• Title/Summary/Keyword: key distribution

Search Result 2,527, Processing Time 0.039 seconds

Quantum Authentication and Key Distribution protocol based on one-time ID (일회용 ID 기반 양자 인증 및 키 분배 프로토롤)

  • Lee Hwa-Yean;Hong Chang-Ho;Lim Jong-in;Yang Hyung-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.73-80
    • /
    • 2005
  • We propose a Quantum Authentication and Key distribution protocol based on one-time n using one-way Hash function. The designated users can authenticate each other and the arbitrator using their one-time ID and distribute a quantum secret key using remained GHZ states after authentication procedure. Though the help of the arbitrator is needed in the process of authentication and key distribution, our protocol prevents the arbitrator from finding out the shared secret key even if the arbitrator becomes an active attacker. Unconditional security can be proved in our protocol as the other QKD protocols.

Implementation of Group Key Management Protocol for Multicasting Information Security (멀티캐스팅 정보보안을 위한 그룹키 관리 프로토콜 구현)

  • Hong Jong-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.177-182
    • /
    • 2004
  • The existing group key management architectures applied to a small scale routing protocols may have many overheads with key distribution. Therefore this paper proposes a group key management protocol in PIM-SM multicast group communication. This method divide multicast groups with RP, and subgroup key managers are established in each RP and can be transmitted groups keys. And this does not have needs of the data translation and the new key distribution for path change. This does not have needs of the data translation and the new key distribution for path change, so the data transmission time can be reduced.

  • PDF

A improved authentication protocol for the forward security (개선된 포워드 보안을 위한 인증 프로토콜)

  • Shi, Wenbo;Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.17-27
    • /
    • 2007
  • This paper proposes a key distribution and authentication protocol between user, service provider and key distribution center (KDC). This protocol is based on symmetric cryptosystem, challenge-response, Diffie-Hellman component and hash function. In the proposed protocol, user and server update the session key under token-update operation, and user can process repeated efficient authentications by using updated session keys. And another merit is that KDC needs not to totally control the session key between user and server in proposed protocol. Even an attacker steals the parameters from the KDC, the attacker still can not calculate session key. According to the comparison and analysis with other protocols, our proposed protocol provides good efficiency and forward secure session key.

  • PDF

A Study on Public Key Cryptographic Authentication System Providing Key Distribution and Recovery in the Initial Authentication (초기인증에서 키 분배 및 복구를 지원하는 공개키 암호 인증시스템에 관한 연구)

  • Shin Kwang-Cheul;Cho Sung-Je
    • Journal of Internet Computing and Services
    • /
    • v.7 no.3
    • /
    • pp.83-91
    • /
    • 2006
  • In this paper, we improved a cryptography system model based on the secure initial authentication public key with PKINIT of authentication and key recovery protocol. It is applied to all fields of cryptography system using certificate. This study presents two mechanisms to authenticate between member users. The first mechanism is initial authentication and distribution of session key by public key cryptography based on certificate between entity and server, and the second mechanism is a key recovery support protocol considering loss of session key in the secure communication between application servers.

  • PDF

Privacy Amplification of Quantum Key Distribution Systems Using Continuous Variable (연속 변수를 이용한 양자 키 분배 시스템의 보안성 증폭)

  • Lee, Sun Yui;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.3
    • /
    • pp.1-5
    • /
    • 2016
  • The continuous variable quantum key distribution has been considered to have practical solution to provide high key rate. This paper explains the difference between DV-QKD and CV-QKD schemes. It describes CV-QKD as a theory that satisfies the uncertainty principle using continuous variable and homodyne detector. We shows varying length of secret key in QKD systems and amount of the exposed information to amplify privacy.

Temperature distribution analysis of steel box-girder based on long-term monitoring data

  • Wang, Hao;Zhu, Qingxin;Zou, Zhongqin;Xing, Chenxi;Feng, Dongming;Tao, Tianyou
    • Smart Structures and Systems
    • /
    • v.25 no.5
    • /
    • pp.593-604
    • /
    • 2020
  • Temperature may have more significant influences on structural responses than operational loads or structural damage. Therefore, a comprehensive understanding of temperature distributions has great significance for proper design and maintenance of bridges. In this study, the temperature distribution of the steel box girder is systematically investigated based on the structural health monitoring system (SHMS) of the Sutong Cable-stayed Bridge. Specifically, the characteristics of the temperature and temperature difference between different measurement points are studied based on field temperature measurements. Accordingly, the probability density distributions of the temperature and temperature difference are calculated statistically, which are further described by the general formulas. The results indicate that: (1) the temperature and temperature difference exhibit distinct seasonal characteristics and strong periodicity, and the temperature and temperature difference among different measurement points are strongly correlated, respectively; (2) the probability density of the temperature difference distribution presents strong non-Gaussian characteristics; (3) the probability density function of temperature can be described by the weighted sum of four Normal distributions. Meanwhile, the temperature difference can be described by the weighted sum of Weibull distribution and Normal distribution.

Key Drivers of Operational Performance of E-commerce Distribution Service Providers in Thailand

  • VONGURAI, Rawin
    • Journal of Distribution Science
    • /
    • v.20 no.12
    • /
    • pp.89-98
    • /
    • 2022
  • Purpose: Due to the rapid growth of e-commerce in Thailand, the operational excellence of distribution service providers has been elevated. Thus, this research investigated the key drivers of operational performance of e-commerce distributors in Thailand. The research contains key variables: the analytics capabilities of an organization, supply chain disruption orientation, innovation capability, and operational performance. Research design, data, and methodology: An online survey is administered to top managers and key personnel (N=425) employed for at least one year in Thailand's top five e-commerce distributors. The sampling methods were conducted using purposive sampling, quota sampling, and convenience sampling. Confirmatory Factor Analysis and Structural Equation Model were applied to analyze and confirm the model's goodness-of-fit and hypothesis testing. Results: The findings reveal that an organization's analytics capabilities significantly affect supply chain disruption orientation and supply chain resilience. Furthermore, operational performance is affected by supply chain disruption, supplier quality management, and innovation capability. Nevertheless, supply chain resilience and digital supply chain have no significant effect on operational performance. Conclusions: The results imply that supply chain digitalization could drive higher operational performance. Distribution businesses are encountering transformation and disruption, which should address the high level of a digital supply chain, innovation, and quality management to maximize their profit margin and delivery service quality.

Key Derivation Functions Using the Dual Key Agreement Based on QKD and RSA Cryptosystem (양자키분배와 RSA 암호를 활용한 이중키 설정 키유도함수)

  • Park, Hojoong;Bae, Minyoung;Kang, Ju-Sung;Yeom, Yongjin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.4
    • /
    • pp.479-488
    • /
    • 2016
  • For a secure communication system, it is necessary to use secure cryptographic algorithms and keys. Modern cryptographic system generates high entropy encryption key through standard key derivation functions. Using recent progress in quantum key distribution(QKD) based on quantum physics, it is expected that we can enhance the security of modern cryptosystem. In this respect, the study on the dual key agreement is required, which combines quantum and modern cryptography. In this paper, we propose two key derivation functions using dual key agreement based on QKD and RSA cryptographic system. Furthermore, we demonstrate several simulations that estimate entropy of derived key so as to support the design rationale of our key derivation functions.

Hybrid medium model for conjugate heat transfer modeling in the core of sodium-cooled fast reactor

  • Wang, X.A.;Zhang, Dalin;Wang, Mingjun;Song, Ping;Wang, Shibao;Liang, Yu;Zhang, Yapei;Tian, Wenxi;Qiu, Suizheng;Su, G.H.
    • Nuclear Engineering and Technology
    • /
    • v.52 no.4
    • /
    • pp.708-720
    • /
    • 2020
  • Core-wide temperature distribution in sodium-cooled fast reactor plays a key role in its decay heat removal process, however the prediction for temperature distribution is quite complex due to the conjugate heat transfer between the assembly flow and the inter-wrapper flow. Hybrid medium model has been proposed for conjugate heat transfer modeling in the core. The core is modeled with a Realistic modeled inter-wrapper flow and hybrid medium modeled assembly flow. To validate present model, simulations for a three-assembly model were performed with Realistic modeling, traditional porous medium model and hybrid medium model, respectively. The influences of Uniform/Non-Uniform power distribution among assemblies and the Peclet number within the assembly flow have been considered. Compared to traditional porous medium model, present model shows a better agreement with in Realistic modeling prediction of the temperature distribution and the radial heat transfer between the inter-wrapper flow and the assembly flow.

A Key Pre-distribution Scheme Using Double Hash Chain for Strong Security Strength of Wireless Sensor Node (무선 센서 노드의 강한 보안 강도를 위해 이중 해쉬 체인을 적용한 키 사전 분배 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8C
    • /
    • pp.633-641
    • /
    • 2008
  • Since WSNs encounter attacks, such as jamming or eavesdropping without physical access occurs, security is one of the important requirements for WSNs. The key pre-distribution scheme that was recently researched for advance of security in WSNs distributes the keys and probability with the use of q-composite random key pre-distribution method, but there is a high probability that no key shared between sensor nodes, and it takes a lot of time and energy to find out the shared key. Therefore, it is not suitable for WSNs. In order to enhance stability of a node that plays a role of gateway without depending on probabilistic key, this paper proposesa key pre-distribution scheme combined with random key pre-distribution scheme and double hash chain. Since the proposed scheme can maintain a small storage place and strong security strengths, it is more efficient than the existing schemes with the same security strengths. In addition, since it uses a small size of key generation key set, it can reduce a great deal of storage overhead.