• Title/Summary/Keyword: Symmetric key

Search Result 341, Processing Time 0.028 seconds

A Secret Key Watermarking for Authentication and Integrity (인증과 무결성을 위한 비밀키 워터마킹)

  • Woo, Chan-Il;Shin, In-Chul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11
    • /
    • pp.3576-3583
    • /
    • 2000
  • Digital watermarks have recently been proposed for the purposes of copyright ptotechtion and autheutication for multimedia contents. A watermarking technique consists of an algorithm that incorporates a watermarking structure into an image in the spatial or frequency domains. In this paper we proposed a new watermarking method for authentication and integrity of digital images and the proposed algorithm uses the MD5 hash funiction and a symmetric key encryption algorithm. To decide the position of embedding watermark and the bit pasitionin the original image, the secret key is used as an input of the MD5 hash function. The simulation results show that the proposed algorithm has the advantage of difficulty to find positions of inserted watermarks, and keep the similar watermarked image quabty with Wong's method.

  • PDF

An approach for machining allowance optimization of complex parts with integrated structure

  • Zhang, Ying;Zhang, Dinghua;Wu, Baohai
    • Journal of Computational Design and Engineering
    • /
    • v.2 no.4
    • /
    • pp.248-252
    • /
    • 2015
  • Currently composite manufacturing process, such as linear friction welding plus NC machining, is the main method for the manufacturing and repairing of complex parts with integrated structure. Due to different datum position and inevitable distortion from different processes, it is important to ensure sufficient machining allowance for complex parts during the NC machining process. In this paper, a workpiece localization approach for machining allowance optimization of complex parts based on CMM inspection is developed. This technique concerns an alignment process to ensure sufficient stock allowance for the single parts as well as the whole integrated parts. The mathematical model of the constrained alignment is firstly established, and then the symmetric block solution strategy is proposed to solve the optimization model. Experiment result shows that the approach is appropriate and feasible to distribute the machining allowance for the single and whole parts for adaptive machining of complex parts.

GLOBAL WEAK MORREY ESTIMATES FOR SOME ULTRAPARABOLIC OPERATORS OF KOLMOGOROV-FOKKER-PLANCK TYPE

  • Feng, Xiaojing;Niu, Pengcheng;Zhu, Maochun
    • Bulletin of the Korean Mathematical Society
    • /
    • v.51 no.5
    • /
    • pp.1241-1257
    • /
    • 2014
  • We consider a class of hypoelliptic operators of the following type $$L=\sum_{i,j=1}^{p_0}a_{ij}{\partial}^2_{x_ix_j}+\sum_{i,j=1}^{N}b_{ij}x_i{\partial}_{x_j}-{\partial}_t$$, where ($a_{ij}$), ($b_{ij}$) are constant matrices and ($a_{ij}$) is symmetric positive definite on $\mathbb{R}^{p_0}$ ($p_0{\leqslant}N$). By establishing global Morrey estimates of singular integral on the homogenous space and the relation between Morrey space and weak Morrey space, we obtain the global weak Morrey estimates of the operator L on the whole space $\mathbb{R}^{N+1}$.

Characterization of the PAC Modified Cationic Rosin Size and its Sizing Effect

  • Yan, Yong-Xiang;Chandranupap, Fu-Shan;Wang, Gao-Sheng
    • Proceedings of the Korea Technical Association of the Pulp and Paper Industry Conference
    • /
    • 2006.06b
    • /
    • pp.387-390
    • /
    • 2006
  • Cationic rosin sizes are prepared by premixing extremely pure ployaluminum chloride (PAC) and dispersed rosin size (DRS). It turned out that zeta potential and particle size of the sizing agents took a big change by Plus90 analyzer's and FTIR analyzer's analysis. It turned out that -C=O and -COOH of the DRS have both chemical reaction with PAC to form the muti-hydroxyl aluminum rosin acid and that the cationic rosin sizes modified by PAC has dissymmetric and symmetric flexible vibration two absorbing peaks of the groups (its absorbing peaks $at1596cm^{-1}\;and\;1425cm^{-1}$). By DRS reacting with PAC, zeta potential of the resin size varied from negative to cationic. $Al_{2}O_{3}/rosin=1:0.3$, zeta potential of premixed admixture is tiptop28.8mv, When joined continuously PAC, zeta potential of cationic rosin sizes descend on the contrary.

  • PDF

Enhanced Key Distribution Scheme in Wireless Sensor Networks (무선 센서 네트워크에서의 향상된 키 분배 기법)

  • Cho Jung-Sik;Yeo Sang-Soo;Kim Sung Kwon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.151-153
    • /
    • 2005
  • 무선 센서 네트워크는 방대한 응용분야와 유비쿼터스 환경 하에서 중요한 한 부분을 차지하며 그 유용성을 입증하고 있다. 이런 무선 센서 네트워크의 센서 노드는 작은 크기를 바탕으로 목표 장소에 임의로 배치되어 다양한 데이터를 수집하는 능력이 탁월하다 하지만 이런 장점은 센서 노드의 한정된 하드웨어 능력과 전원공급 문제, 물리적 노출 문제로 인해 스스로를 위험에 노출시키는 여지를 만들게 되었다. 즉 일반적으로 사용되어지는 네트워크 보안 방법을 무선 센서 네트워크에 적응하기에는 센서 노드 능력에 한계가 있으며, 환경적 요소로 인해 불가능하다. 따라서 무선 센서 네트워크의 특성을 감안한 효과적인 보안 방법이 필요하며, 이런 맥락에 본 논문은 무선 센서 네트워크의 하드웨어적인 한계를 감안한 대칭키(Symmetric key) 기반의 키 분배 기법을 제안하고자 한다. 제안하는 기법에서는 모든 노드가 공통으로 소유한 전체 마스터 키(master key)와 의사 난수 생성기(pseudo random number generator:PRNG), 그리고 특정 대상으로부터 분배되는 난수(random number)의 조합을 통해 임의의 키를 생성, 갱신함으로써 다양한 종류의 무선 센서 네트워크 모델에 유연하게 대처할 수 있도록 하였다. 또한 이를 위한 통신 회수를 최소화함으로써 효율성을 제공해 준다.

  • PDF

Signcryption Schemes with Forward Secrecy (Forward Secrecy를 제공하는 Signcryption 기법들)

  • 정희윤;이동훈;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.5
    • /
    • pp.43-52
    • /
    • 2001
  • Y. Zheng introduced a new type of cryptograghic primitive as \"signcryption\", which combines a function of digital signature scheme with a symmetric key encryption algorithm. Signcryption doesn\`t only provide authenticity and confidentiality in a single step, but also give more efficient computation than the traditional \"signature-then-encryption\". And C. Gamage proposed a proxy-signcryption that efficiently combines a proxy signature with the signcryption. But, in the proposed signcryption schemes, one who obtains the sender\`s private key can recover the original message of a signcrypted text. That is, forward secrecy is not offered by the signcryption scheme with respect to the sender\`s private key. In this paper, we will propose a modified signcryption of Zheng\`s signcryption and a variant of proxy-signcryption with forward secrecy.ith forward secrecy.

Topological Interference Management via 8 Trigram (8괘(卦)(Trigram)를 이용한 위상간섭 제거)

  • Lee, Moon Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.95-106
    • /
    • 2017
  • In this paper, we investigate the conventional topological interference management (TIM) with proposed network topology such as 8 trigram (8 user networks). The key observation is that optimal symmetric degree of freedom (DoF) can be achieved for 8 user network with different channel coherence times by adaptively selecting the interference alignment scheme via controlling the alignment feasibility of the transmitted signals. However, this yields a very complex problem, for which we use the combination of different schemes such as interference avoidance and repetition coding. In addition to the above schemes, we propose a triangular transmit cooperation (TTC) algorithm for 8 user networks to achieve the optimal symmetric DoF. And We apply the principle of complementarity of 8 trigram to remove the interferences, and correspond the concepts of win-win and conflict to direct and indirect signals of transmit and receive respectively. We find that the principle of complementarity comes out from the trigram of I Ching. That is, we apply the relation of confrontation and coexistence to 8 transmitters and receivers, and get the results of symmetric DoF of 4/3.

Resource Eestimation of Grover Algorithm through Hash Function LSH Quantum Circuit Optimization (해시함수 LSH 양자 회로 최적화를 통한 그루버 알고리즘 적용 자원 추정)

  • Song, Gyeong-ju;Jang, Kyung-bae;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.323-330
    • /
    • 2021
  • Recently, the advantages of high-speed arithmetic in quantum computers have been known, and interest in quantum circuits utilizing qubits has increased. The Grover algorithm is a quantum algorithm that can reduce n-bit security level symmetric key cryptography and hash functions to n/2-bit security level. Since the Grover algorithm work on quantum computers, the symmetric cryptographic technique and hash function to be applied must be implemented in a quantum circuit. This is the motivation for these studies, and recently, research on implementing symmetric cryptographic technique and hash functions in quantum circuits has been actively conducted. However, at present, in a situation where the number of qubits is limited, we are interested in implementing with the minimum number of qubits and aim for efficient implementation. In this paper, the domestic hash function LSH is efficiently implemented using qubits recycling and pre-computation. Also, major operations such as Mix and Final were efficiently implemented as quantum circuits using ProjectQ, a quantum programming tool provided by IBM, and the quantum resources required for this were evaluated.

The One Time Biometric Key Generation and Authentication Model for Portection of Paid Video Contents (상용 비디오 콘텐츠 보호를 위한 일회용 바이오메트릭 키 생성 및 인증 모델)

  • Yun, Sunghyun
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.101-106
    • /
    • 2014
  • Most peoples are used to prefer to view the video contents rather than the other contents since the video contents are more easy to understand with both their eyes and ears. As the wide spread use of smartphones, the demands for the contents services are increasing rapidly. To promote the contents business, it's important to provide security of subscriber authentication and corresponding communication channels through which the contents are delivered. Generally, symmetric key encryption scheme is used to protect the contents in the channel, and the session key should be upadated periodically for the security reasons. In addition, to protect viewing paid contents by illegal users, the proxy authentication should not be allowed. In this paper, we propose biometric based user authentication and one time key generation models. The proposed model is consist of biometric template registration, session key generation and chanel encryption steps. We analyze the difference and benefits of our model with existing CAS models which are made for CATV contents protection, and also provides applications of our model in electronic commerce area.

Password-Based Authenticated Tripartite Key Exchange Protocol (패스워드 기반 인증된 3자 키 교환 프로토콜)

  • Lee, Sang-Gon;Lee, Hoon-Jae;Park, Jong-Wook;Yoon, Jang-Hong
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.4
    • /
    • pp.525-535
    • /
    • 2005
  • A password-based authenticated tripartite key exchange protocol based on A. Joux's protocol was proposed. By using encryption scheme with shared password, we can resolve man-in-the-middle attack and lack of authentication problems. We also suggested a scheme to avoid the offline dictionary attack to which symmetric encryption schemes are vulnerable. The proposed protocol does not require a trusted party which is required in certificate or identity based authentication schemes. Therefore in a ad hoc network which is difficult to install network infrastructure, the proposed protocol would be very useful. The proposed protocol is more efficient in computation aspect than any existing password-based authenticated tripartite key exchange protocols. When it is used as a base line protocol of tree based group key exchange protocol, the computational weak points of the proposed protocol are compensated.

  • PDF