• Title/Summary/Keyword: Symmetric key

Search Result 341, Processing Time 0.027 seconds

Estimation of 3D active earth pressure under nonlinear strength condition

  • Zhang, D.B.;Jiang, Y.;Yang, X.L.
    • Geomechanics and Engineering
    • /
    • v.17 no.6
    • /
    • pp.515-525
    • /
    • 2019
  • The calculation of active earth pressure behind retaining wall is a typical three-dimensional (3D) problem with spatial effects. With the help of limit analysis, this paper firstly deduces the internal energy dissipation power equations and various external forces power equations of the 3D retaining wall under the nonlinear strength condition, such as to establish the work-energy balance equation. The pseudo-static method is used to consider the effect of earthquake on active earth pressure in horizontal state. The failure mode is a 3D curvilinear cone failure mechanism. For the different width of the retaining wall, the plane strain block is inserted in the symmetric plane. By optimizing all parameters, the maximum value of active earth pressure is calculated. In order to verify the validity of the new expressions obtained by the paper, the solutions are compared with previously published solutions. Agreement shows that the new expressions are effective. The results of different parameters are given in the forms of figures to analysis the influence caused by nonlinear strength parameters.

An RFID Authentication Protocol Based a Random Symmetric Key using Key Change (키 변환을 이용한 랜덤 대칭키 기반의 RFID 인증 프로토콜)

  • Kim, Kyoung-Youl;Kim, Young-Back;Park, Yong-Soo;Yun, Tae-Jin;Ahn, Kwang-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1421-1424
    • /
    • 2009
  • RFID(Radio-Frequency IDentification) 시스템은 무선주파수를 이용한 자동 인식 기술로 개인의 위치 추적이나 사용자 프라이버시와 같은 정보 유출의 위험성을 내포하고 있다. 이러한 문제점을 해결하기 위해 대칭키 기반의 AES 암호화 알고리즘은 해시함수나 공개키 암호화 기법에 비해 메모리를 적게 소모하고 구현이 쉬운 장점 때문에 수동형 RFID태그에 더 적합하다. 그러나 기존의 AES를 이용한 RFID 인증 프로토콜에서는 항상 고정된 키를 이용하여 암호화하였고 태그와 리더사이의 안전하지 않은 무선 채널에서 공격자에 의해 키 값이 노출될 수 있는 또 다른 문제점을 가지고 있다. 본 논문에서는 태그와 서버의 고정된 키와, 리더 태그 서버에서 생성된 난수를 차례로 이용하여 대칭키를 변환한다. 그리고 매 세션마다 변환된 키로 난수를 암호화 하면서 태그와 리더를 상호 인증한다. 이와 같이 변환된 키를 이용할 경우 키 값의 노출 문제가 해결되며, 이 키를 통해 암호화하여 인증할 경우 재전송, 도청, 위치추적 및 스푸핑과 같은 공격에도 안전하다.

Speed Optimized Implementation of HUMMINGBIRD Cryptography for Sensor Network

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.683-688
    • /
    • 2011
  • The wireless sensor network (WSN) is well known for an enabling technology for the ubiquitous environment such as real-time surveillance system, habitat monitoring, home automation and healthcare applications. However, the WSN featuring wireless communication through air, a resource constraints device and irregular network topology, is threatened by malicious nodes such as eavesdropping, forgery, illegal modification or denial of services. For this reason, security in the WSN is key factor for utilizing the sensor network into the commercial way. There is a series of symmetric cryptography proposed by laboratory or industry for a long time. Among of them, recently proposed HUMMINGBIRD algorithm, motivated by the design of the well-known Enigma machine, is much more suitable to resource constrained devices, including smart card, sensor node and RFID tags in terms of computational complexity and block size. It also provides resistance to the most common attacks such as linear and differential cryptanalysis. In this paper, we implements ultra-lightweight cryptography, HUMMINGBIRD algorithm into the resource constrained device, sensor node as a perfectly customized design of sensor node.

Improved Algebraic Method for Computing Eigenpair Sensitivities of Damped Systems (감쇠 시스템의 고유진동수와 모드의 민감도를 계산하기 위한 대수적 방법의 개선)

  • 조홍기;박선규;이인원
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2000.04b
    • /
    • pp.277-285
    • /
    • 2000
  • This paper presents a very simple procedure for determining the sensitivities of the eigenpairs of damped vibratory system with distinct eigenvalues. The eigenpairs derivatives can be obtained by solving algebraic equation with a symmetric coefficient matrix whose order is (n+1)×(n+1), where n is the number of degree of freedom the method is an improvement of recent work by I. W. Lee, D. O. Kim and G. H. Junng; the key idea is that the eigenvalue derivatives and the eigenvector derivatives are obtained at once via only one algebraic equation, instead of using two equations separately as like in Lee and Jung's method Of course, the method preserves the advantages of Lee and Jung's method.

  • PDF

An Implementation on the High Speed Blowfish

  • Park, Jong-Tae;Rhee, Kang-Hyeon
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.635-638
    • /
    • 2002
  • Blowfish is a symmetric block cipher that can be used as a drop-in replacement fur DES or IDEA. It takes a variable-length key, from 32bit to 448bit, making it ideal for both domestic and exportable use. This paper is somewhere middle-of-the-line, where this paper made significant tradeoffs between speed, size and ease of implementation. The main focus was to make an implementation that was usable, moderately compact, and would still run at an acceptable clock speed. For the real time process of blowfish, it is required that high-speed operation and small size hardware. So, A structure of new adders constructed in this study has all advantages abstracted from other adders. As for this new adder, area cost increases by 1.06 times and operation speed increases by 1.42 times.

  • PDF

Design and Implementation of a Crypto Processor and Its Application to Security System

  • Kim, Ho-Won;Park, Yong-Je;Kim, Moo-Seop
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.313-316
    • /
    • 2002
  • This paper presents the design and implementation of a crypto processor, a special-purpose microprocessor optimized for the execution of cryptography algorithms. This crypto processor can be used fur various security applications such as storage devices, embedded systems, network routers, etc. The crypto processor consists of a 32-bit RISC processor block and a coprocessor block dedicated to the SEED and triple-DES (data encryption standard) symmetric key crypto (cryptography) algorithms. The crypto processor has been designed and fabricated as a single VLSI chip using 0.5 $\mu\textrm{m}$ CMOS technology. To test and demonstrate the capabilities of this chip, a custom board providing real-time data security for a data storage device has been developed. Testing results show that the crypto processor operates correctly at a working frequency of 30MHz and a bandwidth o1240Mbps.

  • PDF

IP Design of Corrected Block TEA Cipher with Variable-Length Message for Smart IoT

  • Yeo, Hyeopgoo;Sonh, Seungil;Kang, Mingoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.724-737
    • /
    • 2020
  • Corrected Block TEA(or XXTEA) is a block cipher designed to correct security weakness in the original block TEA in 1998. In this paper, XXTEA cipher hardware which can encrypt or decrypt between 64-bit and 256-bit messages using 128-bit master key is implemented. Minimum message block size is 64-bit wide and maximal message block size is 256-bit wide. The designed XXTEA can encrypt and decrypt variable-length message blocks which are some arbitrary multiple of 32 bits in message block sizes. XXTEA core of this paper is described using Verilog-HDL and downloaded on Vertex4. The operation frequency is 177MHz. The maximum throughput for 64-bit message blocks is 174Mbps and that of 256-bit message blocks is 467Mbps. The cryptographic IP of this paper is applicable as security module of the mobile areas such as smart card, internet banking, e-commerce and IoT.

The Characteristics of Triple Hot-Wire Probe and It's Evaluation (3축 열선 PROBE의 특성과 그 평가)

  • Kim, Kyung-hoon
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.5 no.3
    • /
    • pp.48-62
    • /
    • 1988
  • A triple hot-wire probe has an essential potentiality for the measure- ment of an instantaneous velocity vector in a three dimensional unsteady flow with large amplitude of velocity fluctuations, the key problems asso- ciated with this instrument are the directional range of applicability and the accuracy. This present paper is concerned with a new method of the techniques of calibration and data processing to estimate the three dimensional flow field using an arbitrary shaped triple hot-wire probe. The method is not based on the assumptions of orthogonality or symmetry and it is especially useful for applications to a hand-made probe where probe geometry is not accurately known. The test application is made to evaluate the effect of cone angles of symmetric non-orthogonal probe.

  • PDF

Application Specific IGCTs

  • Carroll Eric;Oedegrad Bjoern;Stiasny Thomas;Rossinelli Marco
    • Proceedings of the KIPE Conference
    • /
    • 2001.10a
    • /
    • pp.31-35
    • /
    • 2001
  • IGCTs have established themselves as the power semiconductor of choice at medium voltage levels within the last few years because of their low conduction and switching losses. The trade-off between these losses can be adjusted by various lifetime control techniques and the growing demand for these devices is driving the need for standard types to cover such applications as Static Circuit Breakers (low on-state) and Medium Voltage Drives (low switching losses). The additional demands of Traction (low operating temperatures) and Current Source Inverters (symmetric blocking) would normally result in conflicting demands on the semiconductor. This paper will outline how a range of power devices can meet these needs with a limited number of wafers and gate units. Some of the key differences between IGCTs and IGBTs will be explained and the outlook for device improvements will be discussed.

  • PDF

SOME ASPECTS IN PRACTICAL ESTIMATION OF GROUNDWATER CONTAMINANT CONCENTRATIONS

  • Cho, Choon-Kyung;Ha, Bang-Soo;Kang, Sung-Kwon
    • Journal of applied mathematics & informatics
    • /
    • v.8 no.2
    • /
    • pp.417-428
    • /
    • 2001
  • Spatial distribution of groundwater contaminant concentration has special characteristics such as approximate symmetric profile, for example, in the transversal direction to groundwater flow direction, a certain ratio in directional propagation distances, etc. To obtain a geophysically appropriate semivariogram which is a key factor in estimation of groundwater contaminant concentration at desired locations, these special characteristics should be considered. Specifically, the concepts of symmetry and ratio are considered in this paper. By applying these two concepts, significant improvement of semivariograms, estimation variances, and final estimation results compared with the ones by conventional approaches which usually do not account for symmetry and ratio are shown using field experimental data.