• 제목/요약/키워드: Asymmetric Key

검색결과 171건 처리시간 0.026초

Superconductive Multi-pole Hairpin type Filter과 Delay Time 설계 및 실험 (Modeling and Simulation of the Delay Time in Superconductive Multi-pole Hairpin type Filter)

  • 양재라;정구락;강준희
    • 한국초전도저온공학회:학술대회논문집
    • /
    • 한국초전도저온공학회 2002년도 학술대회 논문집
    • /
    • pp.135-137
    • /
    • 2002
  • In the favor of adjusting microwave signal, Hairpin type Filter, which delay microwave signal enough to several nanosecond, is a key component. One of the main advantage in using Hairpin type Filter is a conveniency for equipping with Delay Module, and because of having a wide bandwidth, Hairpin type Filter can be designed to satisfy the most applications. In this work, we attempted to estimate the delay time in a superconductive hairpin type filter A software to synthesize even and odd order equiripple hairpin type filter has been developed. This software arbitrarily locate its transfer zeros making symmetric of asymmetric amplitude response and equalizing group delay. Borland C++ compiler has been used. The program was designed to run under MS-DOS, Window 98, Window 2000. The program optimizes the position of the transfer function zeros in order to fulfill the group delay specification masks. We designed and fabricated a hairpin type HTS 2-pole microstrip bandpass filter to operate at 5.8Ghz. The fabrication method was pulsed laser deposition and YBCO films were deposited on sapphire substrates with a Ce$O_{2}$ thin layer as a buffer layer. We also developed a new style hairpin type filter by using interdigitide inner-pole. Compared to the same size regular hairpin type filters, our filters had a lower center frequency.

  • PDF

Uniformity Improvement of Micromirror Array for Reliable Working Performance as an Optical Modulator in the Maskless Photolithography System

  • Lee, Kook-Nyung;Kim, Yong-Kweon
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • 제1권2호
    • /
    • pp.132-139
    • /
    • 2001
  • We considered the uniformity of fabricated micromirror arrays by characterizing the fabrication process and calculating the appropriate driving voltages of micromirrors used as virtual photomask in maskless photolithography. The uniformity of the micromirror array in terms of driving voltage and optical characteristics is adversely affected by factors, such as the air gap between the bottom electrode and the mirror plate, the spring shape and the deformation of the mirror plate or torsion spring. The thickness deviation of the photoresist sacrificial layer, the misalignment between mirror plate and bottom electrode, the aluminum deposition condition used to produce the spring and the mirror plate, and initial mirror deflection were identified as key factors. Their importance lies in the fact that they are related to air gap deviations under the mirror plate, asymmetric driving voltages in left and right mirror directions, and the deformation of the Al sring or mirror plate after removal of the sacrificial layer. The plasma ashing conditions used for removing the sacrificial layer also contributed to the deformation of the mirror plate and spring. Driving voltages were calculated for the pixel operation of the micromirror array, and the non-uniform characteristics of fabricated micromirrors were taken into consideration to improve driving performance reliability.

  • PDF

카드사용자의 비밀번호 기반 이중서명을 이용한 전자 지불 프로토콜의 설계 (The Design of Electronic Payment Protocol Using Dual Signature based on Cardholder's Secret Number)

  • 김성열;이옥빈;배용근
    • 한국정보통신학회논문지
    • /
    • 제3권2호
    • /
    • pp.411-420
    • /
    • 1999
  • 전자상거래는 컴퓨터 기술 분야에서 중요한 주제로서 이는 공중망에서 전자 정보를 교환함으로써 금융 거래를 수행하게 되기 때문에 다양한 종류의 위험을 내포하게 된다. 따라서 전자상거래 시스템 구축할 때는 기밀성, 무결성, 인증과 부인봉쇄와 같은 보안요소를 고려해야 한다. 본 논문에서는 이중서명 기법을 이용한 신용카드 기반의 지불프로토콜을 제시한다 이 프로토콜은 카드사용자가 지불하는 은행에게는 지불정보를 제공하지만 구매정보는 주지 않으며, 상인에게는 구매정보를 제공하지만 카드번호를 비롯한 지불정보는 알리지 않기 때문에 카드사용자의 개인정보를 보호하게 된다. 프로토콜을 수행하기 위해서 이중서명은 사용자의 신용카드 비밀번호를 사용한 공통키와 공개키 방식을 사용함으로써 실행한다.

  • PDF

Overexpression, Purification, and Preliminary X-ray Crystallographic Analysis of Human Brain-Type Creatine Kinase

  • Bong, Seung-Min;Moon, Jin-Ho;Jang, Eun-Hyuk;Lee, Ki-Seog;Chi, Young-Min
    • Journal of Microbiology and Biotechnology
    • /
    • 제18권2호
    • /
    • pp.295-298
    • /
    • 2008
  • Creatine kinase (CK; E.C. 2.7.3.2) is an important enzyme that catalyzes the reversible transfer of a phosphoryl group from ATP to creatine in energy homeostasis. The brain-type cytosolic isoform of creatine kinase (BB-CK), which is found mainly in the brain and retina, is a key enzyme in brain energy metabolism, because high-energy phosphates are transfered through the creatine kinase/phosphocreatine shuttle system. The recombinant human BB-CK protein was overexpressed as a soluble form in Escherichia coli and crystallized at $22^{\circ}C$ using PEG 4000 as a precipitant. Native X-ray diffraction data were collected to $2.2{\AA}$ resolution using synchrotron radiation. The crystals belonged to the tetragonal space group $P4_32_12$, with cell parameters of a=b=97.963, $c=164.312{\AA},\;and\;{\alpha}={\beta}={\gamma}=90^{\circ}$. The asymmetric unit contained two molecules of CK, giving a crystal volume per protein mass $(V_m)$ of $1.80{\AA}^3\;Da^{-1}$ and a solvent content of 31.6%.

확장된 DES 구현 (Implementation of the Extended Data Encryption Standard(EDES))

  • 한승조;김판구
    • 한국정보처리학회논문지
    • /
    • 제4권6호
    • /
    • pp.1565-1575
    • /
    • 1997
  • DES 암호 알고리즘을 대체 할 수 있는 112 비트의 키 길이를 갖는 EDES라는 새로운 알고리즘이 [1,2]에서 제안 되었다. 평문은 96비트로 입력되며, 이것은 각각 32비트의 3개의 서브 블록으로 분리된다. EDES는 S-box를 8비트에서 16비트로 증가하였으며, 3개의 서브블럭에 있는 f 함수들이 비대칭적으로 수행되기 때문에 differential cryptanalysis 보다 암호 강고가 강하다. 본 논문은 EDES에 대한 하드웨어의 설계와 VLSI로 구현되는 것을 제안한다. 암호화와 복호화는 VLSI의 단일 칩내에서 구현되도록 하였으며, 만약 시스템의 클럭 주파수가 15Mhz이면 약 90Mbit/sec로 암호화 할 수 있다. 그러므로 구현된 칩은 초고속망의 프로토콜에서 온라인으로 데이터를 암호화 하는데 적용될 수 있다.

  • PDF

Nanoporous Membrane with Ultrahigh Selectivity and Flux Suitable for Filtration of Viruses

  • Yang, Seung-Yun;Ryu In-Cheol;Jang, Sung-Key;Kim, Jin-Kon;Russell Thomas P.
    • 한국고분자학회:학술대회논문집
    • /
    • 한국고분자학회 2006년도 IUPAC International Symposium on Advanced Polymers for Emerging Technologies
    • /
    • pp.313-313
    • /
    • 2006
  • In this study, we describe a new double layered nanoporous membrane suitable for virus filtration. One layer is an 80 nm thick film having cylindrical pores with diameters of 15 nm and a narrow pore size distribution. This layer is prepared by using a thin film of the mixture of a block copolymer and a homopolymer, and mainly acts to separate viruses. The support layer (${\sim}150\;microns\;thick$) is a conventional micro-filtration membrane with a broad pore size distribution. This asymmetric membrane showed very high selectivity and flux for the separation of human rhinovirus type 14 (HRV 14) which has a diameter of ${\sim}30\;nm$ and is a major pathogen of the common cold in humans.

  • PDF

벤조사이오펜을 기초로 한 새로운 비대칭형 올리고머의 합성과 OTFT 특성 (Synthesis of Novel Asymmetric Oligomers Based on Benzothiophene and OTFT Characteristics)

  • 이동희;박종원;정대성;박찬;김윤희;권순기
    • 한국전기전자재료학회:학술대회논문집
    • /
    • 한국전기전자재료학회 2010년도 하계학술대회 논문집
    • /
    • pp.129-129
    • /
    • 2010
  • The conjugated oligomers with rigid and fused-ring structures are of interest for the solution-processable organic thin film transistors (OTFTs) due to their well defined structure and high purity. In this study, alkyl substituted benzothiophene based oligomers were synthesized by a novel route, the key point of which is the acid-induced intermolecular cyclization reaction of aromatic methyl sulfoxides, and were confirmed by $^1H$-NMR and FT-IR studies. The obtained oligomers showed the good solubility in common organic solvents such as hexane, chloroform, and dimethylchloride at room-temperature, which is due to the introduced alkyl chain. The physical and optical properties of the oligomers were studied using differential scanning scalorimetry (DSC), cyclic-voltammetry (CV), UV-visible and PL spectra studies. Solution processed OTFT device based on synthesized oligomers show a high hole mobility of up to $0.01\;cm^2V^{-1}s^{-1}$, $I_{on}/I_{off}$ of $10^5$ and threshold voltage of -14V.

  • PDF

Multi-dimensional seismic response control of offshore platform structures with viscoelastic dampers (II-Experimental study)

  • He, Xiao-Yu;Zhao, Tie-Wei;Li, Hong-Nan;Zhang, Jun
    • Structural Monitoring and Maintenance
    • /
    • 제3권2호
    • /
    • pp.175-194
    • /
    • 2016
  • Based on the change of traditional viscoelastic damper structure, a brand-new damper is designed to control simultaneously the translational vibration and the rotational vibration for platforms. Experimental study has been carried out on the mechanical properties of viscoelastic material and on its multi-dimensional seismic response control effect of viscoelastic damper. Three types of viscoelastic dampers with different shapes of viscoelastic material are designed to test the influence of excited frequency, strain amplitude and ambient temperature on the mechanical property parameters such as circular dissipation per unit, equivalent stiffness, loss factor and storage shear modulus. Then, shaking table tests are done on a group of single-storey platform systems containing one symmetric platform and three asymmetric platforms with different eccentric forms. Experimental results show that the simulation precision of the restoring force model is rather good for the shear deformation of viscoelastic damper and is also satisfied for the torsion deformation and combined deformations of viscoelastic damper. The shaking table tests have verified that the new-type viscoelastic damper is capable of mitigating the multi-dimensional seismic response of offshore platform.

RPIDA: Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks

  • Yang, Lijun;Ding, Chao;Wu, Meng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권12호
    • /
    • pp.5189-5208
    • /
    • 2015
  • To address the contradiction between data aggregation and data security in wireless sensor networks, a Recoverable Privacy-preserving Integrity-assured Data Aggregation (RPIDA) scheme is proposed based on privacy homomorphism and aggregate message authentication code. The proposed scheme provides both end-to-end privacy and data integrity for data aggregation in WSNs. In our scheme, the base station can recover each sensing data collected by all sensors even if these data have been aggregated by aggregators, thus can verify the integrity of all sensing data. Besides, with these individual sensing data, base station is able to perform any further operations on them, which means RPIDA is not limited in types of aggregation functions. The security analysis indicates that our proposal is resilient against typical security attacks; besides, it can detect and locate the malicious nodes in a certain range. The performance analysis shows that the proposed scheme has remarkable advantage over other asymmetric schemes in terms of computation and communication overhead. In order to evaluate the performance and the feasibility of our proposal, the prototype implementation is presented based on the TinyOS platform. The experiment results demonstrate that RPIDA is feasible and efficient for resource-constrained sensor nodes.

Internet Banking Login with Multi-Factor Authentication

  • Boonkrong, Sirapat
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권1호
    • /
    • pp.511-535
    • /
    • 2017
  • Internet banking is one of many services provided by financial institutions that have become very popular with an increasing trend. Due to the increased amount of usage of the service, Internet banking has become a target from adversaries. One of the points that are at risk of an attack is the login process. Therefore, it is necessary to have a security mechanism that can reduce this risk. This research designs and develops a multi-factor authentication protocol, starting from a registration system, which generates authentication factors, to an actual authentication mechanism. These factors can be categorised into two groups: short term and long term. For the authentication protocol, only three messages need to be exchanged between a client and a financial institution's server. Many cryptographic processes are incorporated into the protocol, such as symmetric and asymmetric cryptography, a symmetric key generation process, a method for generating and verifying digital signatures. All of the authentication messages have been proved and analysed by the logic of GNY and the criteria of OWASP-AT-009. Even though there are additional factors of authentication, users do not really feel any extra load on their part, as shown by the satisfactory survey.