• Title/Summary/Keyword: A key technique

Search Result 1,732, Processing Time 0.028 seconds

A Key Management Technique Based on Topographic Information Considering IoT Information Errors in Cloud Environment (클라우드 환경에서 IoT 정보 오류를 고려한 지형 정보 기반의 키 관리 기법)

  • Jeong, Yoon-Su;Choi, Jeong-hee
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.233-238
    • /
    • 2020
  • In the cloud environment, IoT devices using sensors and wearable devices are being applied in various environments, and technologies that accurately determine the information generated by IoT devices are being actively studied. However, due to limitations in the IoT environment such as power and security, information generated by IoT devices is very weak, so financial damage and human casualties are increasing. To accurately collect and analyze IoT information, this paper proposes a topographic information-based key management technique that considers IoT information errors. The proposed technique allows IoT layout errors and groups topographic information into groups of dogs in order to secure connectivity of IoT devices in the event of arbitrary deployment of IoT devices in the cloud environment. In particular, each grouped terrain information is assigned random selected keys from the entire key pool, and the key of the terrain information contained in the IoT information and the probability-high key values are secured with the connectivity of the IoT device. In particular, the proposed technique can reduce information errors about IoT devices because the key of IoT terrain information is extracted by seed using probabilistic deep learning.

Study on an Intelligent Ferrography Diagnosis Expert System

  • Jiadao, Wang;Darong, Chen;Xianmei, Kong
    • Proceedings of the Korean Society of Tribologists and Lubrication Engineers Conference
    • /
    • 2002.10b
    • /
    • pp.455-456
    • /
    • 2002
  • Wear is one of the main factors causing breakdown and fault of machine, so ferrography technique analyzing wear particles can be an effective way for condition monitoring and fault diagnosis. On the base of the forward multilayer neural network, a nodes self-deleting neural network model is provided in this paper. This network can itself deletes the nodes to optimize its construction. On the basis of the nodes self-deleting neural network, an intelligent ferrography diagnosis expert system (IFDES) for wear particles recognition and wear diagnosis is described. This intelligent expert system can automatically slim lip knowledge by learning from samples and realize basically the entirely automatic processing from wear particles recognition to wear diagnosis.

  • PDF

Practical Encryption and Decryption System using Iterative Phase Wrapping Method (반복적인 위상 랩핑 방법을 이용한 실질적인 암호화 및 복호화 시스템)

  • Seo, Dong-Hoan;Lee, Sung-Geun;Kim, Yoon-Sik
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.32 no.6
    • /
    • pp.955-963
    • /
    • 2008
  • In this paper, we propose an improved practical encryption and fault-tolerance decryption method using a non-negative value key and random function obtained with a white noise by using iterative phase wrapping method. A phase wrapping operating key, which is generated by the product of arbitrary random phase images and an original phase image. is zero-padded and Fourier transformed. Fourier operating key is then obtained by taking the real-valued data from this Fourier transformed image. Also the random phase wrapping operating key is made from these arbitrary random phase images and the same iterative phase wrapping method. We obtain a Fourier random operating key through the same method in the encryption process. For practical transmission of encryption and decryption keys via Internet, these keys should be intensity maps with non-negative values. The encryption key and the decryption key to meet this requirement are generated by the addition of the absolute of its minimum value to each of Fourier keys, respectively. The decryption based on 2-f setup with spatial filter is simply performed by the inverse Fourier transform of the multiplication between the encryption key and the decryption key and also can be used as a current spatial light modulator technology by phase encoding of the non-negative values. Computer simulations show the validity of the encryption method and the robust decryption system in the proposed technique.

On Recovering Erased RSA Private Key Bits

  • Baek, Yoo-Jin
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.11-25
    • /
    • 2018
  • While being believed that decrypting any RSA ciphertext is as hard as factorizing the RSA modulus, it was also shown that, if additional information is available, breaking the RSA cryptosystem may be much easier than factoring. For example, Coppersmith showed that, given the 1/2 fraction of the least or the most significant bits of one of two RSA primes, one can factorize the RSA modulus very efficiently, using the lattice-based technique. More recently, introducing the so called cold boot attack, Halderman et al. showed that one can recover cryptographic keys from a decayed DRAM image. And, following up this result, Heninger and Shacham presented a polynomial-time attack which, given 0.27-fraction of the RSA private key of the form (p, q, d, $d_p$, $d_q$), can recover the whole key, provided that the given bits are uniformly distributed. And, based on the work of Heninger and Shacham, this paper presents a different approach for recovering RSA private key bits from decayed key information, under the assumption that some random portion of the private key bits is known. More precisely, we present the algorithm of recovering RSA private key bits from erased key material and elaborate the formula of describing the number of partially-recovered RSA private key candidates in terms of the given erasure rate. Then, the result is justified by some extensive experiments.

EMI based multi-bolt looseness detection using series/parallel multi-sensing technique

  • Chen, Dongdong;Huo, Linsheng;Song, Gangbing
    • Smart Structures and Systems
    • /
    • v.25 no.4
    • /
    • pp.423-432
    • /
    • 2020
  • In this paper, a novel but practical approach named series/parallel multi-sensing technique was proposed to evaluate the bolt looseness in a bolt group. The smart washers (SWs), which were fabricated by embedding a Lead Zirconate Titanate (PZT) transducer into two flat metal rings, were installed to the bolts group. By series connection of SWs, the impedance signals of different bolts can be obtained through only one sweep. Therefore, once the loosening occurred, the shift of different peak frequencies can be used to locate which bolt has loosened. The proposed multi input single output (MISO) damage detection scheme is very suitable for the structural health monitoring (SHM) of joint with a large number of bolts connection. Another notable contribution of this paper is the proposal of 3-dB bandwidth root mean square deviation (3 dB-RMSD) which can quantitatively evaluate the severity of bolt looseness. Compared with the traditional naked-eye observation method, the equivalent circuit based 3-dB bandwidth can accurately define the calculation range of RMSD. An experiment with three bolted connection specimens that installed the SWs was carried out to validate our proposed approach. Experimental result shows that the proposed 3 dB-RMSD based multi-sensing technique can not only identify the loosened bolt but also monitor the severity of bolt looseness.

Impact of rock microstructures on failure processes - Numerical study based on DIP technique

  • Yu, Qinglei;Zhu, Wancheng;Tang, Chun'an;Yang, Tianhong
    • Geomechanics and Engineering
    • /
    • v.7 no.4
    • /
    • pp.375-401
    • /
    • 2014
  • It is generally accepted that material heterogeneity has a great influence on the deformation, strength, damage and failure modes of rock. This paper presents numerical simulation on rock failure process based on the characterization of rock heterogeneity by using a digital image processing (DIP) technique. The actual heterogeneity of rock at mesoscopic scale (characterized as minerals) is retrieved by using a vectorization transformation method based on the digital image of rock surface, and it is imported into a well-established numerical code Rock Failure Process Analysis (RFPA), in order to examine the effect of rock heterogeneity on the rock failure process. In this regard, the numerical model of rock could be built based on the actual characterization of the heterogeneity of rock at the meso-scale. Then, the images of granite are taken as an example to illustrate the implementation of DIP technique in simulating the rock failure process. Three numerical examples are presented to demonstrate the impact of actual rock heterogeneity due to spatial distribution of constituent mineral grains (e.g., feldspar, quartz and mica) on the macro-scale mechanical response, and the associated rock failure mechanism at the meso-scale level is clarified. The numerical results indicate that the shape and distribution of constituent mineral grains have a pronounced impact on stress distribution and concentration, which may further control the failure process of granite. The proposed method provides an efficient tool for studying the mechanical behaviors of heterogeneous rock and rock-like materials whose failure processes are strongly influenced by material heterogeneity.

Genetic Symmetric Key Generation for IDEA

  • Malhotra, Nandini;Nagpal, Geeta
    • Journal of Information Processing Systems
    • /
    • v.11 no.2
    • /
    • pp.239-247
    • /
    • 2015
  • Cryptography aims at transmitting secure data over an unsecure network in coded version so that only the intended recipient can analyze it. Communication through messages, emails, or various other modes requires high security so as to maintain the confidentiality of the content. This paper deals with IDEA's shortcoming of generating weak keys. If these keys are used for encryption and decryption may result in the easy prediction of ciphertext corresponding to the plaintext. For applying genetic approach, which is well-known optimization technique, to the weak keys, we obtained a definite solution to convert the weaker keys to stronger ones. The chances of generating a weak key in IDEA are very rare, but if it is produced, it could lead to a huge risk of attacks being made on the key, as well as on the information. Hence, measures have been taken to safeguard the key and to ensure the privacy of information.

A study on JTC optical encryption system using binary CGHs (Binary CGH를 사용한 JTC 광암호화 시스템 연구)

  • 주성현;정만호
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.5
    • /
    • pp.491-497
    • /
    • 2003
  • In this paper, an optical encryption system using binary key code based on the joint transform correlator (JTC) is considered. The binary key code is synthesized by using a design technique of the pixel-oriented Computer Generated Holograms (CGHs). The independence and efficiency of the binary encryption key are investigated through computer simulation. To test the efficiency of the encryption system using binary key code, a holographic encryption system is constructed, and the experimental results prove that our holographic encryption system has high ability.

An Efficient Group Key Management Scheme using Counting Bloom Filter in VANET (VANET에서 카운팅 블룸 필터를 사용한 효율적인 그룹 키 관리 기법)

  • Lee, SuYoun;Ahn, HyoBeom
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.47-52
    • /
    • 2013
  • VANET(Vehicular Ad-hoc Network) is a kind of ad hoc networks which is consist of intelligence vehicular ad nodes, and has become a hot emerging research project in many fields. It provides traffic safety, cooperative driving and etc. but has also some security problems that can be occurred in general ad hoc networks. In VANET, it has been studies that group signature method for user privacy. However, among a group of group key generation phase and group key update phase, RSU(Road-Side Unit) and the computational overhead of the vehicle occur. In this paper, we propose an efficient group key management techniques with CBF(Counting Bloom Filter). Our group key management method is reduced to the computational overhead of RSU and vehicles at the group key generation and renewal stage. In addition, our method is a technique to update group key itself.