• Title/Summary/Keyword: 비밀통신

Search Result 548, Processing Time 0.025 seconds

Research of Secret Communication Using Quantum key Distribution and AES (양자키 교환과 AES를 이용한 비밀통신 연구)

  • Choung, Young-Chul;Rim, Kwang-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.84-90
    • /
    • 2014
  • Secret communication has developed from analogue communication to digital one. Secret communication which is based on digital communication has been designed succeeding safety of one-time pad. One-time pad's safety is attributed to the security of secret key's mutual storage and mutual synchronization that is the key's interchange basis is one of the essential factors. This manuscript examines mathematical stability of BB84 algorithm which is one of the quantum cryptography system, and conducts transmission of quantum key. The created key suggests One-time Pad algorithm which interchanges ciphertext implemented AES's 64th round.

PSpice Implementation of Secure Communication with Embedding Drive Synchronization using SC-CNN (SC-CNN 임베딩 구동 동기기법을 이용한 비밀통신의 PSpice 구현)

  • 배영철;김주완;손영우
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.509-513
    • /
    • 2003
  • In this paper, we configured secure communication circuit with PSpice through Embedding Drive Synchronization using SC-CNN, SC-CNN provide us a good method to separate interconnected state variables of a system respectively and to make it possible to change current component to voltage component in the state variables.

  • PDF

Synchronization and Secure Communication in Hyper-chaos system using SC-CNN (SC-CNN을 이용한 하이퍼카오스 동기화와 비밀통신)

  • 배영철;임정석;황인호;김주완
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.6
    • /
    • pp.1175-1183
    • /
    • 2001
  • In this paper, we use hyper chaos circuit which is made through the phase differences which is generated during the process of weak-coupling of CNN between two and more chaos attractors. Notwithstanding the complexity of the hyper chaos, we could do the synchronization and according to it, Secure communication through this method coo]d be accomplished. On this research, we configurated 2-double scroll and 3-double scroll circuit ,not using Chua circuit, but SC-CNN(State-Controlled CNN) which is more flexible to configure the system.

  • PDF

Secure Communication using Embedding Drive Synchronization (임베딩 구동 동기화를 이용한 비밀통신)

  • Bae, Young-Chul;Kim, Ju-Wan;Kim, Yi-Gon;Shon, Young-Woo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.3
    • /
    • pp.310-315
    • /
    • 2003
  • In this paper, We introduce an embedding driven synchronization method using SC-CNN(State-Controlled Cellular Neural Network) which has the purpose to secure communication method through the embedding driven synchronization method in the SC-CNN. we proposed new embedding driven synchronization that this method is only using one state variable compare to the general driven synchronization methods which is using all state variables. In this paper, We achieved the usage of embedding driven synchronization and we also applied it to secure communication.

Secure Communication using Embedding Drive Synchronization (임베딩 구동 동기화를 이용한 비밀통신)

  • 배영철;김주완;김이곤
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.05a
    • /
    • pp.117-120
    • /
    • 2003
  • 본 논문에서는 임베딩 구동 동기화를 이용한 비밀통신회로를 구성하고 검증하였다. 임베딩 구동 동기는 Chua 회로의 미분방정식의 세 가지 상태 변수 중 전류성분과 같이 동기화와 신호 합성에 어려운 상태변수를 전압 성분으로 분리하여 각각의 CNN 성분으로 다룰 수 있는 SC-CNN을 이용하여 구성하였다. Embedding Drive Synchronization(임베딩 구동동기)은 구동동기에서 한 미분상태변수를 완전히 대체하지 않고 동일한 시스템상의 일부 성분으로 구성하여 동기화를 이루고 비밀통신에 적용한 후 그 결과를 검증하였다.

  • PDF

The Secure Communication of Hyper-chaos circuit using SC-CNN (SC-CNN을 이용한 하이퍼카오스 회로에서의 비밀 통신)

  • 배영철;김주완
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.903-907
    • /
    • 2002
  • A hyper-chaos circuit is created by applying identical n-double scrolls with weak coupled method, to each cell. Hyper-chaos synchronization was achieved using dive response synchronization between the transmitter and receiver about each state variable in the SC-CNN. From result of the recovery signal through the demodulation method in the receiver, We shown that recovery quality of state variable $\chi$$_3$ is superior to that of $\chi$$_2$,$\chi$$_1$in secure communication.

  • PDF

The Synchronization and Secure Communication Methods for build Small World (Small World 구축을 위한 동기화 기법 및 비밀 통신)

  • 배영철
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.5
    • /
    • pp.1114-1119
    • /
    • 2004
  • In this paper, we proposed that the synchronization and secure communication methods for build small world. In order to accomplish synchronization and secure communication in the small world, we used Chua’s oscillator which well represent the chaos dynamics and composed several stage with Chua’s oscillator by using coupled synchronization method. This paper shows a secure communication result in the small world network using coupled synchronizaton method.

The Secure Communication using Complexity (복잡계를 이용한 비밀 통신)

  • 배영철
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.365-370
    • /
    • 2004
  • In this paper, complexity secure communication was presented. The complexity circuit is used to State-Controlled Cellular Neural Network(SC-CNN). We make a complexity circuit using SC-CNN with the N-double scroll. A complexity circuit is created by applying identical n-double scrolls with coupled method, to each cell. complexity synchronization was achieved using drive response synchronization between the transmitter and receiver about each state in the SC-CNN. From the result of the recovery signal through the demodulation method in the receiver. We shown that recovery quality in the receiver is the similar to other secure communication methods.