• Title/Summary/Keyword: key exchange

Search Result 777, Processing Time 0.028 seconds

Synthesis, Structure and Magnetization Behaviors of MnBi/Fe3B/Nd2Fe14B Nanocomposite alloy

  • Yang, Y.;Wu, Q.;Hu, Y.C.;Zhang, P.Y.;Ge, H.L.
    • Journal of Magnetics
    • /
    • v.21 no.2
    • /
    • pp.235-238
    • /
    • 2016
  • Microstructure and magnetization behaviors of $MnBi/Fe_3B/Nd2_Fe_{14}B$ nanocomposite alloy have been investigated. It was found that the coercivity increased firstly and then decreased, and saturation magnetization decreased with the additon of MnBi alloy. The addition of 40 wt.% MnBi powder enhanced the coercivity from 192.8 kA/m to 311.2 kA/m. The ${\delta}M$ and D(H)-H plots suggested the occurrence of a stronger exchange-coupling occurring between the hard and soft magnetic phase for this sample. The dependence of coercivity with temperature was discussed in 40 wt.% $Mn_{55}Bi_{45}$/ 60 wt.% $Nd_{4.5}Fe_{76.5}Nb_{0.5}B_{18.5}$ alloy powder, and a positive temperature coefficient was founded from 298 K to 350 K.

Real Exchange Rate Misalignment in Pakistan: An Application of Regime Switching Model

  • FIAZ, Asma;KHURSHID, Nabila;SATTI, Ahsan;MALIK, Muhammad Shuaib;MALIK, Wasim shahid
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.12
    • /
    • pp.63-73
    • /
    • 2021
  • This study investigates the key determinants of exchange rate (RER) misalignment for the period 1991 to 2020. The BEER technique has been used to estimate the degree of the equilibrium exchange rate. To explore the actual exchange rate misalignment and to assess the behavior of variables that are different in different regimes of undervaluation and overvaluation, the nonlinear technique of Markov regime-switching (MSM) was applied. The mean and variance of each regime are highly significant and show that undervaluation episodes have a low mean (116.139) and more volatility (1.229) while overvaluation episodes have a high mean (126.732) with less volatility (0.871). The findings show that MSM accurately identifies exchange rate misalignment in both regimes as separate incidents of overvaluation and undervaluation. Results further depict that misalignment of the RER is affected by terms of trade, net foreign assets, interest differential, government investment, and consumption decision. Results recommend that if policymakers want to use the exchange rate as a policy tool, they must first consider the drivers of the equilibrium exchange rate. As a result, any deliberate actions to address exchange rate misalignment must focus on the underlying fundamentals that drive the exchange rate.

Geft is dispensable for the development of the second heart field

  • Fan, Xiongwei;Hou, Ning;Fan, Kaiji;Yuan, Jiajia;Mo, Xiaoyang;Deng, Yun;Wan, Yongqi;Teng, Yan;Yang, Xiao;Wu, Xiushan
    • BMB Reports
    • /
    • v.45 no.3
    • /
    • pp.153-158
    • /
    • 2012
  • Geft is a guanine nucleotide exchange factor, which can specifically activate Rho family of small GTPase by catalyzing the exchange of bound GDP for GTP. Geft is highly expressed in the excitable tissue as heart and skeletal muscle and plays important roles in many cellular processes, such as cell proliferation, migration, and cell fate decision. However, the in vivo role of Geft remains unknown. Here, we generated a Geft conditional knockout mouse by flanking exons 5-17 of Geft with loxP sites. Cre-mediated deletion of the Geft gene in heart using Mef2c-Cre transgenic mice resulted in a dramatic decrease of Geft expression. Geft knockout mice develop normally and exhibit no discernable phenotype, suggesting Geft is dispensable for the development of the second heart field in mouse. The Geft conditional knockout mouse will be a valuable genetic tool for uncovering the in vivo roles of Geft during development and in adult homeostasis.

A Session Key Establishment Scheme in Mobile Ad-Hoc Networks (이동 애드혹 네트워크에서 세션 키 설정 방안)

  • 왕기철;정병호;조기환
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.353-362
    • /
    • 2004
  • Mobile Ad-Hoc network tends to expose scarce computing resources and various security threats because all traffics are carried in air along with no central management authority. To provide secure communication and save communication overhead, a scheme is inevitable to serurely establish session keys. However, most of key establishment methods for Ad-Hoc network focus on the distribution of a group key to all hosts and/or the efficient public key management. In this paper, a secure and efficient scheme is proposed to establish a session key between two Ad-Hoc nodes. The proposed scheme makes use of the secret sharing mechanism and the Diffie-Hellman key exchange method. For secure intra-cluster communication, each member node establishes session keys with its clusterhead, after mutual authentication using the secret shares. For inter-cluster communication, each node establishes session keys with its correspondent node using the public key and Diffie-Hellman key exchange method. The simulation results prove that the proposed scheme is more secure and efficient than that of the Clusterhead Authentication Based Method(1).

Provably Secure Tree-Based Centralized Group Key Distribution: Security Model and Modular Approach (증명 가능한 트리기반 중앙 분배 방식의 그룹키 기법: 안전성 모델 및 변환모듈)

  • Kim Hyun-Jeong;Lee Su-Mi;Lee Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.69-78
    • /
    • 2004
  • During the last decade, security models have been defined for two- and three-parity key exchange protocols. Currently there is a growing research interest in security models for group key management schemes. While various security models and provably secure protocols have been proposed for distributed group key exchange schemes, no results are hewn for centralized group key distribution schemes in spite of their theoretical and practical importance. We describe security requirements and a formal security model for centralized group key distribution scheme: we define the model on the channel controlled by adversaries with the ability of strong user corruption. In the security model, we propose a conversion module which can transform centralized tree-based group key distribution schemes in the literature to provably secure centralized tree-based group key distribution schemes.

Design of SRP based Independent authentication protocol for efficient user authentication (효율적 사용자 인증을 위한 SRP 기반의 독립적 인증 프로토콜 설계)

  • 정경숙;정태충
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.3
    • /
    • pp.130-137
    • /
    • 2003
  • This paper proposes protocol design that can do user authentication efficiently in current systems that client-server environment is developed. And proposes a password-based authentication protocol suitable to certification through trustless network or key exchange. While the existing password-base protocols certify users through certification authority (CA) between client and server, the proposed protocol in this paper, users and server exchange keys and perform authentication without help of CA. To ameliorate the drawback of password-based protocols causing by the short length and randomness of password, the proposed protocol uses the signature techniques of ECDSA and the SRP protocol based on Diffie-Hellman key exchange method. Also, by with compare to round number and Hash function number and exponential operation of existing protocols, we explained efficiency of proposed protocol.

  • PDF

A Credit Card based Authentication and Key Exchange Protocol for Mobile Internet (무선 인터넷을 위한 신용카드 기반의 인증 및 키 교환 프로토콜)

  • 이현주;이충세
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.8
    • /
    • pp.1732-1742
    • /
    • 2003
  • WPP protocol based a Credit card payment in mobile Internet uses WTLS which is security protocol of WAP. WTLS can't provide End­to­End security in network. In this paper, we propose a protocol both independent in mobile Internet platform and allow a security between user and VASP using Mobile Gateway in AIP. In particular, our proposed protocol is suitable in mobile Internet, since session key for authentication and initial payment process is generated using Weil Diffie­Hellman key exchange method that use additive group algorithm on elliptic curve.

Split Password-Based Authenticated Key Exchange (분할된 패스워드 기반 인증된 키교환 프로토콜)

  • 류종호;염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.23-36
    • /
    • 2004
  • This paper presents a password based authentication and key exchange protocol which can be used for both authenticating users and exchanging session keys for a subsequent secure communication over an untrusted network. Our idea is to increase a randomness of the password verification data, i.e., we split the password, and then amplify the split passwords in the high entropy-structured password verification data. And in order to prevent the verifier-compromised attack, we construct our system such that the password verification data is encrypted with the verifier's key and the private key of verifier used to encrypt it is stored in a secure place like a smart cards. Also we propose the distributed password authentication scheme utilizing many authentication servers in order to prevent the server-compromised attack occurred when only one server is used. Furthermore, the security analysis on the proposed protocol has been presented as a conclusion.

Analysis of the Blocking Probability for Wireless PKI (무선 PKI에서의 블러킹 확률 분석)

  • Shin Seung-Soo;Choi Seung Kwon;Ji Hong-Il;Shin Dong-Hwa;Cho Yong-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5A
    • /
    • pp.426-435
    • /
    • 2005
  • this paper, we made out blocking probability analysis for a new authentication structure for reducing the certificate acquisition time which is one of the factors that should be improved in a conventional wireless PKI. A conventional key exchange method simply performs the key exchange setup step based on discrete algebraic subjects. But the mutual-authentication procedure of wireless PKI for reducing authentication time uses an elliptical curve for a key exchange setup step. Besides, we proposed advanced handover method and blocking probability analysis for wireless PKI. Proposed handover method shows reduced handover processing time than conventional method since it can reduce CRL retrieval time. Also, we compared proposed authentication structure and conventional algorithm, and simulation results show that proposed authentication method outperforms conventional algorithm in all environment regardless of call arrival rate, queue service rate, queue size