• Title/Summary/Keyword: random number generator(rng)

Search Result 20, Processing Time 0.02 seconds

Analytic simulator and image generator of multiple-scattering Compton camera for prompt gamma ray imaging

  • Kim, Soo Mee
    • Biomedical Engineering Letters
    • /
    • v.8 no.4
    • /
    • pp.383-392
    • /
    • 2018
  • For prompt gamma ray imaging for biomedical applications and environmental radiation monitoring, we propose herein a multiple-scattering Compton camera (MSCC). MSCC consists of three or more semiconductor layers with good energy resolution, and has potential for simultaneous detection and differentiation of multiple radio-isotopes based on the measured energies, as well as three-dimensional (3D) imaging of the radio-isotope distribution. In this study, we developed an analytic simulator and a 3D image generator for a MSCC, including the physical models of the radiation source emission and detection processes that can be utilized for geometry and performance prediction prior to the construction of a real system. The analytic simulator for a MSCC records coincidence detections of successive interactions in multiple detector layers. In the successive interaction processes, the emission direction of the incident gamma ray, the scattering angle, and the changed traveling path after the Compton scattering interaction in each detector, were determined by a conical surface uniform random number generator (RNG), and by a Klein-Nishina RNG. The 3D image generator has two functions: the recovery of the initial source energy spectrum and the 3D spatial distribution of the source. We evaluated the analytic simulator and image generator with two different energetic point radiation sources (Cs-137 and Co-60) and with an MSCC comprising three detector layers. The recovered initial energies of the incident radiations were well differentiated from the generated MSCC events. Correspondingly, we could obtain a multi-tracer image that combined the two differentiated images. The developed analytic simulator in this study emulated the randomness of the detection process of a multiple-scattering Compton camera, including the inherent degradation factors of the detectors, such as the limited spatial and energy resolutions. The Doppler-broadening effect owing to the momentum distribution of electrons in Compton scattering was not considered in the detection process because most interested isotopes for biomedical and environmental applications have high energies that are less sensitive to Doppler broadening. The analytic simulator and image generator for MSCC can be utilized to determine the optimal geometrical parameters, such as the distances between detectors and detector size, thus affecting the imaging performance of the Compton camera prior to the development of a real system.

Security Amplification of Partially Trusted Quantum Key Distribution System (부분 신뢰성을 갖는 양자 키 분배 시스템의 보안성 증폭)

  • Lee, Sun Yui;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.4
    • /
    • pp.152-156
    • /
    • 2017
  • This paper introduces the concept of random security amplification to amplify security in a quantum key distribution system. It seems to provide security amplification using the relationship between quantum error correction and security. In addition;we show that random security amplification in terms of security amplification offers better security than using existing universal hash function. We explain how the universal hash function enhances security using the BB84 protocol, which is a typical example of QKD. Finally, the proposed random security amplification and the conventional scheme compare the security according to the key generation rate in the quantum QKD.

Performance of privacy Amplification in Quantum Key Distribution Systems (양자 키 분배 시스템에서 보안성 증폭의 성능 분석)

  • Lee, Sun-Yui;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.111-116
    • /
    • 2018
  • This paper introduces the concept of a random universal hash function to amplify security in a quantum key distribution system. It seems to provide security amplification using the relationship between quantum error correction and security. In addition, the approach in terms of security amplification shows that phase error correction offers better security. We explain how the universal hash function enhances security using the BB84 protocol, which is a typical example of QKD(Quantum Key Distribution). Finally, we show that the BB84 protocol using random privacy amplification is safe at higher key rates than Mayers' performance at the same error rate.

Proposing a PRNG based on a block cipher and cryptanalyzing its security (블록 암호 알고리즘기반 의사난수발생기 제안과 안전성 분석)

  • Song, Jun-Hwan;Hyun, Jin-Su;Koo, Bon-Wook;Chang, Ku-Young
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.809-816
    • /
    • 2002
  • Cryptographic applications, such as data confidentiality and authentication, must be used for secure data communications. PRNG(Pseudo-Random Number Generator) is a basic cryptographic component which is supposed to be satisfied by criteria that we provable security and randomness properties. PRNG it used for generating an initial value or key value of cipher and security of whole cryptographic module depends on the security of PRNG. In this paper, we introduce an PRNG based on a block cipher and prove their security.

A Study on the Design of Key Scheduler Block Cryptosystem using PRN (PRN을 이용한 키 스케줄러 블록암호시스템 설계에 관한 연구)

  • 김종협;김환용
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.2
    • /
    • pp.112-121
    • /
    • 2003
  • Information Protection and cryptography technology is developed with if but solved problem of real time processing and secret maintain. Therefore this paper is Proposed new PRN-SEED(Pseudo-Random Number-SEED) for the increasing secret rate and processing rate perform performance analysis with existed other cryptography algorithms. Proposed new PRN-SEED crypto-algorithm increase in the processing rate than existed algorithms use bit and byte mixed operation with RNG(Random Number Generator). PRN-SEED that performs simultaneous operations have higher 1.03 in the processing rate and 2 in the cryptosystem performance than existed cryptosystems. Implementation for PRN-SEED use Synopsys Design Analyser Ver. 1999.10, samsung KG75 library and Synopsys VHDL Debegger. As a simulation result, symmetric cryptosystem DES operate 416Mbps at the 40MHz and Rijndael operate 612Mbps at the 50MHz. PRN-SEED cryptosystem have gate counting 10K and operate 430Mbps at the 40MHz and 630Mbps at the 50MHz.

  • PDF

Privacy Amplification of Quantum Key Distribution Systems Using Dual Universal Hush Function (듀얼 유니버셜 해쉬 함수를 이용한 양자 키 분배 시스템의 보안성 증폭)

  • Lee, Sun Yui;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.1
    • /
    • pp.38-42
    • /
    • 2017
  • This paper introduces the concept of a dual hash function to amplify security in a quantum key distribution system. We show the use of the relationship between quantum error correction and security to provide security amplification. Also, in terms of security amplification, the approach shows that phase error correction offers better security. We describe the process of enhancing security using the universal hash function using the BB84 protocol, which is a typical example of QKD. Finally, the deterministic universal hash function induces the security to be evaluated in the quantum Pauli channel without depending on the length of the message.

User Review Analysis of Microtransactions in Freemium Massively Multiplayer Online Role-Playing Games Using Structural Topic Modeling (구조적 토픽모델링을 활용한 무료형 대규모 다중이용자 온라인 롤플레잉 게임의 소액결제에 대한 이용자 리뷰 분석)

  • Cheol Lee;Jae-Eun Chung
    • Human Ecology Research
    • /
    • v.61 no.3
    • /
    • pp.475-492
    • /
    • 2023
  • This study investigated player responses to microtransactions in freemium Massively multiplayer online roleplaying games (MMORPG), specifically focusing on the game LostArk using English language review data. To this end, structural topic modeling was employed and the following six microtransaction-relevant topics were identified: microtransactions, developer issues, real money trade (RMT), random number generator (RNG) upgrade system, game content, and collectibles & adventure. The first four topics were classified as being "not recommended". However, the proportions of microtransaction-related topics were relatively lower than the other topics. Additionally, this study did not extract keywords related to unfairness and unethical issues in previous microtransaction research. The last two topics, game content, and collectibles & adventure were "recommended" topics, indicating positive functions of microtransactions such as enhancing the game experience by purchasing virtual items. Moreover, it was found that players who do not engage in microtransactions can still be satisfied through continuous game content updates. Additionally, an examination of the interaction effect between time and recommendation status revealed that while the frequency with which the six microtransaction-related topics were mentioned increased over time in the reviews, the ratio of recommendations to non-recommendations varied differently. This study contributes to game-related research by revealing players' authentic opinions on microtransactions in freemium MMORPGs, thereby providing practical implications for game companies.

Privacy Amplification of Correlated Key Decryption over Public Channels (공개 채널을 통한 상관 키 분산 암호화의 프라이버시 증폭)

  • Lee, Sun-Yui;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.73-78
    • /
    • 2018
  • In this paper, we consider a system where multiple sources are encrypted in separated nodes and sent through their respective public communication channels into a joint sink node. We are interested at the problem on protecting the security of an already existing system such above, which is found out to have correlated encryption keys. In particular, we focus on finding a solution without introducing additional secret keys and with minimal modification to minimize the cost and the risk of bringing down an already running system. We propose a solution under a security model where an eavesdropper obtains all ciphertexts, i.e., encrypted sources, by accessing available public communication channels. Our main technique is to use encoders of universal function to encode the ciphertexts before sending them to public communication channels.

Improving the Calculation Speed of Ray-tracing Based Simulator for Analyzing an Integrating Sphere with OpenMP Directive and Guaranteeing the Randomness of Monte Carlo Method (광선추적법 기반의 적분구 분석 시뮬레이터에서 OpenMP 지시어를 이용한 속도 향상 및 몬테카를로 방법의 무작위성 보장)

  • Kim, Seung-Yong;Kim, Dae-Chan;O, Beom-Hoan;Park, Se-Geun;Lee, El-Hang;Lee, Seung-Gol
    • Korean Journal of Optics and Photonics
    • /
    • v.22 no.2
    • /
    • pp.83-89
    • /
    • 2011
  • In order to improve the calculation speed of an integrating-sphere simulator based on a ray-tracing method, parallel processing with OpenMP directive was implemented into the simulator and the randomness of Monte Carlo method was guaranteed by utilizing a parallel random number generator. It was confirmed that simulation results obtained with more than $10^7$ rays showed good agreement with theoretical results within the error range of 0.5%, and that the calculation speed improved as the number of threads increased. Finally, the spatial response distribution functions of a real integrating sphere were simulated and compared with previous results.

High-Speed Implementation and Efficient Memory Usage of Min-Entropy Estimation Algorithms in NIST SP 800-90B (NIST SP 800-90B의 최소 엔트로피 추정 알고리즘에 대한 고속 구현 및 효율적인 메모리 사용 기법)

  • Kim, Wontae;Yeom, Yongjin;Kang, Ju-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.25-39
    • /
    • 2018
  • NIST(National Institute of Standards and Technology) has recently published SP 800-90B second draft which is the document for evaluating security of entropy source, a key element of a cryptographic random number generator(RNG), and provided a tool implemented on Python code. In SP 800-90B, the security evaluation of the entropy sources is a process of estimating min-entropy by several estimators. The process of estimating min-entropy is divided into IID track and non-IID track. In IID track, the entropy sources are estimated only from MCV estimator. In non-IID Track, the entropy sources are estimated from 10 estimators including MCV estimator. The running time of the NIST's tool in non-IID track is approximately 20 minutes and the memory usage is over 5.5 GB. For evaluation agencies that have to perform repeatedly evaluations on various samples, and developers or researchers who have to perform experiments in various environments, it may be inconvenient to estimate entropy using the tool and depending on the environment, it may be impossible to execute. In this paper, we propose high-speed implementations and an efficient memory usage technique for min-entropy estimation algorithm of SP 800-90B. Our major achievements are the three improved speed and efficient memory usage reduction methods which are the method applying advantages of C++ code for improving speed of MultiMCW estimator, the method effectively reducing the memory and improving speed of MultiMMC by rebuilding the data storage structure, and the method improving the speed of LZ78Y by rebuilding the data structure. The tool applied our proposed methods is 14 times faster and saves 13 times more memory usage than NIST's tool.