• Title/Summary/Keyword: digital key

Search Result 1,867, Processing Time 0.029 seconds

A Trusted Key Management Scheme for Digital Rights Management

  • Jeong, Yeon-Jeong;Yoon, Ki-Song;Ryou, Jae-Cheol
    • ETRI Journal
    • /
    • v.27 no.1
    • /
    • pp.114-117
    • /
    • 2005
  • In this paper, we propose a key management scheme which can provide delivery of the key used to encrypt a digital content from the package server to digital rights management (DRM) clients in a secure manner. The proposed scheme can protect digital content from attacks since an encrypted digital content is sent by a package server and only DRM clients can decrypt the encrypted digital content. It protects the key not only from purchasers but also among the other principals who manage the distribution and license servers.

  • PDF

Secret-key-sharing Cryptosystem Using Optical Phase-shifting Digital Holography

  • Jeon, Seok Hee;Gil, Sang Keun
    • Current Optics and Photonics
    • /
    • v.3 no.2
    • /
    • pp.119-127
    • /
    • 2019
  • A new secret-key-sharing cryptosystem using optical phase-shifting digital holography is proposed. The proposed secret-key-sharing algorithm is based on the Diffie-Hellman key-exchange protocol, which is modified to an optical cipher system implemented by a two-step quadrature phase-shifting digital holographic encryption method using orthogonal polarization. Two unknown users' private keys are encrypted by two-step phase-shifting digital holography and are changed into three digital-hologram ciphers, which are stored by computer and are opened to a public communication network for secret-key-sharing. Two-step phase-shifting digital holograms are acquired by applying a phase step of 0 or ${\pi}/2$ in the reference beam's path. The encrypted digital hologram in the optical setup is a Fourier-transform hologram, and is recorded on CCDs with 256 quantized gray-level intensities. The digital hologram shows an analog-type noise-like randomized cipher with a two-dimensional array, which has a stronger security level than conventional electronic cryptography, due to the complexity of optical encryption, and protects against the possibility of a replay attack. Decryption with three encrypted digital holograms generates the same shared secret key for each user. Schematically, the proposed optical configuration has the advantage of producing a kind of double-key encryption, which can enhance security strength compared to the conventional Diffie-Hellman key-exchange protocol. Another advantage of the proposed secret-key-sharing cryptosystem is that it is free to change each user's private key in generating the public keys at any time. The proposed method is very effective cryptography when applied to a secret-key-exchange cryptosystem with high security strength.

Accuracy of three-dimensional periodontal ligament models generated using cone-beam computed tomography at different resolutions for the assessment of periodontal bone loss

  • Hangmiao Lyu;Li Xu;Huimin Ma;Jianxia Hou;Xiaoxia Wang;Yong Wang;Yijiao Zhao;Weiran Li;Xiaotong Li
    • The korean journal of orthodontics
    • /
    • v.53 no.2
    • /
    • pp.77-88
    • /
    • 2023
  • Objective: To develop a method for generating three-dimensional (3D) digital models of the periodontal ligament (PDL) using 3D cone-beam computed tomography (CBCT) reconstruction and to evaluate the accuracy and agreement of the 3D PDL models in the measurement of periodontal bone loss. Methods: CBCT data collected from four patients with skeletal Class III malocclusion prior to periodontal surgery were reconstructed at three voxel sizes (0.2 mm, 0.25 mm, and 0.3 mm), and 3D tooth and alveolar bone models were generated to obtain digital PDL models for the maxillary and mandibular anterior teeth. Linear measurements of the alveolar bone crest obtained during periodontal surgery were compared with the digital measurements for assessment of the accuracy of the digital models. The agreement and reliability of the digital PDL models were analyzed using intra- and interexaminer correlation coefficients and Bland-Altman plots. Results: Digital models of the maxillary and mandibular anterior teeth, PDL, and alveolar bone of the four patients were successfully established. Relative to the intraoperative measurements, linear measurements obtained from the 3D digital models were accurate, and there were no significant differences among different voxel sizes at different sites. High diagnostic coincidence rates were found for the maxillary anterior teeth. The digital models showed high intra- and interexaminer agreement. Conclusions: Digital PDL models generated by 3D CBCT reconstruction can provide accurate and useful information regarding the alveolar crest morphology and facilitate reproducible measurements. This could assist clinicians in the evaluation of periodontal prognosis and establishment of an appropriate orthodontic treatment plan.

Design of Security Module using Key Exchange Protocol in Digital Contents (키 교환 프로토콜을 이용한 디지털콘텐츠 보호 모듈 설계)

  • 권도윤;이경원;김정호
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.3
    • /
    • pp.40-46
    • /
    • 2003
  • In the paper, designed digital contents security module to check unlawfulness reproduction and distribution of digital contents. This paper applied Diffie-Hellman algorithm that use discrete logarithm and random number as primary for public key application to create encryption key that agree each other through communication channel between DCPS and HOST, and applied Triple DES repeat DES 3 times through 2 different encryption key that is selecting ANSI X9.17 that is key management standard, ISO 8732 and PEM(Privacy-Enhanced Mail) etc. by secondary protection for safe transmission of digital contents in transmission line. Designed security module consist of key exchange module, key derivation module and copy protection processing module. Digital contents security module that design in this thesis checks reproduction and distribution of digital contents by unauthenticated user through user certification function and digital contents encryption function, and protect digital contents transmission line.

  • PDF

Design of a Private Key Escrow System based on the Fingerprint Identification (지문 인식 기반의 개인키 위탁 시스템의 설계)

  • Shin, Yong-Nyuo;Lee, Yong-Jun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.2
    • /
    • pp.21-28
    • /
    • 2008
  • There are some problems on the system that uses a password comprising a digital signature to identify the secret key owner under the public key infrastructure. For example, the password can be difficult to remember or easy to be disclosure, and users should make more complex password to protect it. A number of studies have been proceeded in order to overcome these defects using the fingerprint identification technologies, but they need to change the current standard of public key infrastructure. On the suggested private key escrow system, the private key can be withdrawn only through the enrollment and identification of a fingerprint template after it is saved to a reliable third system. Therefore, this new private key escrow system can remove previous inconveniences of managingthe private key on current public key infrastructure, and it exhibited superior results in terms of the evaluation items when compared with the integrated method of the existing fingerprint identification and public key infrastructure.

3D Printed Flexible Cathode Based on Cu-EDTA that Prepared by Molecular Precursor Method and Microwave Processing for Electrochemical Machining

  • Yan, Binggong;Song, Xuan;Tian, Zhao;Huang, Xiaodi;Jiang, Kaiyong
    • Journal of Electrochemical Science and Technology
    • /
    • v.11 no.2
    • /
    • pp.180-186
    • /
    • 2020
  • In this work, a metal-ligand solution (Cu-EDTA) was prepared based on the molecular precursor method and the solution was spin-coated onto 3D printed flexible photosensitive resin sheets. After being processed by microwave, a laser with a wavelength of 355 nm was utilized to scan the spin-coated sheets and then the sheets were immersed in an electroless copper plating solution to deposit copper wires. With the help of microwave processing, the adhesion between copper wires and substrate was improved which should result from the increase of roughness, decrease of contact angle and the consistent orientation of coated film according to the results of 3D profilometer and SEM. XPS results showed that copper seeds formed after laser scanning. Using the 3D printed flexible sheets as cathode and galvanized iron as anode, electrochemical machining was conducted.

Three-dimensional analysis of the positional relationship between the dentition and basal bone region in patients with skeletal Class I and Class II malocclusion with mandibular retrusion

  • Jun Wan;Xi Wen;Jing Geng;Yan Gu
    • The korean journal of orthodontics
    • /
    • v.54 no.3
    • /
    • pp.171-184
    • /
    • 2024
  • Objective: This study aimed to determine the maxillary and mandibular basal bone regions and explore the three-dimensional positional relationship between the dentition and basal bone regions in patients with skeletal Class I and Class II malocclusions with mandibular retrusion. Methods: Eighty patients (40 each with Class I and Class II malocclusion) were enrolled. Maxillary and mandibular basal bone regions were determined using cone-beam computed tomography images. To measure the relationship between the dentition and basal bone region, the root position and root inclination were calculated using the coordinates of specific fixed points by a computer program written in Python. Results: In the Class II group, the mandibular anterior teeth inclined more labially (P < 0.05), with their apices positioned closer to the external boundary. The apex of the maxillary anterior root was positioned closer to the external boundary in both groups. Considering the molar region, the maxillary first molars tended to be more lingually inclined in females (P = 0.037), whereas the mandibular first molars were significantly more labially inclined in the Class II group (P < 0.05). Conclusions: Mandibular anterior teeth in Class II malocclusion exhibit a compensatory labial inclination trend with the crown and apex relative to the basal bone region when mandibular retrusion occurs. Moreover, as the root apices of the maxillary anterior teeth are much closer to the labial side in Class I and Class II malocclusion, the range of movement at the root apex should be limited to avoid extensive labial movement.

Dual Optical Encryption for Binary Data and Secret Key Using Phase-shifting Digital Holography

  • Jeon, Seok Hee;Gil, Sang Keun
    • Journal of the Optical Society of Korea
    • /
    • v.16 no.3
    • /
    • pp.263-269
    • /
    • 2012
  • In this paper, we propose a new dual optical encryption method for binary data and secret key based on 2-step phase-shifting digital holography for a cryptographic system. Schematically, the proposed optical setup contains two Mach-Zehnder type interferometers. The inner interferometer is used for encrypting the secret key with the common key, while the outer interferometer is used for encrypting the binary data with the same secret key. 2-step phase-shifting digital holograms, which result in the encrypted data, are acquired by moving the PZT mirror with phase step of 0 or ${\pi}/2$ in the reference beam path of the Mach-Zehnder type interferometer. The digital hologram with the encrypted information is a Fourier transform hologram and is recorded on CCD with 256 gray level quantized intensities. Computer experiments show the results to be encryption and decryption carried out with the proposed method. The decryption of binary secret key image and data image is performed successfully.

Extention of Kailar Accountability Logic for Symmetric Key Digital Signature and Accountavility Analysis of an Electronic Payment Potocol (대칭키 전자서명을 위한 Kailar 책임 로직 (Accountability Logic)의 확장 및 전자지불 프로토콜의 책임분석)

  • Kim, Yeong-Dal;Han, Seon-Yeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.3046-3059
    • /
    • 1999
  • Kailar Accountability Logic proposed for the accountability analysis of communication protocols that require accountability and use asymmetric key digital signature is extended for protocols that use symmetric key digital signature. A proposed electronic micropayment protocol that uses symmetric key digital signature is analyzed to illustrate the use of the extend logic in detecting its lack f accountability and suggesting changes to enhance its accountability.

  • PDF

A Study on the Factors Affecting Usage Intention of Digital Twin Technology in Product Design (제품 설계 시 디지털 트윈 기술 사용의도에 영향을 미치는 요인에 대한 연구)

  • Cho, Yong Won;Im, Eun Tack;Gim, Gwang Yong
    • Journal of Information Technology Services
    • /
    • v.18 no.3
    • /
    • pp.75-93
    • /
    • 2019
  • Digital twin technology is one of the key technologies to strengthen the competitiveness of manufacturing industry from the viewpoint of digital transformation in the era of $4^{th}$ industrial revolution. In this research, the important role in using digital twin technology in product design, This paper summarizes and empirically verifies the technical characteristics of digital twins, a key concept in the digital transition of the manufacturing industry. In this study, the technology characteristics of digital twin which is key concept in the digital transformation of manufacturing industry are summarized and empirically validated which factors militate a critical role in the use of digital twin technology in product design which is key area of product development. As a result of analysis, datafication, intellectualization which are characteristics of digital twin technology and task characteristics of product design influence Task Technology Fit (TTF) and Task Technology Fit (TTF) influences Technology (UTAUT) And finally, performance expectancy, effort expectancy, social influence and facilitating conditions affect usage intention.