• Title/Summary/Keyword: 합의알고리즘

Search Result 125, Processing Time 0.023 seconds

Event Routing Algorithms Using the Reverse Paths of Event Subscription Spanning Trees (이벤트 등록 스패닝트리의 역경로 정보를 이용한 이벤트 라우팅 알고리즘)

  • Ryu, Ki-Yeol;Lee, Jung-Tae
    • The KIPS Transactions:PartA
    • /
    • v.9A no.1
    • /
    • pp.19-28
    • /
    • 2002
  • A new class of applications based on event interactions are emerging for the wide-area network such as Internet, which is characterized as loose coupling, heterogeneity. and asynchrony. Content-barred publish/subscribe systems are widely being studied to implement the extent notification service for wide-area networks. In this paper, we analyze some problems of the content-based routing algorithm in SIENA, a recently developed as a representative event notification service architecture, and develop an enhanced routing algorithm.

Benchmarking of Post Quantum Digital Signature for PQ-DPoL (PQ-DPoL 에 대한 양자 내성 전자서명 벤치마킹)

  • Yea-Jun Kang;Won-Woong Kim;Hyun-Ji Kim;Kyung-Bae Jang;Hwa-Jeong Seo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.252-256
    • /
    • 2023
  • 쇼어 알고리즘을 실행할 수 있는 양자 컴퓨터의 발전으로 인해 기존 ECC(Elliptic Curve Cryptography)를 사용하던 블록체인이 PQC(Post Quantum Cryptography)로의 전환을 고려하고 있다. 하지만 PQC 는 기존 암호에 비해 큰 사이즈, 느린 서명/검증 속도 등과 같은 문제점이 존재한다. 본 논문에서는 우리가 WISA'23 에서 새롭게 제안한 PQ-DPoL 합의 알고리즘에 NIST(National Institute of Standards and Technology)가 선정한 Crystal-Dilithium, Falcon 그리고 Sphincs+를 적용하여 비교 분석하였다. 실험 결과에 따르면, 매우 큰 서명 크기를 가지고 있기 때문에 블록에 담기는 트랜잭션의 수가 감소하므로 Sphincs+의 성능이 가장 떨어짐을 확인하였다. 또한 Dilithium 은 Falcon 과 비슷한 성능을 보여주었다. 그 중에서도 Falcon 이 가장 우수한 성능을 보여주었다. 이는 Falcon 의 공개키와 서명의 크기가 다른 알고리즘에 비해 작기 때문이다. 따라서 양자내성을 갖는 블록체인에는 Falcon 512 알고리즘이 가장 적합할 것으로 생각된다. 그러나 블록체인의 속도와 보안 강도는 Trade-off 관계이므로 보안성을 중요시하는 블록체인 네트워크에서는 Sphincs+가 적합할 수 있을 것으로 보인다. 따라서 블록체인 네트워크의 상황과 목적에 따라 적절한 알고리즘을 사용해야 될 것으로 생각된다.

A Study on Linkage of Block Chain in Korea Real Estate Administration Intelligence System (부동산종합공부시스템에서의 블록체인 연계방안 연구)

  • Sun, Jong Cheol;Kim, Jin Wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.05a
    • /
    • pp.113-116
    • /
    • 2018
  • 동일한 데이터를 여러 곳에 보관하는 분산원장을 특징으로 갖는 블록체인은 보안성과 안정성을 비롯한 여러 가지 기술적 특징을 가지며, 이로 인해 블록체인의 활용처에 대한 연구가 다양하게 이루어지고 있다. 본 논문에서는 공적장부의 하나인 부동산종합공부시스템에 블록체인을 적용하기 위해 고려할 사항들을 도출하고, 이를 바탕으로 블록체인 시스템 구성 방안과 합의 알고리즘 참조모형을 제시한다.

The Security Vulnerabilities of 5G-AKA and PUF-based Security Improvement (5G 인증 및 키합의 프로토콜(5G-AKA)의 보안취약점과 PUF 기반의 보안성 향상 방안)

  • Jung, Jin Woo;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.3-10
    • /
    • 2019
  • The 5G network is a next-generation converged network that combines various ICT technologies to realize the need for high speed, hyper connection and ultra low delay, and various efforts have been made to address the security vulnerabilities of the previous generation mobile networks. However, the standards released so far still have potential security vulnerabilities, such as USIM deception and replication attack, message re-transmission attack, and race-condition attack. In order to solve these security problems, this paper proposes a new 5G-AKA protocol with PUF technology, which is a physical unclonable function. The proposed PUF-based 5G-AKA improves the security vulnerabilities identified so far using the device-specific response for a specific challenge and hash function. This approach enables a strong white-list policy through the addition of inexpensive PUF circuits when utilizing 5G networks in areas where security is critical. In addition, since additional cryptographic algorithms are not applied to existing protocols, there is relatively little burden on increasing computational costs or increasing authentication parameter storage.

A Study on the Blockchain-based System Authentication Method (블록체인 기반 시스템 인증 방법에 대한 연구)

  • Kim, Sunghwan;Kim, Younggon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.1
    • /
    • pp.211-218
    • /
    • 2020
  • Recently, with the advent of blockchain technology, attempts to apply this technology to existing systems are increasing. By using the blockchain technology consensus ledger and smart contract, it is necessary to distribute certificates to various fields that require documents, attestation, authentication, verification, etc. We are studying methods using hash operation, blockchain, etc., but it is difficult to spread the technology as it has not yet reached the stage of commercialization. In this paper, user device registration authentication algorithm, blockchain-based question and answer authentication algorithm, certificate issuance, verification process and encryption algorithm, and server-side authentication for easy application in blockchain based business platform environment We proposed a blockchain-based system authentication method using four algorithms.

Time-Varying Parameter Estimation of Passive Telemetry RF Sensor System Using RLS Algorithm (RLS 알고리즘을 이용한 원격 RF 센서 시스템의 시변 파라메타 추정)

  • Kim, Kyung-Yup;Yu, Dong-Gook;Lee, Joon-Tark
    • Proceedings of the KIEE Conference
    • /
    • 2007.04c
    • /
    • pp.29-33
    • /
    • 2007
  • In this paper, time-varying parameter of passive telemetry RF sensor system is estimated using RLS(Rescursive $\leq$* Square) algorithm. In order to overcome the problems such as power limits and complication that general RF sensor system including IC chip has, the principle of inductive coupling is applied to model sensor system The model parameter is rearranged for applying RLS algorithm based on mathematical model to the derived model using inductive coupling principle. Time variant parameter of rearranged model is estimated using forgetting factor, and in case measured data is contaminated by noise and modelling error, the performance of RLS algorithm characterized by the convergence of squared error sum is verified by simulation.

  • PDF

Numerical Study of SPGD-based Phase Control of Coherent Beam Combining under Various Turbulent Atmospheric Conditions (대기외란에 따른 SPGD 기반 결맞음 빔결합 시스템 위상제어 동작성능 분석)

  • Kim, Hansol;Na, Jeongkyun;Jeong, Yoonchan
    • Korean Journal of Optics and Photonics
    • /
    • v.31 no.6
    • /
    • pp.247-258
    • /
    • 2020
  • In this paper, based on a stochastic parallel gradient descent (SPGD) algorithm we study phase control of a coherent-beam-combining system under turbulent atmospheric conditions. Based on the statistical theory of atmospheric turbulence, we carry out the analysis of the phase and wavefront distortion of a laser beam propagating through a turbulent atmospheric medium. We also conduct numerical simulations of a coherent-beam-combining system with 7- and 19-channel laser beams distorted by atmospheric turbulence. Through numerical simulations, we characterize the phase-control characteristics and efficiency of the coherent-beam-combining system under various degrees of atmospheric turbulence. It is verified that the SPGD algorithm is capable of realizing 7-channel coherent beam combining with a beam-combining efficiency of more than 90%, even under the turbulent atmospheric conditions up to cn2 of 10-13 m-2/3. In the case of 19-channel coherent beam combining, it is shown that the same turbulent atmospheric conditions result in a drastic reduction of the beam-combining efficiency down to 60%, due to the elevated impact of the corresponding refractive-index inhomogeneity. In addition, by putting together the number of iterations of the SPGD algorithm required for phase locking under atmospheric turbulence and the time intervals of atmospheric phenomena, which typically are of the order of ㎲, it is estimated that hundreds of MHz to a few GHz of computing bandwidth of SPGD-based phase control may be required for a coherent-beam-combining system to confront such turbulent atmospheric conditions. We expect the results of this paper to be useful for quantitatively analyzing and predicting the effects of atmospheric turbulence on the SPGD-based phase-control performance of a coherent-beam-combining system.

A Study on Security Enhancement for the Use and Improvement of Blockchain Technology (보안성 강화를 위한 블록체인기술의 활용과 개선방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.63-68
    • /
    • 2023
  • In this study, in relation to blockchain protocol and network security, we study the configuration of blockchain and encryption key management methods on smart contracts so that we can have a strong level of response to MITM attacks and DoS/DDoS attacks. It is expected that the use of blockchain technology with enhanced security can be activated through respond to data security threats such as MITM through encryption communication protocols and enhanced authentication, node load balancing and distributed DDoS attack response, secure coding and vulnerability scanning, strengthen smart contract security with secure consensus algorithms, access control and authentication through enhanced user authentication and authorization, strengthen the security of cores and nodes, and monitoring system to update other blockchain protocols and enhance security.

An Overview of Blockchain Technology: Concepts, Consensus, Standardization, and Security Threats (블록체인 기술 동향에 관한 연구)

  • Park, Roy C.;Lee, Young Sil
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.20 no.4
    • /
    • pp.218-225
    • /
    • 2019
  • Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain is in the spotlight as one of the core technologies of the Fouth Industrial Revolution, which can be used in various industries beyond simple cryptocurrency. various researches and developments are being conducted worldwide to utilize blockchain technology, and a global blockchain consortium is formed. In addition, attempts are being made to apply to various industries such as logistics, distribution, and medical care as well as the financial sector. However, blockchain tecnology developments still do not reach the level that meets these concerns and expectations. In this paper, we presents a comprehensive overview of blockchain technology by giving its brief concepts, consensus algorithms, standardization, and security threats.

A New Flash A/D Converter Adopting Double Base Number System (2개의 밑수를 이용한 Flash A/D 변환기)

  • Kim, Jong-Soo;Kim, Man-Ho;Jang, Eun-Hwa
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.9 no.1
    • /
    • pp.54-61
    • /
    • 2008
  • This paper presents a new TIQ based CMOS flash 6-bit ADC to process digital signal in real time. In order to improve the conversion speed of ADC by designing new logic or layout of ADC circuits, a new design method is proposed in encoding logic circuits. The proposed encoding circuits convert analog input into digitally encoded double base number system(DBNS), which uses two bases unlike the normal binary representation scheme. The DBNS adopts binary and ternary radix to enhance digital arithmetic processing capability. In the DBNS, the addition and multiplication can be processed with just shift operations only. Finding near canonical representation is the most important work in general DBNS. But the main disadvantage of DBNS representation in ADC is the fan-in problem. Thus, an equal distribution algorithm is developed to solve the fan-in problem after assignment the prime numbers first. The conversion speed of simulation result was 1.6 GSPS, at 1.8V power with the Magna $0.18{\mu}m$ CMOS process, and the maximum power consumption was 38.71mW.

  • PDF