• 제목/요약/키워드: key generation

검색결과 1,461건 처리시간 0.027초

IEEE 802-11i의 상호인증과 키 생성 및 교환 메커니즘 분석 (Analysis of Mutual Authentication, Key generation and Key exchange mechanism of IEEE 802.11i)

  • 박지혜;문일현;이옥연;김창범
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2003년도 하계학술대회논문집
    • /
    • pp.249-253
    • /
    • 2003
  • 기존의 무선 랜의 보안상의 문제점들을 해결하기 위하여 사용자와 인증자사이의 상호인증과 키를 교환하는 메커니즘이 요구된다. 이것을 보안하기 위해 IEEE 802.11i에서 키 체계와 4-Way Handshake를 제안하였다. 본 논문에서 언급되는 키 생성 및 교환 메커니즘은 사용자와 서버간의 인증된 마스터키를 통한 사용자와 인증자의 상호인증과, 키 생성과 키 교환하는 방법에 초점을 맞추고 있다. 이러한 키를 생성하기 위한 Pairwise 키 체계와 키 교환을 위한 4-Way Handshake, 4-Way Handshake에서 사용되는 EAPOL-Key message에 대하여 분석하였다.

  • PDF

A novel method to aging state recognition of viscoelastic sandwich structures

  • Qu, Jinxiu;Zhang, Zhousuo;Luo, Xue;Li, Bing;Wen, Jinpeng
    • Steel and Composite Structures
    • /
    • 제21권6호
    • /
    • pp.1183-1210
    • /
    • 2016
  • Viscoelastic sandwich structures (VSSs) are widely used in mechanical equipment, but in the service process, they always suffer from aging which affect the whole performance of equipment. Therefore, aging state recognition of VSSs is significant to monitor structural state and ensure the reliability of equipment. However, non-stationary vibration response signals and weak state change characteristics make this task challenging. This paper proposes a novel method for this task based on adaptive second generation wavelet packet transform (ASGWPT) and multiwavelet support vector machine (MWSVM). For obtaining sensitive feature parameters to different structural aging states, the ASGWPT, its wavelet function can adaptively match the frequency spectrum characteristics of inspected vibration response signal, is developed to process the vibration response signals for energy feature extraction. With the aim to improve the classification performance of SVM, based on the kernel method of SVM and multiwavelet theory, multiwavelet kernel functions are constructed, and then MWSVM is developed to classify the different aging states. In order to demonstrate the effectiveness of the proposed method, different aging states of a VSS are created through the hot oxygen accelerated aging of viscoelastic material. The application results show that the proposed method can accurately and automatically recognize the different structural aging states and act as a promising approach to aging state recognition of VSSs. Furthermore, the capability of ASGWPT in processing the vibration response signals for feature extraction is validated by the comparisons with conventional second generation wavelet packet transform, and the performance of MWSVM in classifying the structural aging states is validated by the comparisons with traditional wavelet support vector machine.

바이오 보안토큰을 이용한 프라이버시 보호형 사용자 인증기법 (Privacy Preserving User Authentication Using Biometric Hardware Security Module)

  • 신용녀;전명근
    • 정보보호학회논문지
    • /
    • 제22권2호
    • /
    • pp.347-355
    • /
    • 2012
  • 바이오 보안토큰은 바이오 인식 센서와 바이오인식 정보를 처리할 수 있는 MCU, 보안토큰으로 구성된 USB 형태의 하드웨어 기기로서, 기기 내부에서 바이오인식 센서로 가입자의 바이오인식 정보를 추출하여 보안토큰에 안전하게 저장하며, 사용자 인증시 바이오인식 센서로 부터 취득된 바이오인식 정보와 저장되어 있는 바이오인식 정보를 기기내부 MCU에서 매칭하여 사용자를 인증하는 독립된 하드웨어 보안모듈이다. 기존의 보안토큰이 제공하는 개인인증기법이 ID/패스워드에 기반한 방법이므로 이의 유출로 인해 생길 수 있는 피해를 최소화하고, 고의적인 공인인증서의 오용을 막을 수 있도록 높은 수준의 사용자인증기법을 제공한다. 이에 본 논문에서는 공개키기반구조(PKI: Public Key Infrastructure)를 연동한 바이오보안 토큰의 이용에 있어서 사용자의 바이오인식 정보를 보호하면서 바이오인식 정보를 이용하여 보안 수준이 높은 사용자 인증이 가능한 기법을 제시한다.

Identification of copy number variations using high density whole-genome single nucleotide polymorphism markers in Chinese Dongxiang spotted pigs

  • Wang, Chengbin;Chen, Hao;Wang, Xiaopeng;Wu, Zhongping;Liu, Weiwei;Guo, Yuanmei;Ren, Jun;Ding, Nengshui
    • Asian-Australasian Journal of Animal Sciences
    • /
    • 제32권12호
    • /
    • pp.1809-1815
    • /
    • 2019
  • Objective: Copy number variations (CNVs) are a major source of genetic diversity complementary to single nucleotide polymorphism (SNP) in animals. The aim of the study was to perform a comprehensive genomic analysis of CNVs based on high density whole-genome SNP markers in Chinese Dongxiang spotted pigs. Methods: We used customized Affymetrix Axiom Pig1.4M array plates containing 1.4 million SNPs and the PennCNV algorithm to identify porcine CNVs on autosomes in Chinese Dongxiang spotted pigs. Then, the next generation sequence data was used to confirm the detected CNVs. Next, functional analysis was performed for gene contents in copy number variation regions (CNVRs). In addition, we compared the identified CNVRs with those reported ones and quantitative trait loci (QTL) in the pig QTL database. Results: We identified 871 putative CNVs belonging to 2,221 CNVRs on 17 autosomes. We further discarded CNVRs that were detected only in one individual, leaving us 166 CNVRs in total. The 166 CNVRs ranged from 2.89 kb to 617.53 kb with a mean value of 93.65 kb and a genome coverage of 15.55 Mb, corresponding to 0.58% of the pig genome. A total of 119 (71.69%) of the identified CNVRs were confirmed by next generation sequence data. Moreover, functional annotation showed that these CNVRs are involved in a variety of molecular functions. More than half (56.63%) of the CNVRs (n = 94) have been reported in previous studies, while 72 CNVRs are reported for the first time. In addition, 162 (97.59%) CNVRs were found to overlap with 2,765 previously reported QTLs affecting 378 phenotypic traits. Conclusion: The findings improve the catalog of pig CNVs and provide insights and novel molecular markers for further genetic analyses of Chinese indigenous pigs.

DNP3.0을 이용한 과전류 계전기 에이전트의 통신 방안 연구 (A Study on communication method between OverCurrent Relay Agents using DNP 3.0)

  • 이한웅;정광호;임성일;현승호;최면송;이승재
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2002년도 추계학술대회 논문집 전력기술부문
    • /
    • pp.265-267
    • /
    • 2002
  • In this paper, the communication between Over-Current Relay agents is realized using DNP(Distributed Network Protocol), which is the standard communication protocol of distribution automation system in KEPKO. The key words in OCR agent communication are defined and represented by use of DNP application function code. And the DNP index for OCR agent is defined. The proposed communication scheme is tested by use of Communication Test Harness, a test tool for DNP protocol to show its soundness.

  • PDF

N세대 교복 개발을 위한 기초연구 (A fundamental study to develop the school uniform for the Net generation)

  • 문지현;나현신
    • 패션비즈니스
    • /
    • 제14권5호
    • /
    • pp.145-157
    • /
    • 2010
  • The market in the 21st century has drastically changed due to the advances of digital technology. This could be represented by the key words prosumer, do-it-yourself, mass customization, and so on. The net generation is in the center of change and nowadays teenage groups wearing school uniforms is a part of this generation. Therefore the current school uniform hardly fits their tastes and demands. This study aims to provide the fundamental information for developing the school uniforms for the net generation based on the study of the characteristic of net generation and questionnaires targeted at high school students regarding the current school uniform.

자유곡면에서 사각형 쉘요소의 자동생성 (Automatic Generation of Quadrilateral Shell Elements on Sculptured Surfaces)

  • 박상준;채수원;고병천
    • 한국자동차공학회논문집
    • /
    • 제3권6호
    • /
    • pp.145-153
    • /
    • 1995
  • An algorithm for the automatic generation of quadrilateral shell elements on three-dimensional sculptured surfaces has been developed, which is one of the key issues in the finite element analysis of structures with complex shapes such as automobile structures. Mesh generation on sculptured surfaces is performed in three steps. First a sculptured surface is transformed to a projection plane, on which the loops are subdivided into subloops by using the best split lines, and with the use of 6-node/8-node loop operators and a layer operator, quadrilateral finite elements are constructed on this plane. Finally, the constructed mesh is transformed back to the original sculptured surfaces. The proposed mesh generation scheme is suited for the generation of non-uniform meshes so that it can be effectively used when the desired mesh density is available. Sample meshes are presented to demonstrate the versatility of the algorithm.

  • PDF

THE MULTILEVEL SECURITY PROBLEM OVER CLASS SEMIGROUPS OF IMAGINARY QUADRATIC NON-MAXIMAL ORDERS

  • KIM, YONGTAE
    • 호남수학학술지
    • /
    • 제28권2호
    • /
    • pp.185-196
    • /
    • 2006
  • A scheme based on the cryptography for enforcing multilevel security in a system where hierarchy is represented by a partially ordered set was first introduced by Akl et al. But the key generation algorithm of Akl et al. is infeasible when there is a large number of users. In 1985, MacKinnon et al. proposed a paper containing a condition which prevents cooperative attacks and optimizes the assignment in order to overcome this shortage. In 2005, Kim et al. proposed key management systems for multilevel security using one-way hash function, RSA algorithm, Poset dimension and Clifford semigroup in the context of modern cryptography. In particular, the key management system using Clifford semigroup of imaginary quadratic non-maximal orders is based on the fact that the computation of a key ideal $K_0$ from an ideal $EK_0$ seems to be difficult unless E is equivalent to O. We, in this paper, show that computing preimages under the bonding homomorphism is not difficult, and that the multilevel cryptosystem based on the Clifford semigroup is insecure and improper to the key management system.

  • PDF

Invited Speech at ICSS 2007 Generation of Session, Authentication, and Encryption Keys for CDMA2000 1x EV-DO Air Interface Standard

  • 이만영
    • 정보보호학회지
    • /
    • 제17권2호
    • /
    • pp.9-23
    • /
    • 2007
  • The air interface supports a security layer which provides the key exchange protocol, authentication protocol, and encryption protocol. The authentication is performed on the encryption protocol packet. The authentication protocol header or trailer may contain the digital signature that is used to authenticate a portion of the authentication protocol packet that is authenticated. The encryption protocol may add a trailer to hide the actual length of the plaintext of padding to be used by the encryption algorithm. The encryption protocol header may contain variables such as the initialization vector (IV) to be used by the encryption protocol. It is our aim to firstly compute the session key created from the D H key exchange algorithm, and thereof the authenticating key and the encryption key being generated from the session key.

생체 정보와 다중 분류 모델을 이용한 암호학적 키 생성 방법 (Cryptographic Key Generation Method Using Biometrics and Multiple Classification Model)

  • 이현석;김혜진;양대헌;이경희
    • 정보보호학회논문지
    • /
    • 제28권6호
    • /
    • pp.1427-1437
    • /
    • 2018
  • 최근 생체 인증 시스템이 확대됨에 따라, 생체 정보를 이용하여 공개키 기반구조(Bio-PKI)에 적용하는 연구들이 진행 중이다. Bio-PKI 시스템에서는 공개키를 생성하기 위해 생체 정보로부터 암호학적 키를 생성하는 과정이 필요하다. 암호학적 키 생성 방법 중 특성 정보를 숫자로 정량화하는 기법은 데이터 손실을 유발하고 이로 인해 키 추출 성능이 저하된다. 이 논문에서는 다중 분류 모델을 이용하여 생체 정보를 분류한 결과를 이용하여 키를 생성하는 방법을 제안한다. 제안하는 기법은 특성 정보의 손실이 없어 높은 키 추출 성능을 보였고, 여러 개의 분류 모델을 이용하기 때문에 충분한 길이의 키를 생성한다.