• Title/Summary/Keyword: key distribution

Search Result 2,572, Processing Time 0.03 seconds

A Flexible Key Recovery System with One-way Key Distribution Property (일방향 키 분배 기능을 가지는 유연한 키 복구 시스템)

  • Yu, Jun-Seok;Kim, Hui-Do;Jeon, Jong-Min;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.8C no.3
    • /
    • pp.235-244
    • /
    • 2001
  • 급속산 암호의 민간 부문 확산에 따라 암소 사용으로 인한 부작용을 방지하기 위한 대책으로 키 복구에 대한 연구가 활발히 진행되고 있다. 그러나 지금까지 제시된 기존의 키 복구 기술들은 그 대부분이 정부의 법 집행권 보장에만 설계초점을 맞추고 있기 때문에 다양한 사용자들의 요구를 충족시키기 어렵다. 본 논문에서는 키 복구 시스템에 대한 사용주체들의 입장을 고려하여 다양한 환경에서 사용할 수 있는 키 복구 시스템을 제안한다. 제안하는 방식은 암호통신 과정 중에 키가 분배되는 일방향 키 분배가 가능하고 기존의 시스템만큼 효율적이며, 충분한 유연성을 제공한다.

  • PDF

Quantum Computing Cryptography and Lattice Mechanism

  • Abbas M., Ali Al-muqarm;Firas, Abedi;Ali S., Abosinnee
    • Journal of information and communication convergence engineering
    • /
    • v.20 no.4
    • /
    • pp.242-249
    • /
    • 2022
  • Classical cryptography with complex computations has recently been utilized in the latest computing systems to create secret keys. However, systems can be breached by fast-measuring methods of the secret key; this approach does not offer adequate protection when depending on the computational complexity alone. The laws of physics for communication purposes are used in quantum computing, enabling new computing concepts to be introduced, particularly in cryptography and key distribution. This paper proposes a quantum computing lattice (CQL) mechanism that applies the BB84 protocol to generate a quantum key. The generated key and a one-time pad encryption method are used to encrypt the message. Then Babai's algorithm is applied to the ciphertext to find the closet vector problem within the lattice. As a result, quantum computing concepts are used with classical encryption methods to find the closet vector problem in a lattice, providing strength encryption to generate the key. The proposed approach is demonstrated a high calculation speed when using quantum computing.

CKGS: A Way Of Compressed Key Guessing Space to Reduce Ghost Peaks

  • Li, Di;Li, Lang;Ou, Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.1047-1062
    • /
    • 2022
  • Differential power analysis (DPA) is disturbed by ghost peaks. There is a phenomenon that the mean absolute difference (MAD) value of the wrong key is higher than the correct key. We propose a compressed key guessing space (CKGS) scheme to solve this problem and analyze the AES algorithm. The DPA based on this scheme is named CKGS-DPA. Unlike traditional DPA, the CKGS-DPA uses two power leakage points for a combined attack. The first power leakage point is used to determine the key candidate interval, and the second is used for the final attack. First, we study the law of MAD values distribution when the attack point is AddRoundKey and explain why this point is not suitable for DPA. According to this law, we modify the selection function to change the distribution of MAD values. Then a key-related value screening algorithm is proposed to obtain key information. Finally, we construct two key candidate intervals of size 16 and reduce the key guessing space of the SubBytes attack from 256 to 32. Simulation experimental results show that CKGS-DPA reduces the power traces demand by 25% compared with DPA. Experiments performed on the ASCAD dataset show that CKGS-DPA reduces the power traces demand by at least 41% compared with DPA.

Verifiable Self-Certified Identification and Key-Distribution Protocols (검증 가능한 자체인증 개인식별 및 키분배 프로토콜)

  • Kim, Gyeong-Guk;Yu, Jun-Seok;Won, Dong-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.10
    • /
    • pp.2722-2727
    • /
    • 1999
  • In this paper we propose verifiable self-certified identification and key distribution protocols which has advantages of certificate-based scheme and Girault's self-certified public key. The security of the proposed protocols is based on ${\gamma}$\ulcorner-residuosity problem and discrete logarithm problem.

  • PDF

An Efficient Group Key Distribution Mechanism for the Secure Multicast Communication in Mobile Ad Hoc Networks (이동 애드혹 네트워크에서 안전한 멀티캐스트 통신을 위한 효율적인 그룹 키 분배 방식)

  • Lim Yu-Jin;Ahn Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.339-344
    • /
    • 2006
  • Secure delivery of multicast data can be achieved with the use of a group key for data encryption in mobile ad hoc network (MANET) applications based on the group communication. However, for the support of dynamic group membership, the group key has to be updated for each member joining/leaving and, consequently, a mechanism distributing an updated group key to members is required. The two major categories of the group key distribution mechanisms proposed for wired networks are the naive and the tree-based approaches. The naive approach is based on unicast, so it is not appropriate for large group communication environment. On the other hand, the tree-based approach is scalable in terms of the group size, but requires the reliable multicast mechanism for the group key distribution. In the sense that the reliable multicast mechanism requires a large amount of computing resources from mobile nodes, the tree-based approach is not desirable for the small-sized MANET environment. Therefore, in this paper, we propose a new key distribution protocol, called the proxy-based key management protocol (PROMPT), which is based on the naive approach in the small-sized MANET environment. PROMPT reduces the message overhead of the naive through the first-hop grouping from a source node and the last-hop grouping from proxy nodes using the characteristics of a wireless channel.

Metabolomes and transcriptomes revealed the saponin distribution in root tissues of Panax quinquefolius and Panax notoginseng

  • Wei, Guangfei;Yang, Feng;Wei, Fugang;Zhang, Lianjuan;Gao, Ying;Qian, Jun;Chen, Zhongjian;Jia, Zhengwei;Wang, Yong;Su, He;Dong, Linlin;Xu, Jiang;Chen, Shilin
    • Journal of Ginseng Research
    • /
    • v.44 no.6
    • /
    • pp.757-769
    • /
    • 2020
  • Background: Panax quinquefolius and Panax notoginseng are widely used and well known for their pharmacological effects. As main pharmacological components, saponins have different distribution patterns in the root tissues of Panax plants. Methods: In this study, the representative ginsenosides were detected and quantified by desorption electrospray ionization mass spectrometry and high-performance liquid chromatography analysis to demonstrate saponin distribution in the root tissues of P. quinquefolius and P. notoginseng, and saponin metabolite profiles were analyzed by metabolomes to obtain the biomarkers of different root tissues. Finally, the transcriptome analysis was performed to demonstrate the molecular mechanisms of saponin distribution by gene profiles. Results: There was saponin distribution in the root tissues differed between P. quinquefolius and P. notoginseng. Eight-eight and 24 potential biomarkers were detected by metabolome analysis, and a total of 340 and 122 transcripts involved in saponin synthesis that were positively correlated with the saponin contents (R > 0.6, P < 0.05) in the root tissues of P. quinquefolius and P. notoginseng, respectively. Among them, GDPS1, CYP51, CYP64, and UGT11 were significantly correlated with the contents of Rg1, Re, Rc, Rb2, and Rd in P. quinquefolius. UGT255 was markedly related to the content of R1; CYP74, CYP89, CYP100, CYP103, CYP109, and UGT190 were markedly correlated with the Rd content in P. notoginseng.

Scalable Distributed Group Key Distribution Scheme for Secure Internet Multicast (안전한 인터넷 멀티캐스트를 위한 확장성 있는 분산 그룹 키 분배 기법)

  • Jang, Ju-Man;Kim, Tai-Yun
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.1
    • /
    • pp.48-57
    • /
    • 2000
  • The need for high bandwidth, very dynamic secure internet multicast communications is increasingly evident in a wide variety of commercial, government, and internet communities. One of the most recently researches is mainly about the group key distribution schemes[1,3,4,5]. In this paper, we survey related group key distribution schemes and propose a new scalable distributed group key distribution scheme which is one of the most important parts in internet multicast environment. Then, we add this scheme to the existing multicast applications and analysis the test results. The proposed SDGD minimizes the times required to distribute and redistribute keys for joining and leaving the multicast group.

  • PDF

Prediction of steel corrosion in magnesium cement concrete based on two dimensional Copula function

  • Feng, Qiong;Qiao, Hongxia;Wang, Penghui;Gong, Wei
    • Computers and Concrete
    • /
    • v.21 no.2
    • /
    • pp.181-187
    • /
    • 2018
  • In order to solve the life prediction problem of damaged coating steel bar in magnesium cement concrete, this study tries to establish the marginal distribution function by using the corrosion current density as a single degradation factor. Representing the degree of steel corrosion, the corrosion current density were tested in electrochemical workstation. Then based on the Copula function, the joint distribution function of the damaged coating was established. Therefore, it is indicated that the corrosion current density of the bare steel and coated steel bar can be used as the boundary element to establish the marginal distribution function. By using the Frank-Copula function of Copula Archimedean function family, the joint distribution function of the damaged coating steel bar was successfully established. Finally, the life of the damaged coating steel bar has been lost in 7320d. As a new method for the corrosion of steel bar under the multi-dimensional factors, the two-dimensional Copula function has certain practical significance by putting forward some new ideas.

Research on the relationship between the thermal characteristics and the type of land cover in Beijing urban area by ASTER data

  • Zhu, QiJiang;Zhang, Xin;Bai, Xianghua
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.277-279
    • /
    • 2003
  • The study utilizes remote sensing as the main monitoring means. With different spatial high-resolution, multichannel ASTER remote sensing image as the main information in Beijing city zone; with regional border and statistical data as auxiliary factor a study between the thermal space distribution character and the underground medium is analyzed based on the GIS logical algorithm and synthetic analysis technology. Results show thermal forming mechanism and the rule of distribution is mainly related to the underground medium and the change of the city distribution. Different underground medium has different degree and intensity influence on the thermal space distribution. Furthermore, urban greenbelt and water areas can reduce the thermal effect and large-scale greenbelt creates green island effect. In addition, Road net, residential area, population density, heat resources and so on have some positive effect on the thermal distribution, which increase the local temperature and intensity on the other hand. It is important to study the thermal distribution and its related factors, which contributes to the plan, construction and development of the city.

  • PDF

12-year LIDAR Observations of Tropospheric Aerosol over Hefei (31.9°N, 117.2°E), China

  • Wu, Decheng;Zhou, Jun;Liu, Dong;Wang, Zhenzhu;Zhong, Zhiqing;Xie, Chenbo;Qi, Fudi;Fan, Aiyuan;Wang, Yingjian
    • Journal of the Optical Society of Korea
    • /
    • v.15 no.1
    • /
    • pp.90-95
    • /
    • 2011
  • 12-year LIDAR observations of tropospheric aerosol vertical distribution using a Mie scattering LIDAR in Hefei ($31.9^{\circ}N$, $117.2^{\circ}E$) from 1998 to 2009 are presented and analyzed in this paper. Characters of temporal variation and vertical distribution of tropospheric aerosol over Hefei are summarized from the LIDAR measurements. The impacts of natural source and human activities on the aerosol vertical distribution over Hefei could be seen clearly. Dust particles from the north in spring could affect the aerosol distributions below about 12 km over Hefei, and aerosol scale height in April reaches $2.29{\pm}0.68\;km$. Both LIDAR measurements and surface visibility imply that aerosols in the lower troposphere have been increasing since about 2005.