• Title/Summary/Keyword: key protection

Search Result 956, Processing Time 0.03 seconds

The Analysis of New Video Conference System Based Secure Authentication

  • Jung Yong Deug;Kim Gil Choon;Jun Moon Seog
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.600-607
    • /
    • 2004
  • The paper describes the implementation of the video conferencing system using public key infrastructure which is used for user authentication and media stream encryption. Using public key infrastructure, we are able to reinforce the authentication for conference participant and block several malicious hacking while protecting conference control information. The paper shows the implementation of the transportation layer secure protocol in conformity with Korea public key authentication algorithm standard and symmetric key encryption algorithm (RC2, SEED, DES and 3DES) for media stream encryption. The feature of the paper is transportation layer secure protocol that is implemented for protection of information on a user authentication and video conference and the media streaming encryption algorithm also can be envisioned with another block encryption algorithm. The key for media streaming encryption may be safely distributed by the transportation layer secure protocol.

  • PDF

A Survey on Face-based Cryptographic Key Generation

  • Dang, Thao;Choi, Deokjai
    • Smart Media Journal
    • /
    • v.9 no.2
    • /
    • pp.39-50
    • /
    • 2020
  • Derivation cryptographic keys from human biometrics opens a new promising research area when it can be used efficiently for not only verification or recognition tasks, but also symmetric-key based applications. Among existing biometric traits, face is considered as the most popular biometrics since facial features are informative and discriminative. In this paper, we present a comprehensive survey of Face-based key generation (FKGS). First, we summarize the trend of FKGS researches and sum up the methods which play important roles in the proposed key generation systems. Then we present the evaluation and the general performance analysis; from that, we give a discussion about the advantages and disadvantages of surveyed studies to clarify the fundamental requirements and the main challenges when implementing FKGS in practice. Finally, an outlook on future prospects is given.

Synthesis of Polyamides Containing N-Methylpyrrole and N-Methylimidazole and Their Anticancer Activity

  • Yuan, Gu;Xiao, Junhua;Huang, Weiqiang;Tang, Feili;Zhou, Yawei
    • Archives of Pharmacal Research
    • /
    • v.25 no.5
    • /
    • pp.585-589
    • /
    • 2002
  • Three hairpin polyamides were designed and synthesized by a haloform reaction and DCC/HOBt coupling reaction without amino protection and deprotection. Their anticancer activity were investigated with three kinds of cell lines-hepatic carcinoma, lung carcinoma and gastric carcinoma, and the values of $IC_{50}$ were at range of $10^{-7}~10^{-8}M$.

Image Encryption with The Cross Diffusion of Two Chaotic Maps

  • Jiao, Ge;Peng, Xiaojiang;Duan, Kaiwen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1064-1079
    • /
    • 2019
  • Information security has become increasingly important with the rapid development of mobile devices and internet. An efficient encryption system is a key to this end. In this paper, we propose an image encryption method based on the cross diffusion of two chaotic maps. We use two chaotic sequences, namely the Logistic map and the Chebyshev map, for key generation which has larger security key space than single one. Moreover, we use these two sequences for further image encryption diffusion which decreases the correlation of neighboring pixels significantly. We conduct extensive experiments on several well-known images like Lena, Baboon, Koala, etc. Experimental results show that our algorithm has the characteristics of large key space, fast, robust to statistic attack, etc.

Water-blocking Asphyxia of N95 Medical Respirator During Hot Environment Work Tasks With Whole-body Enclosed Anti-bioaerosol Suit

  • Jintuo Zhu;Qijun Jiang;Yuxuan Ye;Xinjian He;Jiang Shao;Xinyu Li;Xijie Zhao; Huan Xu;Qi Hu
    • Safety and Health at Work
    • /
    • v.14 no.4
    • /
    • pp.457-466
    • /
    • 2023
  • Background: During hot environment work tasks with whole-body enclosed anti-bioaerosol suit, the combined effect of heavy sweating and exhaled hot humid air may cause the N95 medical respirator to saturate with water/sweat (i.e., water-blocking). Methods: 32 young male subjects with different body mass indexes (BMI) in whole-body protection (N95 medical respirator + one-piece protective suit + head covering + protective face screen + gloves + shoe covers) were asked to simulate waste collecting from each isolated room in a seven-story building at 27-28℃, and the weight, inhalation resistance (Rf), and aerosol penetration of the respirator before worn and after water-blocking were analyzed. Results: All subjects reported water-blocking asphyxia of the N95 respirators within 36-67 min of the task. When water-blocking occurred, the Rf and 10-200 nm total aerosol penetration (Pt) of the respirators reached up to 1270-1810 Pa and 17.3-23.3%, respectively, which were 10 and 8 times of that before wearing. The most penetration particle size of the respirators increased from 49-65 nm before worn to 115-154 nm under water-blocking condition, and the corresponding maximum size-dependent aerosol penetration increased from 2.5-3.5% to 20-27%. With the increase of BMI, the water-blocking occurrence time firstly increased then reduced, while the Rf, Pt, and absorbed water all increased significantly. Conclusions: This study reveals respirator water-blocking and its serious negative impacts on respiratory protection. When performing moderate-to-high-load tasks with whole-body protection in a hot environment, it is recommended that respirator be replaced with a new one at least every hour to avoid water-blocking asphyxia.

A tamper resistance software mechanism using MAC function and dynamic link key (MAC함수와 동적 링크키를 이용한 소프트웨어 변조 방지 기법)

  • Park, Jae-Hong;Kim, Sung-Hoon;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.11-18
    • /
    • 2013
  • In order to prevent tampering and reverse engineering of executive code, this paper propose a new tamper resistant software mechanism. This paper presents a cryptographic MAC function and a relationship which has its security level derived by the importance of code block instead of by merely getting the encryption and decryption key from the previous block. In this paper, we propose a cryptographic MAC function which generates a dynamic MAC function key instead of the hash function as written in many other papers. In addition, we also propose a relationships having high, medium and low security levels. If any block is determined to have a high security level then that block will be encrypted by the key generated by the related medium security level block. The low security block will be untouched due to efficiency considerations. The MAC function having this dynamic key and block relationship will make analyzing executive code more difficult.

Genetic diversity analysis in Chinese miniature pigs using swine leukocyte antigen complex microsatellites

  • Wu, Jinhua;Liu, Ronghui;Li, Hua;Yu, Hui;Yang, Yalan
    • Animal Bioscience
    • /
    • v.34 no.11
    • /
    • pp.1757-1765
    • /
    • 2021
  • Objective: The swine leukocyte antigen (SLA) gene group, which is closely linked and highly polymorphic, has important biomedical significance in the protection and utilization of germplasm resources. However, genetic polymorphism analyses of SLA microsatellite markers in Chinese miniature pigs are limited. Methods: Eighteen pairs of microsatellite primers were used to amplify the SLA regions of seven miniature pig breeds and three wild boar breeds (n = 346) from different regions of China. The indexes of genetic polymorphism, including expected heterozygosity (He), polymorphic information content (PIC), and haplotype, were analyzed. The genetic differentiation coefficient (Fst) and neighbor-joining methods were used for cluster analysis of the breeds. Results: In miniature pigs, the SLA I region had the highest numbers of polymorphisms, followed by the SLA II and SLA III regions; the region near the centromere had the lowest number of polymorphisms. Among the seven miniature pig breeds, Diannan small-ear pigs had the highest genetic diversity (PIC value = 0.6396), whereas the genetic diversity of the Hebao pig was the lowest (PIC value = 0.4330). The Fst values in the Mingguang small-ear, Diannan small-ear, and Yunnan wild boars were less than 0.05. According to phylogenetic cluster analysis, the South-China-type miniature pigs clustered into one group, among which Mingguang small-ear pigs clustered with Diannan small-ear pigs. Haplotype analysis revealed that the SLA I, II, and III regions could be constructed into 13, 7, and 11 common haplotypes, respectively. Conclusion: This study validates the high genetic diversity of the Chinese miniature pig. Mingguang small-ear pigs have close kinship with Diannan small-ear pigs, implying that they may have similar genetic backgrounds and originate from the same population. This study also provides a foundation for genetic breeding, genetic resource protection, and classification of Chinese miniature pigs.

Enhancing Security of Transaction Session in Financial Open API Environment Using Hybrid Session Protection Protocol Combined with NTRU (NTRU를 결합한 하이브리드 세션 보호 프로토콜을 이용한 금융 오픈 API 환경의 거래 세션 안전성 강화)

  • Sujin Kwon;Deoksang Kim;Yeongjae Park;Jieun Ryu;Ju-Sung Kang;Yongjin Yeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.75-86
    • /
    • 2023
  • Public key cryptography algorithm such as RSA and ECC, which are commonly used in current financial transaction services, can no longer guarantee security when quantum computers are realized. Therefore it is necessary to convert existing legacy algorithms to Post-Quantum Cryptography, but it is expected that will take a considerable amount of time to replace them. Hence, it is necessary to study a hybrid method combining the two algorithms in order to prepare the forthcoming transition period. In this paper we propose a hybrid session key exchange protocol that generates a session key by combining the legacy algorithm ECDH and the Post-Quantum Cryptographic algorithm NTRU. We tried the methods that proposed by the IETF for TLS 1.3 based hybrid key exchange, and as a result, it is expected that the security can be enhanced by applying the protocol proposed in this paper to the existing financial transaction session protection solution.

Determination of Low-temperature Electrochemical Properties of Selected Cation-exchange Membranes for Cathodic Protection Analysis

  • Ko, Moon-Young;Kwon, Byeong-Min;Hong, Byung-Pyo;Byun, Hong-Sik
    • Korean Membrane Journal
    • /
    • v.10 no.1
    • /
    • pp.8-12
    • /
    • 2008
  • The electrochemical properties of Nafion type membranes as a function of temperature to examine the key factors affecting the cathodic protection process at low temperatures was investigated in this study. Variable temperature experiments for AC impedance, DC resistance were conducted. The resistances of 3 Nafion membranes (N 324, N 450, N MAC) were measured in 30% KOH (aq) for a range of temperatures between $-30^{\circ}C$ and room temperature. Membrane resistance increases exponentially with decreasing temperature. This behaviour is most significant at operational temperatures below $0^{\circ}C$. These membranes are stable under the low temperature and caustic conditions of the heat exchange system, but they place a much higher restriction on the cathodic protection of the stainless heat exchange stack. N 450 has the lowest AC impedence and DC resistance at temperatures below $0^{\circ}C$ and consequently is most suitable membrane of the three, for low temperature applications.

FIRE WATER SYSTEM RELIABILITY IN INDUSTRIAL APPLICATIONS

  • James M. Dewey;Kim, Yong-Dal
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 1997.11a
    • /
    • pp.526-533
    • /
    • 1997
  • Reliability of fire protection systems is often discussed, written about, and even put into codes and standards. However, reliability is seldom considered for the fire protection system as a whole. Why does this happen and why should the designer consider the system as a whole\ulcorner Existing codes and standards incorporate the concept of reliability usually In the form of key component redundancy for some parts of a system. The "Fire Safety Concepts Tree" presented in the National Fire Protection Association Guide 550, Guide to the Fire Safety Concepts Tree, provides a starting point for considering the performance of a water based fire suppression system. Considering fire protection objectives for water based fire suppression systems, means of evaluating system reliability can be developed. This development requires identification of system components that are significant to the overall system reliability.

  • PDF