• Title/Summary/Keyword: key generation

Search Result 1,487, Processing Time 0.024 seconds

A New Key Management Mechanism and Performance Improvement for Conditional Access System (제한수신시스템을 위한 키 관리 메카니즘과 성능향상 방안)

  • 조현숙;이상호
    • The KIPS Transactions:PartC
    • /
    • v.8C no.1
    • /
    • pp.75-87
    • /
    • 2001
  • The Conditional Access System is the complete system for ensuring that broadcasting services are only accessible to those who are entitled to receive them. Four major parts to this system are scrambling, descrambling, authentication and encryption. For the proper operation, which means hard-to- break and uninterrupted service, secure key management and efficient delivery mechanism are very important design factors to this system. Performance analysis is another important factor to this system that is used in massive subscriber environment. In this thesis, one of the secure and efficient key management mechanisms is proposed. For the secrecy of this mechanism, hierarchical stacking of keys and key generation matrix are proposed. For the proof of efficient delivery of those keys, simulation results and performance analysis. which is based on queuing analysis, are presented. Lastly, optimal key generation and delivery period, maximal and minimal key deliver time, and communication capacity for data collection are presented for various subscriber volume.

  • PDF

A Novel Fast Open-loop Phase Locking Scheme Based on Synchronous Reference Frame for Three-phase Non-ideal Power Grids

  • Xiong, Liansong;Zhuo, Fang;Wang, Feng;Liu, Xiaokang;Zhu, Minghua;Yi, Hao
    • Journal of Power Electronics
    • /
    • v.16 no.4
    • /
    • pp.1513-1525
    • /
    • 2016
  • Rapid and accurate phase synchronization is critical for the reliable control of grid-tied inverters. However, the commonly used software phase-locked loop methods do not always satisfy the need for high-speed and accurate phase synchronization under severe grid imbalance conditions. To address this problem, this study develops a novel open-loop phase locking scheme based on a synchronous reference frame. The proposed scheme is characterized by remarkable response speed, high accuracy, and easy implementation. It comprises three functional cascaded blocks: fast orthogonal signal generation block, fast fundamental-frequency positive sequence component construction block, and fast phase calculation block. The developed virtual orthogonal signal generation method in the first block, which is characterized by noise immunity and high accuracy, can effectively avoid approximation errors and noise amplification in a wide range of sampling frequencies. In the second block, which is the foundation for achieving fast phase synchronization within 3 ms, the fundamental-frequency positive sequence components of unsymmetrical grid voltages can be achieved with the developed orthogonal signal construction strategy and the symmetrical component method. The real-time grid phase can be consequently obtained in the third block, which is free from self-tuning closed-loop control and thus improves the dynamic performance of the proposed scheme. The proposed scheme is adaptive to severe unsymmetrical grid voltages with sudden changes in magnitude, phase, and/or frequency. Moreover, this scheme is able to eliminate phase errors induced by harmonics and random noise. The validity and utility of the proposed scheme are verified by the experimental results.

Improvement of Security Cryptography Algorithm in Transport Layer (전달 계층의 보안 암호화 알고리즘 개선)

  • Choi Seung-Kwon;Kim Song-Young;Shin Dong-Hwa;Lee Byong-Rok;Cho Yong-Hwan
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.107-111
    • /
    • 2005
  • As Internet grows rapidly and next electronic commerce applications increase, the security is getting more important. Information security to provide secure and reliable information transfer is based on cryptography technique. The proposed ISEED(Improved SEED) algorithm based on block cryptography algorithm which belongs to secret-key algorithm. In terms of efficiency, the round key generation algorithm has been proposed to reduces the time required in encryption and decryption. The algorithm has been implemented as follow. 128-bit key is divided into two 64-bit group to rotate each of them 8-bit on the left side and right side, and then basic arithmetic operation and G function have been applied to 4-word outputs. In the process of converting encryption key which is required in decryption and encryption of key generation algorithm into sub key type, the conversion algorithm is analyzed. As a result, the time consumed to encryption and decryption is reduced by minimizing the number of plain text required differential analysis.

  • PDF

Selection on the Order of Priority Factor of Construction Key Technology for Improving the Flexibility for a Long Life Apartment Housing at the Next Generation (차세대 장수명 공동주택의 가변성능향상을 위한 건축요소기술 우선순위결정에 관한 연구)

  • Lee, Jeong-Seok;Cho, Gun-Hee;Sohn, Jeong-Rak;Kim, Jae-Jun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.10 no.2
    • /
    • pp.84-92
    • /
    • 2009
  • Recently, lots of the research aspects of space, materials, structure, construction method relation to improving the flexibility going on throughout the construction industry, moreover the development of construction key technology has been accelerating by reason of deterioration in the apartment housing. Therefore, this study should firstly suggests assessment list of construction key technology through investigation of questionnaire and consultation of the expert on the basis of case studies, and should select it about the flexibility which making social issues lastly in the apartment housing. Secondly, this study should classify, reestablish core technology through inspection procedure of feasibility study among lists of deduced key technology. Finally, this study will suggest the manual & guideline for improving the flexibility for a long-life apartment housing at the next generation by selecting, analyzing and estimating higher score items of all key technology.

MicroRNA 449c Mediates the Generation of Monocytic Myeloid-Derived Suppressor Cells by Targeting STAT6

  • Han, Xiaoqing;Luan, Tao;Sun, Yingying;Yan, Wenyi;Wang, Dake;Zeng, Xianlu
    • Molecules and Cells
    • /
    • v.43 no.9
    • /
    • pp.793-803
    • /
    • 2020
  • Myeloid-derived suppressor cells (MDSCs) promote tumour progression by contributing to angiogenesis, immunosuppression, and immunotherapy resistance. Although recent studies have shown that microRNAs (miRNAs) can promote the expansion of MDSCs in the tumour environment, the mechanisms involved in this process are largely unknown. Here, we report that microRNA 449c (miR-449c) expression was upregulated in myeloid progenitor cells upon activation of C-X-C motif chemokine receptor 2 (CXCR2) under tumour conditions. MiR-449c upregulation increased the generation of monocytic MDSCs (mo-MDSCs). The increased expression of miR-449c could target STAT6 mRNA in myeloid progenitor cells to shift the differentiation balance of myeloid progenitor cells and lead to an enhancement of the mo-MDSCs population in the tumour environment. Thus, our results demonstrate that the miR-449c/STAT6 axis is involved in the expansion of mo-MDSCs from myeloid progenitor cells upon activation of CXCR2, and thus, inhibition of miR-449c/STAT6 signalling may help to attenuate tumour progression.

A Study on Crime Prevention Risk Probability Map Generation Methodology by using the Object Interpretation Key (객체 판독키를 적용한 방범 위험도 확률지도 생성기법 연구)

  • Kim, Dong-Hyun;Park, Koo-Rack
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.11
    • /
    • pp.135-144
    • /
    • 2009
  • In this paper, a methodology for the risk probability map generation of the crime prevention to be subject to the urban area in the group residential area is presented. The interpretation key is set up to the distinctive feature distinguishing with the unaided eye based on the object composing with the urban area information such as the topology, the facility, and the characteristic information of the corresponding area by analyzing the crime prevention case occurred by gone. This interpretation key is generated, and this information is applied to another area equally, and so, the risk probability map for the crime prevention and the disaster prevention is generated. At this time, the object interpretation key for the urban area information is divided into the various size cell by the crime prevention case. and the risk index according with this cell is set up. Also, the generated various risk probability map is unified, and the integration risk probability map is generated.

Techniques of Automatic Finite Element Mesh Generation on Surface Primitives (원시곡면 위의 유한요소망 자동생성 기법)

  • 이재영
    • Korean Journal of Computational Design and Engineering
    • /
    • v.1 no.3
    • /
    • pp.189-202
    • /
    • 1996
  • Complex geometric shapes can be defined simply and efficiently by combining and operating various surface primitives. These primitives and their intersection curves are used in finite element mesh generation to form an easy and intuitive procedure for finite element modelling of curved surfaces. This paper proposes techniques of automatic mesh generation on surface primitives with arbitrarily shaped boundaries and control curves, which may be created by surface to surface intersection. A method of automatic mesh generation on plane, which was previously developed by the author, has been modified for application to the surface mesh generation. Owing to the mesh generation-wise differences between planes and surfaces, the surfaces should be transformed into conceptual plane so that the modified plane mesh generation method can be applied. Surface development, mapping and mesh reconstruction are the key techniques suggested in this paper. The selection of the technique to apply can be determined automatically on the basis of the developability, existence of singularity and other characteristics of the surfaces on which the mesh is to be generated. The suggested techniques were implemented into parts of mesh generation functions of the finite element software, MacTran. Their validity and practicality were manifested by the actual use of this software.

  • PDF

A Study on Releasing Cryptographic Key by Using Face and Iris Information on mobile phones (휴대폰 환경에서 얼굴 및 홍채 정보를 이용한 암호화키 생성에 관한 연구)

  • Han, Song-Yi;Park, Kang-Ryoung;Park, So-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.6
    • /
    • pp.1-9
    • /
    • 2007
  • Recently, as a number of media are fused into a phone, the requirement of security of service provided on a mobile phone is increasing. For this, conventional cryptographic key based on password and security card is used in the mobile phone, but it has the characteristics which is easy to be vulnerable and to be illegally stolen. To overcome such a problem, the researches to generate key based on biometrics have been done. However, it has also the problem that biometric information is susceptible to the variation of environment, whereas conventional cryptographic system should generate invariant cryptographic key at any time. So, we propose new method of producing cryptographic key based on "Biometric matching-based key release" instead of "Biometric-based key generation" by using both face and iris information in order to overcome the unstability of uni-modal biometries. Also, by using mega-pixel camera embedded on mobile phone, we can provide users with convenience that both face and iris recognition is possible at the same time. Experimental results showed that we could obtain the EER(Equal Error Rate) performance of 0.5% when producing cryptographic key. And FAR was shown as about 0.002% in case of FRR of 25%. In addition, our system can provide the functionality of controlling FAR and FRR based on threshold.

Circulant UOV: a new UOV variant with shorter private key and faster signature generation

  • Peng, Zhiniang;Tang, Shaohua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1376-1395
    • /
    • 2018
  • UOV is one of the most important signature schemes in Multivariate Public Key Cryptography (MPKC). It has a strong security guarantee and is considered to be quantum-resistant. However, it suffers from large key size and its signing procedure is relatively slow. In this paper, we propose a new secure UOV variant (Circulant UOV) with shorter private key and higher signing efficiency. We estimate that the private key size of Circulant UOV is smaller by about 45% than that of the regular UOV and its signing speed is more than 14 times faster than that of the regular UOV. We also give a practical implementation on modern x64 CPU, which shows that Circulant UOV is comparable to many other signature schemes.

Image Encryption with The Cross Diffusion of Two Chaotic Maps

  • Jiao, Ge;Peng, Xiaojiang;Duan, Kaiwen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1064-1079
    • /
    • 2019
  • Information security has become increasingly important with the rapid development of mobile devices and internet. An efficient encryption system is a key to this end. In this paper, we propose an image encryption method based on the cross diffusion of two chaotic maps. We use two chaotic sequences, namely the Logistic map and the Chebyshev map, for key generation which has larger security key space than single one. Moreover, we use these two sequences for further image encryption diffusion which decreases the correlation of neighboring pixels significantly. We conduct extensive experiments on several well-known images like Lena, Baboon, Koala, etc. Experimental results show that our algorithm has the characteristics of large key space, fast, robust to statistic attack, etc.