• Title/Summary/Keyword: Symmetric key

Search Result 342, Processing Time 0.022 seconds

Biometric Image Cryptographic Algorithm Based on the Property of Wavelet Transform Coefficient (웨이브렛 변환 계수의 특성을 이용한 생체 영상 암호화 알고리즘)

  • Shin, Jonghong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.2
    • /
    • pp.41-49
    • /
    • 2016
  • Lossless encryption methods are more applicable than lossy encryption methods when marginal distortion is not tolerable. In this research, the author propose a novel lossless symmetric key encryption/decryption technique. In the proposed algorithm, the image is transformed into the frequency domain using the lifting wavelet transform, then the image sub-bands are encrypted in a such way that guarantees a secure, reliable, and an unbreakable form. The encryption involves scattering the distinguishable frequency data in the image using a reversible weighting factor amongst the rest of the frequencies. The algorithm is designed to shuffle and reverse the sign of each frequency in the transformed image before the image frequencies are transformed back to the pixel domain. The results show a total deviation in pixel values between the original and encrypted image. The decryption algorithm reverses the encryption process and restores the image to its original form. The proposed algorithm is evaluated using standard security and statistical methods; results show that the proposed work is resistant to most known attacks and more secure than other algorithms in the cryptography domain.

The Implementation of the Index Search System in a Encrypted Data-base (암호화된 데이터베이스에서 인덱스 검색 시스템 구현)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.5
    • /
    • pp.1653-1660
    • /
    • 2010
  • The user information stored in database have been leaked frequently. To protect information against malevolent manager on the inside or outside aggressor, it is one of the most efficient way to encrypt information and store to database. It is better to destruct information than not to use encrypted information stored in database. The encrypted database search system is developed variously, and used widely in many fields. In this paper, we implemented the scheme that can search encrypted document without exposing user's information to the untrusted server in mobile device. We compared and analyzed the result embodied with DES, AES, and ARIA based on symmetric key by searching time.

Accelerated VPN Encryption using AES-NI (AES-NI를 이용한 VPN 암호화 가속화)

  • Jeong, Jin-Pyo;Hwang, Jun-Ho;Han, Keun-Hee;Kim, Seok-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1065-1078
    • /
    • 2014
  • Considering the safety of the data and performance, it can be said that the performance of the AES algorithm in a symmetric key-based encryption is the best in the IPSec-based VPN. When using the AES algorithm in IPSec-based VPN even with the expensive hardware encryption card such as OCTEON Card series of Cavium Networks, the Performance of VPN works less than half of the firewall using the same hardware. In 2008, Intel announced a set of 7 AES-NI instructions in order to improve the performance of the AES algorithm on the Intel CPU. In this paper, we verify how much the performance IPSec-based VPN can be improved when using seven sets of AES-NI instruction of the Intel CPU.

An RFID Mutual Authentication Protocol Using One-Time Random Number (일회성 난수를 사용한 RFID 상호인증 프로토콜)

  • Oh, Se-Jin;Chung, Kyung-Ho;Yun, Tae-Jin;Abn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.7B
    • /
    • pp.858-867
    • /
    • 2011
  • The RFID(Radio-Frequency IDentification) systems have many security problem such as eavesdropping, a replay attack, location tracking and DoS(Denial of Service) attacks. Because RFID systems use radio-frequency. So research are being made to solve the problem of RFID systems, one of which is AES algorithm. This paper presents an authentication protocol using AES and one-time random number to secure other attacks like eavesdropping, a replay attack, location tracking, In addtion, RSMAP uses OTP(One-Time Pad) in order to safely transmit.

The design of authentication mechanism using kerberos and X.509 protocol in distributed environment (분산환경에서 Kerberos와 X.509 Protocol을 이용한 인증 메카니즘의 설계)

  • 김성진;정일용
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.12
    • /
    • pp.2860-2866
    • /
    • 1997
  • Kerberos is the most used example of authentication technology in distributed environment. In this paper, based on this method, a new authentication mechanism associated with X.509 protocol that authenticates services between regions is presented. Since any suggestions to regional services are not described in Kerberos, the authentication between regiona is performed via the connected chain obtained from x.509. These two protocols have distinguished key management systems -X.509 is designed using an asymmetric method, while Kerberos using a symmetric method. In order to provide regional services, X.509 is employed on connection part and Kerberos on actual authetication part.

  • PDF

Image Cryptographic Algorithm Based on the Property of Wavelet Packet Transform (웨이브렛 패킷 변환의 특성을 이용한 영상 암호화 알고리즘)

  • Shin, Jonghong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.49-59
    • /
    • 2018
  • Encryption of digital images has been requested various fields. In the meantime, many algorithms based on a text - based encryption algorithm have been proposed. In this paper, we propose a method of encryption in wavelet transform domain to utilize the characteristics of digital image. In particular, wavelet transform is used to reduce the association between the encrypted image and the original image. Wavelet packet transformations can be decomposed into more subband images than wavelet transform, and various position permutation, numerical transformation, and visual transformation are performed on the coefficients of this subband image. As a result, this paper proposes a method that satisfies the characteristics of high encryption strength than the conventional wavelet transform and reversibility. This method also satisfies the lossless symmetric key encryption and decryption algorithm. The performance of the proposed method is confirmed by visual and quantitative. Experimental results show that the visually encrypted image is seen as a completely different signal from the original image. We also confirmed that the proposed method shows lower values of cross correlation than conventional wavelet transform. And PSNR has a sufficiently high value in terms of decoding performance of the proposed method. In this paper, we also proposed that the degree of correlation of the encrypted image can be controlled by adjusting the number of wavelet transform steps according to the characteristics of the image.

The Hardware Design of Integrated Security Core for IoT Devices (사물인터넷 기기를 위한 통합 보안 코어의 하드웨어 설계)

  • Gookyi, Dennis A.N.;Ryoo, Kwangki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.584-586
    • /
    • 2017
  • In this paper we provide a unified crypto core that integrates lightweight symmetric cryptography and authentication. The crypto core implements a unified 128 bit key architecture of PRESENT encryption algorithm and a new lightweight encryption algorithm. The crypto core also consist of an authentication unit which neglects the use of hashing algorithms. Four algorithms are used for authentication which come from the Hopper-Blum (HB) and Hopper-Blum-Munilla-Penado (HB-MP) family of lightweight authentication algorithms: HB, HB+, HB-MP and HB-MP+. A unified architecture of these algorithms is implemented in this paper. The unified cryptosystem is designed using Verilog HDL, simulated with Modelsim SE and synthesized with Xilinx Design Suite 14.3. The crypto core synthesized to 1130 slices at 189Mhz frequency on Spartan6 FPGA device.

  • PDF

Influence of internal pores and graphene platelets on vibration of non-uniform functionally graded columns

  • Liu, Wen-qi;Liu, Shan-jun;Fan, Ming-yu;Tian, Wei;Wang, Ji-peng;Tahouneh, Vahid
    • Steel and Composite Structures
    • /
    • v.35 no.2
    • /
    • pp.295-306
    • /
    • 2020
  • This paper deals with free vibration analysis of non-uniform column resting on elastic foundations and subjected to follower force at its free end. The internal pores and graphene platelets (GPLs) are distributed in the matrix according to different patterns. The model is proposed with material parameters varying in the thickness of column to achieve graded distributions in both porosity and nanofillers. The elastic modulus of the nanocomposite is obtained by using Halpin-Tsai micromechanics model. The differential quadrature method as an efficient and accurate numerical approach is used to discretize the governing equations and to implement the boundary conditions. It is observed that the maximum vibration frequency obtained in the case of symmetric porosity and GPL distribution, while the minimum vibration frequency is obtained using uniform porosity distribution. Results show that for better understanding of mechanical behavior of nanocomposite column, it is crucial to consider porosities inside the material structure.

The effect of upstream low-drag vortex generators on juncture flows

  • Younis, Md.Y.;Zhang, Hua;Hu, Bo;Uddin, Emad;Aslam, Jawad
    • Wind and Structures
    • /
    • v.28 no.6
    • /
    • pp.355-367
    • /
    • 2019
  • Control of horseshoe vortex in the circular cylinder-plate juncture using vortex generator (VG) was studied at $Re_D$(where D is the diameter of the cylinder) = $2.05{\times}10^5$. Impact of a number of parameters e.g., the shape of the VG's, number of VG pairs (n), spacing between the VG and the cylinder leading edge (L), lateral gap between the trailing edges of a VG pair (g), streamwise gap between two VG pairs ($S_{VG}$) and the spacing between the two VG's in parallel arrangement ($Z_{VG}$) etc. were investigated on the horseshoe vortex control. The study is conducted using surface oil flow visualization and surface pressure measurements in low speed wind tunnel. It is observed that all the parameters studied have significant control effect, either by reduction in separation region or by lowering the adverse pressure along the symmetric axis upstream of the juncture.

Recent Development of High-efficiency Silicon Heterojunction Technology Solar Cells (실리콘 이종접합 태양전지 개발동향)

  • Lee, Ahreum;Yoo, Jinsu;Park, Sungeun;Park, Joo Hyung;Ahn, Seungkyu;Cho, Jun-Sik
    • Current Photovoltaic Research
    • /
    • v.9 no.4
    • /
    • pp.111-122
    • /
    • 2021
  • Silicon heterojunction technology (HJT) solar cells have received considerable attention due to advantages that include high efficiency over 26%, good performance in the real world environment, and easy application to bifacial power generation using symmetric device structure. Furthermore, ultra-highly efficient perovskite/c-Si tandem devices using the HJT bottom cells have been reported. In this paper, we discuss the unique feature of the HJT solar cells, the fabrication processes and the current status of technology development. We also investigate practical challenges and key technologies of the HJT solar cell manufacturers for reducing fabrication cost and increasing productivity.