi-Factor Authentication

  • Boonkrong, Sirapat
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.511-535
    • /
    • 2017
  • Internet banking is one of many services provided by financial institutions that have become very popular with an increasing trend. Due to the increased amount of usage of the service, Internet banking has become a target from adversaries. One of the points that are at risk of an attack is the login process. Therefore, it is necessary to have a security mechanism that can reduce this risk. This research designs and develops a multi-factor authentication protocol, starting from a registration system, which generates authentication factors, to an actual authentication mechanism. These factors can be categorised into two groups: short term and long term. For the authentication protocol, only three messages need to be exchanged between a client and a financial institution's server. Many cryptographic processes are incorporated into the protocol, such as symmetric and asymmetric cryptography, a symmetric key generation process, a method for generating and verifying digital signatures. All of the authentication messages have been proved and analysed by the logic of GNY and the criteria of OWASP-AT-009. Even though there are additional factors of authentication, users do not really feel any extra load on their part, as shown by the satisfactory survey.

Aerodynamic and Flow Characteristics of Tall Buildings with Various Unconventional Configurations

  • Tanaka, Hideyuki;Tamura, Yukio;Ohtake, Kazuo;Nakai, Masayoshi;Kim, Yong Chul;Bandi, Eswara Kumar
    • International Journal of High-Rise Buildings
    • /
    • v.2 no.3
    • /
    • pp.213-228
    • /
    • 2013
  • Tall buildings have been traditionally designed to be symmetric rectangular, triangular or circular in plan, in order to avoid excessive seismic-induced torsional vibrations due to eccentricity, especially in seismic-prone regions like Japan. However, recent tall building design has been released from the spell of compulsory symmetric shape design, and free-style design is increasing. This is mainly due to architects' and structural designers' challenging demands for novel and unconventional expressions. Another important aspect is that rather complicated sectional shapes are basically good with regard to aerodynamic properties for crosswind excitations, which are a key issue in tall-building wind-resistant design. A series of wind tunnel experiments and numerical simulation have been carried out to determine aerodynamic forces and wind pressures acting on tall building models with various configurations: corner cut, setbacks, helical and so on. Dynamic wind-induced response analyses of these models have also been conducted. The results of these experiments have led to comprehensive understanding of the aerodynamic characteristics of tall buildings with various configurations.

Numerical Study on the NH3/CH4 Symmetric Premixed Counterflow Flames Part II: Investigation of Flame Structure and Reaction Path (암모니아/메탄 예혼합 대향류 대칭 화염에 관한 수치 해석적 연구: Part II 화염의 구조 및 반응 경로 해석 )

  • JINSEONG KIM;KEEMAN LEE
    • Transactions of the Korean hydrogen and new energy society
    • /
    • v.34 no.6
    • /
    • pp.748-757
    • /
    • 2023
  • Numerical analysis was conducted to confirm the characteristics of extinction behavior in NH3/CH4 counterflow symmetrical flames. Numerical simulations were run on CHEMKIN-PRO, using the OPPDIF code, with Okafor's mechanisms, which had the lowest error rate compared to Colson's experimental data in the our previous part I study. The chemical interactions of merged flames were examined by analyzing the production rate of major chemical species and key radicals with the volume fractional percentage of ammonia and global strain rate. The interaction phenomenon of the flames could be identified by observing the main chemical reaction path of the merged flames at the stagnation plane.

Topological Interference Management via 8 Trigram (8괘(卦)(Trigram)를 이용한 위상간섭 제거)

  • Lee, Moon Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.95-106
    • /
    • 2017
  • In this paper, we investigate the conventional topological interference management (TIM) with proposed network topology such as 8 trigram (8 user networks). The key observation is that optimal symmetric degree of freedom (DoF) can be achieved for 8 user network with different channel coherence times by adaptively selecting the interference alignment scheme via controlling the alignment feasibility of the transmitted signals. However, this yields a very complex problem, for which we use the combination of different schemes such as interference avoidance and repetition coding. In addition to the above schemes, we propose a triangular transmit cooperation (TTC) algorithm for 8 user networks to achieve the optimal symmetric DoF. And We apply the principle of complementarity of 8 trigram to remove the interferences, and correspond the concepts of win-win and conflict to direct and indirect signals of transmit and receive respectively. We find that the principle of complementarity comes out from the trigram of I Ching. That is, we apply the relation of confrontation and coexistence to 8 transmitters and receivers, and get the results of symmetric DoF of 4/3.

Resource Eestimation of Grover Algorithm through Hash Function LSH Quantum Circuit Optimization (해시함수 LSH 양자 회로 최적화를 통한 그루버 알고리즘 적용 자원 추정)

  • Song, Gyeong-ju;Jang, Kyung-bae;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.323-330
    • /
    • 2021
  • Recently, the advantages of high-speed arithmetic in quantum computers have been known, and interest in quantum circuits utilizing qubits has increased. The Grover algorithm is a quantum algorithm that can reduce n-bit security level symmetric key cryptography and hash functions to n/2-bit security level. Since the Grover algorithm work on quantum computers, the symmetric cryptographic technique and hash function to be applied must be implemented in a quantum circuit. This is the motivation for these studies, and recently, research on implementing symmetric cryptographic technique and hash functions in quantum circuits has been actively conducted. However, at present, in a situation where the number of qubits is limited, we are interested in implementing with the minimum number of qubits and aim for efficient implementation. In this paper, the domestic hash function LSH is efficiently implemented using qubits recycling and pre-computation. Also, major operations such as Mix and Final were efficiently implemented as quantum circuits using ProjectQ, a quantum programming tool provided by IBM, and the quantum resources required for this were evaluated.

Impersonation Attacks on Anonymous User Authentication and Key Agreement Scheme in Wireless Sensor Networks (무선센서네트워크에서 익명의 사용자 인증과 키동의 기법에 대한 가장 공격)

  • Choi, Hae-Won;Kim, Hyunsung
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.287-293
    • /
    • 2016
  • Wireless sensor networks (WSNs) have many applications and are deployed in a wide variety of areas. They are often deployed in potentially adverse or even hostile environment so that there are concerns on security issues in these WSNs. Recently, an anonymous user authentication and key agreement scheme (AUAKAS) was proposed based on symmetric cryptosystem in WSNs. It is claimed in AUAKAS that it assures security against different types of attacks including impersonation attacks. However, this paper shows that AUAKAS does not cope from user impersonation attack and gateway impersonation attack from the legally registered user on the gateway. The security analysis could guide the required features of the security scheme to be satisfied.

Elliptic Curve Signcryption Based Security Protocol for RFID

  • Singh, Anuj Kumar;Patro, B.D.K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.344-365
    • /
    • 2020
  • Providing security has been always on priority in all areas of computing and communication, and for the systems that are low on computing power, implementing appropriate and efficient security mechanism has been a continuous challenge for the researchers. Radio Frequency Identification (RFID) system is such an environment, which requires the design and implementation of efficient security mechanism. Earlier, the security protocols for RFID based on hash functions and symmetric key cryptography have been proposed. But, due to high strength and requirement of less key size in elliptic curve cryptography, the focus of researchers has been on designing efficient security protocol for RFID based on elliptic curves. In this paper, an efficient elliptic curve signcryption based security protocol for RFID has been proposed, which provides mutual authentication, confidentiality, non-repudiation, integrity, availability, forward security, anonymity, and scalability. Moreover, the proposed protocol successfully provides resistance from replay attack, impersonation attack, location tracking attack, de-synchronization attack, denial of service attack, man-in-the-middle attack, cloning attack, and key-compromise attack. Results have revealed that the proposed protocol is efficient than the other related protocols as it takes less computational time and storage cost, especially for the tag, making it ideal to be used for RFID systems.