• Title/Summary/Keyword: related-key

Search Result 3,942, Processing Time 0.03 seconds

Security Analysis of AES for Related-Key Rectangle Attacks (AES의 연관키 렉탱글 공격에 대한 안전성 분석)

  • Kim, Jong-Sung;Hong, Seok-Hie;Lee, Chang-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.39-48
    • /
    • 2009
  • In this paper we improve previous related-key rectangle attacks on AES from 9 rounds to 10 rounds: Our attacks break the first 10 rounds of 12-round AES-192 with 256 related keys, a data complexity of $2^{124}$ and a time complexity of $2^{183}$, and also break the first 10 rounds of 12-round AES-192 with 64 related keys, a data complexity of $2^{122}$ and a time complexity of $2^{183.6}$, Our attacks are the best knoown attacks on AES-192.

A study on the analysis of production-related key performance indicator affecting business positioning of machinery manufacturers (중소기계제조업의 사업포지셔닝에 영향을 미치는 생산관련 핵심성과지표에 관한 연구)

  • Cheong, Hae-Sock;Yoo, Woo-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.2
    • /
    • pp.221-228
    • /
    • 2012
  • This paper analyzed twenty-six production-related KPI(Key Performance indicator) factors of business diagnosis, such as personnel, equipment, materials, operations and quality affecting company business competition to 186 small machinery manufacturers in 2010. Also, we explained the concept of Business Positioning and divided research subjects into four Business Positioning Groups formed break-even point ratio & fixed cost ratio to sales and then we compared between the 4 groups using Logistic Regression analysis by SAS statistical software package. The objective of this study is two-fold. The first is to find out production-related KPI factor of superior Business Positioning Group. The second is to suggest improvement ways for small manufacturers in order to get better profitable Business Positioning.

A Study on Selecting the Key Research Areas in Nano-technology Field in Korea: An Application of Technology Cluster Analysis in National R&D Program (한국의 나노기술 분야에서 핵심 연구영역 도출에 관한 연구 -국가 연구개발사업 수준에서 기술군집분석의 적용-)

  • 이용길;이세준;이재영
    • Journal of Korea Technology Innovation Society
    • /
    • v.6 no.2
    • /
    • pp.175-190
    • /
    • 2003
  • This paper deals with the methods for selecting the key research areas, which fit for the large, multi-disciplinary, and long-term programs by making use of Technology Cluster Analysis. This method is applied to mano-technology field at the level of national R&D program. 56 nano-technologies are analyzed and grouped into three main clusters based on the survey data from 180 experts. Three main clusters are \circled1 naro-materials related cluster, \circled2 naro-device related cluster, and \circled3 naro-bio related cluster. These three clusters are coincided with the focused areas of nano-technology in Korea. Each cluster is analyzed in view of its competence position.

  • PDF

Security Analysis of Block Cipher KT-64 (블록 암호 KT-64에 대한 안전성 분석)

  • Kang, Jin-Keon;Jeong, Ki-Tae;Lee, Chang-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.55-62
    • /
    • 2012
  • KT-64 is a 64-bit block cipher which use CSPNs suitable for the efficient FPGA implementation. In this paper, we propose a related-key amplified boomerang attack on the full-round KT-64. The attack on the full-round KT-64 requires $2^{45.5}$ related-key chosen plaintexts and $2^{65.17}$ KT-64 encryptions. This work is the first known cryptanalytic result on KT-64.

Induces Vasodilatation of Rat Mesenteric Artery in vitro Mainly by Inhibiting Receptor-Mediated $Ca^{2+}$ -Influx and $Ca^{2+}$ -Release

  • Cao Yong-Xiao;Zheng Jian-Pu;He Jian-Yu;Li Jie;Xu Cang-Bao;Edvinsson Lars
    • Archives of Pharmacal Research
    • /
    • v.28 no.6
    • /
    • pp.709-715
    • /
    • 2005
  • The purpose of this study was to investigate the effect of atropine on peripheral vasodilation and the mechanisms involved. The isometric tension of rat mesenteric artery rings was recorded in vitro on a myograph. The results showed that atropine, at concentrations greater than 1$\mu$M, relaxed the noradrenalin (NA)-precontracted rat mesenteric artery in a concentration-dependent manner. Atropine-induced vasodilatation was mediated, in part, by an endothelium-dependent mechanism, to which endothelium-derived hyperpolarizing factor may contribute. Atropine was able to shift the NA-induced concentration-response curve to the right, in a non-parallel manner, suggesting the mechanism of atropine was not mediated via the ${\alpha}_1$-adrenoreceptor. The $\beta$-adrenoreceptor and ATP sensitive potassium channel, a voltage dependent calcium channel, were not involved in the vasodilatation. However, atropine inhibited the contraction derived from NA and $CaCl_2$ in $Ca^{2+}$-free medium, in a concentration dependent manner, indicating the vasodilatation was related to the inhibition of extracellular $Ca^{2+}$ influx through the receptor-operated calcium channels and intracellular $Ca^{2+}$ release from the $Ca^{2+}$ store. Atropine had no effect on the caffeine-induced contraction in the artery segments, indicating the inhibition of intracellular $Ca^{2+}$ release as a result of atropine most likely occurs via the IP3 pathway rather than the ryanodine receptors. Our results suggest that atropine-induced vasodilatation is mainly from artery smooth muscle cells due to inhibition of the receptor-mediated $Ca^{2+}$-influx and $Ca^{2+}$-release, and partly from the endothelium mediated by EDHF.

Temporal expression profiling of long noncoding RNA and mRNA in the peripheral blood during porcine development

  • Gu, Yiren;Zhou, Rui;Jin, Long;Tao, Xuan;Zhong, Zhijun;Yang, Xuemei;Liang, Yan;Yang, Yuekui;Wang, Yan;Chen, Xiaohui;Gong, Jianjun;He, Zhiping;Li, Mingzhou;Lv, Xuebin
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.33 no.5
    • /
    • pp.836-847
    • /
    • 2020
  • Objective: We investigated the temporal expression profiles of long noncoding RNA (lncRNA) and mRNA in the peripheral blood of pigs during development and identified the lncRNAs that are related to the blood-based immune system. Methods: Peripheral blood samples were obtained from the pigs at 0, 7, 28, and 180 days and 2 years of age. RNA sequencing was performed to survey the lncRNA and mRNA transcriptomes in the samples. Short time-series expression miner (STEM) was used to show temporal expression patterns in the mRNAs and lncRNAs. Gene ontology and Kyoto encyclopedia of genes and genomes analyses were performed to assess the genes' biological relevance. To predict the functions of the identified lncRNAs, we extracted mRNAs that were nearby loci and highly correlated with the lncRNAs. Results: In total of 5,946 lncRNA and 12,354 mRNA transcripts were identified among the samples. STEM showed that most lncRNAs and mRNAs had similar temporal expression patterns during development, indicating the expressional correlation and functional relatedness between them. The five stages were divided into two classes: the suckling period and the late developmental stage. Most genes were expressed at low level during the suckling period, but at higher level during the late stages. Expression of several T-cell-related genes increased continuously during the suckling period, indicating that these genes are crucial for establishing the adaptive immune system in piglets at this stage. Notably, lncRNA TCONS-00086451 may promote blood-based immune system development by upregulating nuclear factor of activated T-cells cytoplasmic 2 expression. Conclusion: This study provides a catalog of porcine peripheral blood-related lncRNAs and mRNAs and reveals the characteristics and temporal expression profiles of these lncRNAs and mRNAs during peripheral blood development from the newborn to adult stages in pigs.

Key Distribution for Heterogeneous Public-Key Cryptosystems

  • Lv, Xixiang;Yi, Mu;Hui, Li
    • Journal of Communications and Networks
    • /
    • v.15 no.5
    • /
    • pp.464-468
    • /
    • 2013
  • The widespread use of cryptographic technologies is complicated by inconsistencies and duplication in the key management systems supporting their applications. The proliferation of key management systems or protocols also results in higher operational and infrastructure costs, and fails in interoperability. Thus, it is essential to realize key management interoperability between different and heterogeneous cryptosystems. This paper presents a practical and separable key management system for heterogeneous public-key cryptosystems. We achieve the interoperability between different cryptosystems via cryptography approaches rather than communication protocols. With our scheme, each client can freely use any kind of cryptosystemthat it likes. The proposed scheme has two advantages over the key management interoperability protocol introduced by the organization for the advancement of structured information standards. One is that all the related operations do not involve the communication protocol and thus no special restrictions are taken on the client devices. The other is that the proposed scheme does not suffer from single-point fault and bottleneck problems.

Analysis for Weak Keys of the Block Cipher SEED-192 (블록암호 SEED-192에 대한 취약키 분석)

  • Kim, Jong-Sung;Cho, Ki-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.1
    • /
    • pp.69-75
    • /
    • 2011
  • In this paper, we analyze the key schedule of the block cipher SEED-192. According to the result of this paper, there exist weak keys in 16 out of 20 rounds of SEED-192 against the related-key rectangle/boomerang attack. This is the first cryptanalytic result for the key schedule of SEED-192.

Securing Mobile Ad Hoc Networks Using Enhanced Identity-Based Cryptography

  • Mehr, Kamal Adli;Niya, Javad Musevi
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.512-522
    • /
    • 2015
  • Recent developments in identity-based cryptography (IBC) have provided new solutions to problems related to the security of mobile ad hoc networks (MANETs). Although many proposals to solve problems related to the security of MANETs are suggested by the research community, there is no one solution that fits all. The interdependency cycle between secure routing and security services makes the use of IBC in MANETs very challenging. In this paper, two novel methods are proposed to eliminate the need for this cycle. One of these methods utilizes a key pool to secure routes for the distribution of cryptographic materials, while the other adopts a pairing-based key agreement method. Furthermore, our proposed methods utilize threshold cryptography for shared secret and private key generation to eliminate the "single point of failure" and distribute cryptographic services among network nodes. These characteristics guarantee high levels of availability and scalability for the proposed methods. To illustrate the effectiveness and capabilities of the proposed methods, they are simulated and compared against the performance of existing methods.

Exploring Factors and Elements of Coordination between Key Account Management Units and Non-key Account Management Units: Case Study in an IT-related Machinery and System Vendor

  • Tonai, Shoko
    • Asia Marketing Journal
    • /
    • v.18 no.1
    • /
    • pp.1-22
    • /
    • 2016
  • Studies in key account management (KAM) have identified the importance of cross-functional coordination in firms to effectively implement KAM. However, these studies have ignored how companies integrate KAM and other customer management (non-KAM). This paper explores coordination design between KAM units and non-KAM units by analyzing a case study through three dimensions: front-end coordination, back-end-coordination, and organizational translation at the beginning of research. The case study shows that non-KAM conditions can require a modification of the coordination design. This research performs an in-depth analysis of changes in the implementation of sales reforms for an IT-related machinery and system vendor in Japan. Data sources include interviews with KAM units and non-KAM sales units and an analysis of secondary data. This paper suggests that studying the coordination between KAM units and non-KAM units will further our understanding of internal coordination in KAM research.