• Title/Summary/Keyword: symmetric key

Search Result 346, Processing Time 0.028 seconds

SOME ASPECTS IN PRACTICAL ESTIMATION OF GROUNDWATER CONTAMINANT CONCENTRATIONS

  • Cho, Choon-Kyung;Ha, Bang-Soo;Kang, Sung-Kwon
    • Journal of applied mathematics & informatics
    • /
    • v.8 no.2
    • /
    • pp.417-428
    • /
    • 2001
  • Spatial distribution of groundwater contaminant concentration has special characteristics such as approximate symmetric profile, for example, in the transversal direction to groundwater flow direction, a certain ratio in directional propagation distances, etc. To obtain a geophysically appropriate semivariogram which is a key factor in estimation of groundwater contaminant concentration at desired locations, these special characteristics should be considered. Specifically, the concepts of symmetry and ratio are considered in this paper. By applying these two concepts, significant improvement of semivariograms, estimation variances, and final estimation results compared with the ones by conventional approaches which usually do not account for symmetry and ratio are shown using field experimental data.

A Study on the Keyword Search on Encrypted Data using Symmetric Key Encryption (대칭키 방식을 이용한 암호화된 데이터의 키워드 검색에 관한 연구)

  • Lee Byung-Hee;Lee Yun-Ho;Cho Seok-Hyang;Kim Seung-Joo;Won Dong-Ho
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.677-680
    • /
    • 2006
  • 신뢰할 수 없는 저장매체에 데이터를 안전하게 보관하기 위해서 대부분의 시스템은 데이터를 암호화하는 방식을 사용한다. 암호화된 데이터를 통해서는 원래의 평문에 어떠한 내용이 포함되어 있는지 알 수가 없으며, 해당 데이터의 내용을 열람하기 위해서는 암호화된 데이터 전체를 복호화해야만 한다. 본 논문에서는 암호화된 데이터에 대해 키워드 검색이 가능한 프로토콜을 제안하여, 데이터 전체를 복호화하지 않고 특정 키워드의 포함 여부를 판단할 수 있도록 하였다.

  • PDF

A Hardware Implementation of lightweight block cipher TWINE (경량 블록암호 TWINE의 하드웨어 구현)

  • Choe, Jun-Yeong;Eom, Hong-Jun;Jang, Hyun-Soo;Shin, Kyung-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.339-340
    • /
    • 2018
  • 본 논문에서는 경량 블록암호 알고리듬 TWINE의 하드웨어 설계에 대해 기술한다. TWINE은 80-비트 또는 128-비트의 마스터키를 사용하여 64-비트의 평문(암호문)을 암호(복호)하여 64-비트의 암호문(평문)을 만드는 대칭키 블록암호이며, s-box와 XOR만 사용하므로 경량 하드웨어 구현에 적합하다는 특징을 갖는다. 암호화 연산과 복호화 연산의 하드웨어 공유를 통해 게이트 수가 최소화 되도록 구현하였으며, 설계된 TWINE 크립토 코어는 RTL 시뮬레이션을 통해 기능을 검증하였다.

  • PDF

Improved Algebraic Method for Computing Eigenpair Sensitivities of Damped System (감쇠 시스템의 고유진동수와 모드의 미분을 구하기 위한 대수적 방법의 개선)

  • Jo, Hong-Ki;Ko, Man-Gi;Lee, In-Won
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2000.06a
    • /
    • pp.501-507
    • /
    • 2000
  • This paper presents a very simple procedure for determining the sensitivities of the eigenpairs of damped vibratory system with distinct eigenvalues. The eigenpairs derivatives can be obtained by solving algebraic equation with a symmetric coefficient matrix whose order is (n+1) ${\times}$ (n+1), where n is the number of degree of freedom the mothod is an improvement of recent work by I. W. Lee, D. O. Kim and G. H. Jung; the key idea is that the eigenvalue derivatives and the eigenvector derivatives are obtained at once via only one algebraic equation, instead of using two equations separately as like in Lee and Jung's method. Of course, the method preserves the advantages of Lee and Jung's method.

  • PDF

Security Analysis on Block Cipher XSB (블록 암호 XSB에 대한 안전성 분석)

  • Lee, Changhoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.7
    • /
    • pp.311-316
    • /
    • 2013
  • 256-bit block cipher XSB(eXtended Spn Block cipher) was proposed in 2012 and has a symmetric strucrure in encryption and decryption process. In this paper, we propose a differential fault analysis on XSB. Based on a random byte fault model, our attack can recover the secret key of XSB by using only two random byte fault injection. This result is the first known cryptanalytic result on the target algorithm.

Database with Keyword Based on Symmetric-Key Cipher (암호화된 DB에서 대칭키 기반 검색기법 구현)

  • Jeong, Min-Kyoung;Song, Hee-Jeong;Shin, Seung-Soo;Han, Kun-Hee
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.05a
    • /
    • pp.158-161
    • /
    • 2009
  • 최근 개인정보유출사건으로 프라이버시에 대한 관심이 급증하면서, 데이터베이스의 내용을 암호화할 필요성이 요구된다. 초기에는 문서 전체의 복호화를 통해서만 검색이 가능하기 때문에 효율성이 떨어져 암호화기법이 거의 사용되지 않았다. 최근에는 복호화 하지 않고 암호화된 데이터로부터 특정 키워드를 포함하는 정보를 효율적으로 검색하고자 하는 연구가 시작되었다. Song의 연구를 시작으로 점차 효율적인 검색 기법이 제안되어졌다. 본 논문에서는 데이터베이스내의 암호화된 데이터를 검색하는 기법에 대한 설계 및 구현하고, 그에 따른 정확도 및 오류율을 분석한다.

  • PDF

Measure Correlation Analysis of Network Flow Based On Symmetric Uncertainty

  • Dong, Shi;Ding, Wei;Chen, Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1649-1667
    • /
    • 2012
  • In order to improve the accuracy and universality of the flow metric correlation analysis, this paper firstly analyzes the characteristics of Internet flow metrics as random variables, points out the disadvantages of Pearson Correlation Coefficient which is used to measure the correlation between two flow metrics by current researches. Then a method based on Symmetrical Uncertainty is proposed to measure the correlation between two flow metrics, and is extended to measure the correlation among multi-variables. Meanwhile, the simulation and polynomial fitting method are used to reveal the threshold value between different correlation degrees for SU method. The statistical analysis results on the common flow metrics using several traces show that Symmetrical Uncertainty can not only represent the correct aspects of Pearson Correlation Coefficient, but also make up for its shortcomings, thus achieve the purpose of measuring flow metric correlation quantitatively and accurately. On the other hand, reveal the actual relationship among fourteen common flow metrics.

Balancing Inter-Ring Loads on SONET Dual-Ring without Demand Splitting

  • Lee, Chae-Y.;Moon, Jung-H.
    • IE interfaces
    • /
    • v.9 no.3
    • /
    • pp.64-71
    • /
    • 1996
  • In the survivability and simplicity aspect, SONET Self-healing Ring(SHR) is one of the most important schemes for the high-speed telecommunication networks. Since the ring capacity requirement is defined by the largest STS-1 cross-section in the ring, load balancing is the key issue in the design of SONET SHR. Recently, most of the research on load balancing problem have been concentrated on the SONET single-ring case. However, in certain applications, multiple-ring configuration is necessary because of the geographical limitations or the need for extra bandwidth. In this paper, the load balancing problem for SONET dual-ring is considered by assuming symmetric inter-ring demands. We present a linear programming based formulation of the problem. Initial solution and improvement procedures are presented, which solves the routing and interconnection between the two rings for each demand. Computational experiments are performed on various size of networks with randomly generated demand sets. Results show that the proposed algorithm is excellent in both the solution quality and the computational time requirement. The average error bound of the solutions obtained is 0.26% of the optimum.

  • PDF

Reducing RFID Reader Load with the Meet-in-the-Middle Strategy

  • Cheon, Jung-Hee;Hong, Jeong-Dae;Tsudik, Gene
    • Journal of Communications and Networks
    • /
    • v.14 no.1
    • /
    • pp.10-14
    • /
    • 2012
  • When tag privacy is required in radio frequency identification (ID) system, a reader needs to identify, and optionally authenticate, a multitude of tags without revealing their IDs. One approach for identification with lightweight tags is that each tag performs pseudo-random function with his unique embedded key. In this case, a reader (or a back-end server) needs to perform a brute-force search for each tag-reader interaction, whose cost gets larger when the number of tags increases. In this paper, we suggest a simple and efficient identification technique that reduces readers computation to $O$(${\sqrt{N}}$ log$N$) without increasing communication cost. Our technique is based on the well-known "meet-in-the-middle" strategy used in the past to attack symmetric ciphers.

Protect Digital Contents and Instant Player using PKI (공개키 기반의 디지털 콘텐츠 및 인스턴트 플레이어 보호방법연구)

  • Ryu, Seok
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.837-842
    • /
    • 2006
  • According to the development of the internet technology, many people can access many kind of digital contents. This approach can infringe the copyright and right owner-ship. Currently many people research the DRM(Digital Rights Management) for protect digital content after digital content downloaded. This paper propose the system that client player witch encrypted using PKI have symmetric key and CCI (copy control information), decrypt digital content witch encrypted when digital content created.