• Title/Summary/Keyword: Symmetric key

Search Result 341, Processing Time 0.028 seconds

Three Steps Polyalphabetic Substitution Cipher Practice Model using Vigenere Table for Encryption (Vigenere 테이블을 이용한 3단계 다중 알파벳 치환 암호화 모델)

  • Nguyen Huu Hoa;Dang Quach Gia Binh;Do Yeong Kim;Young Namgoong;Si Choon Noh
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.33-39
    • /
    • 2022
  • Recently, cyberattacks on infrastructure have been continuously occurring with the starting of neutralizing the user authentication function of information systems. Accordingly, the vulnerabilities of system are increasing day by day, such as the increase in the vulnerabilities of the encryption system. In this paper, an alternative technique for the symmetric key algorithm has been developed in order to build the encryption algorithm that is not easy for beginners to understand and apply. Vigenere Cipher is a method of encrypting alphabetic text and it uses a simple form of polyalphabetic substitution. The encryption application system proposed in this study uses the simple form of polyalphabetic substitution method to present an application model that integrates the three steps of encryption table creation, encryption and decryption as a framework. The encryption of the original text is done using the Vigenère square or Vigenère table. When applying to the automatic generation of secret keys on the information system this model is expected that integrated authentication work, and analysis will be possible on target system. ubstitution alphabets[3].

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key (마이크로 모빌리티 환경에서 보안 그룹키를 이용한 안전한 멀티캐스트 프로토콜)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.573-586
    • /
    • 2008
  • The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.

A Network Analysis of the Research Trends in Fingerprints in Korea (네트워크 분석을 활용한 국내 지문인식연구의 동향분석)

  • Jung, Jinhyo;Lee, Chang-Moo
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.15-30
    • /
    • 2017
  • Since the 1990s, fingerprint recognition has attracted much attention among scholars. There have been numerous studies on fingerprint recognition. However, most of the academic papers have focused mainly on how to make a technical advance of fingerprint recognition. there has been no significant output in the analysis of the research trends in fingerprint recognition. It's essential part to describe the overall structure of fingerprint recognition to make further studies much more efficient and effective. To this end, the primary purpose of this article is to deliver an overview of the research trends on fingerprint recognition based on network analysis. This study analyzed abstracts of the 122 academic journals ranging from 1990 to 2015. For gathering those data, the author took advantage of an academic searchable data base-RISS. After collecting abstracts, cleaning process was carried out and key words were selected by using Krwords and R; co-occurrence symmetric matrix made up of key words was created by Ktitle; and Netminer was employed to analyze closeness centrality. The result achieved from this work included followings: research trends in fingerprint recognition from 1990 to 2000, 2001 to 2005, 2006 to 2010, and 2011 to 2015.

Post-Quantum Security Strength Evaluation through Implementation of Quantum Circuit for SIMECK (SIMEC 경량암호에 대한 양자회로 구현 및 Post-Quantum 보안 강도 평가)

  • Song Gyeong Ju;Jang Kyung Bae;Sim Min Joo;Seo Hwa Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.181-188
    • /
    • 2023
  • Block cipher is not expected to be safe for quantum computer, as Grover's algorithm reduces the security strength by accelerating brute-force attacks on symmetric key ciphers. So it is necessary to check the post-quantum security strength by implementing quantum circuit for the target cipher. In this paper, we propose the optimal quantum circuit implementation result designed as a technique to minimize the use of quantum resources (qubits, quantum gates) for SIMECK lightweight cryptography, and explain the operation of each quantum circuit. The implemented SIMECK quantum circuit is used to check the estimation result of quantum resources and calculate the Grover attack cost. Finally, the post-quantum strength of SIMECK lightweight cryptography is evaluated. As a result of post-quantum security strength evaluation, all SIMECK family cipher failed to reach NIST security strength. Therefore, it is expected that the safety of SIMECK cipher is unclear when large-scale quantum computers appear. About this, it is judged that it would be appropriate to increase the block size, the number of rounds, and the key length to increase the security strength.

Secure Certificates Duplication Method Among Multiple Devices Based on BLE and TCP (BLE 및 TCP 기반 다중 디바이스 간 안전한 인증서 복사 방법)

  • Jo, Sung-Hwan;Han, Gi-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • A certificate is a means to certify users by conducting the identification of the users, the prevention of forgery and alteration, and non-repudiation. Most people use an accredited certificate when they perform a task using online banking, and it is often used for the purpose of proving one's identity in issuing various certificates and making electronic payments in addition to online banking. At this time, the issued certificate exists in a file form on the disk, and it is possible to use the certificate issued in an existing device in a new device only if one copies it from the existing device. However, most certificate duplication methods are a method of duplication, entering an 8-16 digit verification code. This is inconvenient because one should enter the verification code and has a weakness that it is vulnerable to security issues. To solve this weakness, this study proposes a method for enhancing security certificate duplication in a multi-channel using TCP and BLE. The proposed method: 1) shares data can be mutually authenticated, using BLE Advertising data; and 2) encrypts the certificate with a symmetric key algorithm and delivers it after the certification of the device through an ECC-based electronic signature algorithm. As a result of the implementation of the proposed method in a mobile environment, it could defend against sniffing attacks, the area of security vulnerabilities in the existing methods and it was proven that it could increase security strength about $10^{41}$ times in an attempt of decoding through the method of substitution of brute force attack existing method.

Evaluation of Flexural Behavior of Prestressed Composite Beams with Corrugated Webs (파형웨브 프리스트레스트 합성보의 휨거동 평가)

  • Oh, Jae-Yuel;Lee, Deuck-Hang;Kim, Kang-Su;Kang, Hyun;Lee, Sofia;Bang, Yong-Sik
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2010.05a
    • /
    • pp.39-40
    • /
    • 2010
  • The demands for longer span and reduction of story height have greatly increased as building structures become much larger and higher in recent years. Although the development of flexural members for reducing story height or making long span has been studied by many researchers and engineers, there is still a lack of efficient systems that meet these two demands simultaneously. This study aimed at developing a new composite beam system suitable for long span and reduction of story height, and proposed a prestressed composite beam with corrugated web. It has great resistance against non-symmetric construction load due to its strong out-of-plane shear strength with relatively small member height as well as good constructability and economic efficiency by removing/minimizing form work. The corrugated webs also make accordion effect introducing larger effective prestressing force to top and bottom flanges, which causes larger upward camber reducing the member deflection. Five full-scale specimens with key test parameters, which are web sectional shapes and number of drape points, were tested to understand their flexural behavior and to verify the performance of the proposed method. The experimental test results showed that the proposed prestressed composite beam had greater flexural strength and stiffness than the ordinary non-prestressed composite beam.

  • PDF

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (익명적 비대칭 핑거프린팅 기법의 보안 취약성 분석 및 개선 방안)

  • Kwon, Sae-Ran
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.396-403
    • /
    • 2009
  • An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.

Modeling and analysis of selected organization for economic cooperation and development PKL-3 station blackout experiments using TRACE

  • Mukin, Roman;Clifford, Ivor;Zerkak, Omar;Ferroukhi, Hakim
    • Nuclear Engineering and Technology
    • /
    • v.50 no.3
    • /
    • pp.356-367
    • /
    • 2018
  • A series of tests dedicated to station blackout (SBO) accident scenarios have been recently performed at the $Prim{\ddot{a}}rkreislauf-Versuchsanlage$ (primary coolant loop test facility; PKL) facility in the framework of the OECD/NEA PKL-3 project. These investigations address current safety issues related to beyond design basis accident transients with significant core heat up. This work presents a detailed analysis using the best estimate thermal-hydraulic code TRACE (v5.0 Patch4) of different SBO scenarios conducted at the PKL facility; failures of high- and low-pressure safety injection systems together with steam generator (SG) feedwater supply are considered, thus calling for adequate accident management actions and timely implementation of alternative emergency cooling procedures to prevent core meltdown. The presented analysis evaluates the capability of the applied TRACE model of the PKL facility to correctly capture the sequences of events in the different SBO scenarios, namely the SBO tests H2.1, H2.2 run 1 and H2.2 run 2, including symmetric or asymmetric secondary side depressurization, primary side depressurization, accumulator (ACC) injection in the cold legs and secondary side feeding with mobile pump and/or primary side emergency core coolant injection from the fuel pool cooling pump. This study is focused specifically on the prediction of the core exit temperature, which drives the execution of the most relevant accident management actions. This work presents, in particular, the key improvements made to the TRACE model that helped to improve the code predictions, including the modeling of dynamical heat losses, the nodalization of SGs' heat exchanger tubes and the ACCs. Another relevant aspect of this work is to evaluate how well the model simulations of the three different scenarios qualitatively and quantitatively capture the trends and results exhibited by the actual experiments. For instance, how the number of SGs considered for secondary side depressurization affects the heat transfer from primary side; how the discharge capacity of the pressurizer relief valve affects the dynamics of the transient; how ACC initial pressure and nitrogen release affect the grace time between ACC injection and subsequent core heat up; and how well the alternative feeding modes of the secondary and/or primary side with mobile injection pumps affect core quenching and ensure stable long-term core cooling under controlled boiling conditions.

Study Visual Characteristics of World Cup Emblems (월드컵 엠블럼에 나타난 시각적 특징 연구)

  • YongFeng Liu
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.519-528
    • /
    • 2023
  • The visual characteristics of the World Cup emblem play an important role in conveying culture and identity, highlighting the key elements of the Games, and strengthening the brand image. This study first investigated the visual elements and theoretical background of the emblem through previous studies. Second, the selection of symbolism, shape, and color was the subject of the study. Third, based on the shape-related theory based on the '100 National Cultural Symbols', the analysis was performed using the 'IRI Color Matching Image Scale' as a tool, and a final conclusion was drawn. The World Cup emblem uses a lot of ethnic and living symbols, and the living and ethnic symbols are expressed in a combination. In the beginning, there were many symmetric shapes, but after that it changed to an asymmetric shape. The curved expression form is more used than the straight expression form. And most of the color arrangement image scale distribution shows light, dynamic and modern color arrangement characteristics. In the future, the World Cup emblem design will continue to use national and living symbols. The shape of the emblem should use curves and asymmetric designs, be intuitive, and directly reflect the theme of the competition. In addition, the national flag color should be used as the main color, and other colors should be used as secondary colors. The combination of colors must match the light, dynamic and modern color characteristics of the IRI color scheme image scale.

Differentiation of Medial or Lateral Temporal Lobe Epilepsy by F-18-Fluorodeoxyglucose Positron Emission Tomography: Comparative Study with Magnetic Resonance Imaging in 113 Surgically and Pathologically Proven Patients (F-18-Fluorodeoxyglucose 양전자단층촬영을 이용한 내외측 측두엽간질의 감별: 수술과 병리 소견으로 확진한 113예에서 자기공명영상과 비교 분석)

  • Lee, Dong-Soo;Lee, Sang-Kun;Chang, Ki-Hyun;Chung, Chun-Kee;Choi, Ki-Young;Chung, June-Key;Lee, Myung-Chul
    • The Korean Journal of Nuclear Medicine
    • /
    • v.33 no.2
    • /
    • pp.111-119
    • /
    • 1999
  • Purpose: As mesial temporal lobe epilepsy (TLE) shows hypometabolism of medial and lateral temporal lobe, we investigated whether symmetric uptake of F-18-FDG in medial temporal lobes can differentiate mesial from lateral TLE. Materials and Methods: In 113 patients (83 mesial TLE, 30 lateral TLE) who underwent anterior temporal lobectomy and/or corticectomy with good surgical outcome, we performed F-18-FDG PET and compared F-18-FDG uptake of medial and lateral temporal lobes. All the patients with mesial TLE had hippocampal sclerosis except one congenital abnormal hippocampus. Patients with lateral TLE revealed cerebromalacia, microdysgenesis, arteriovenous malformation, old contusion, and cortical dysplasia. Results: Sensitivity of F-18-FDG PET and MR for mesial TLE was 84% (70/83) and 73% (61/83), respectively. Sensitivity of F-18-FDG PET and MR for lateral TLE was 90% (27/30) and 66% (20/30), respectively. Twelve patients were normal on F-18-FDG PET. 101 patients had hypometabotism of lateral temporal lobe. Among 88 patients who showed hypometabolism of medial temporal lobe as well as lateral temporal lobe, 70 were mesial TLE patients and 18 were lateral TLE on pathologic examination. Positive predictive value of medial temporal hypometabolism for mesial TLE was 80%. Among 13 patients who showed hypometabolism of only lateral temporal lobe, 4 were mesial TLE and 9 were lateral TLE. Positive predictive value of hypometabolism of lateral temporal lobe for the diagnosis of lateral TLE was 69% (9/13). Normal MR findings stood against medial TLE, whose negative predictive value was 66%. Conclusion: Lateral temporal lobe epilepsy should be suspected when there is decreased F-18-FDG uptake in lateral temporal lobe with normal uptake in medial temporal lobe.

  • PDF