• Title/Summary/Keyword: Asymmetric Key

Search Result 171, Processing Time 0.023 seconds

Modelling of multidimensional effects in thermal-hydraulic system codes under asymmetric flow conditions - Simulation of ROCOM tests 1.1 and 2.1 with ATHLET 3D-Module

  • Pescador, E. Diaz;Schafer, F.;Kliem, S.
    • Nuclear Engineering and Technology
    • /
    • v.53 no.10
    • /
    • pp.3182-3195
    • /
    • 2021
  • The implementation and validation of multi-dimensional (multi-D) features in thermal-hydraulic system codes aims to extend the application of these codes towards multi-scale simulations. The main goal is the simulation of large-scale three-dimensional effects inside large volumes such as piping or vessel. This novel approach becomes especially relevant during the simulation of accidents with strongly asymmetric flow conditions entailing density gradients. Under such conditions, coolant mixing is a key phenomenon on the eventual variation of the coolant temperature and/or boron concentration at the core inlet and on the extent of a local re-criticality based on the reactivity feedback effects. This approach presents several advantages compared to CFD calculations, mainly concerning the model size and computational efforts. However, the range of applicability and accuracy of the newly implemented physical models at this point is still limited and needs to be further extended. This paper aims at contributing to the validation of the multi-D features of the system code ATHLET based on the simulation of the Tests 1.1 and 2.1, conducted at the test facility ROCOM. Overall, the multi-D features of ATHLET predict reasonably well the evolution from both experiments, despite an observed overprediction of coolant mixing at the vessel during both experiments.

Tool Lifecycle Optimization using ν-Asymmetric Support Vector Regression (ν-ASVR을 이용한 공구라이프사이클 최적화)

  • Lee, Dongju
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.4
    • /
    • pp.208-216
    • /
    • 2020
  • With the spread of smart manufacturing, one of the key topics of the 4th industrial revolution, manufacturing systems are moving beyond automation to smartization using artificial intelligence. In particular, in the existing automatic machining, a number of machining defects and non-processing occur due to tool damage or severe wear, resulting in a decrease in productivity and an increase in quality defect rates. Therefore, it is important to measure and predict tool life. In this paper, ν-ASVR (ν-Asymmetric Support Vector Regression), which considers the asymmetry of ⲉ-tube and the asymmetry of penalties for data out of ⲉ-tube, was proposed and applied to the tool wear prediction problem. In the case of tool wear, if the predicted value of the tool wear amount is smaller than the actual value (under-estimation), product failure may occur due to tool damage or wear. Therefore, it can be said that ν-ASVR is suitable because it is necessary to overestimate. It is shown that even when adjusting the asymmetry of ⲉ-tube and the asymmetry of penalties for data out of ⲉ-tube, the ratio of the number of data belonging to ⲉ-tube can be adjusted with ν. Experiments are performed to compare the accuracy of various kernel functions such as linear, polynomial. RBF (radialbasis function), sigmoid, The best result isthe use of the RBF kernel in all cases

A study on an Efficient Kerberos Authentication based on X.509 (X.509 인터넷 공개키 기반구조에서 Kerberos 인증에 관한 연구)

  • 김철현;신광철;김창원
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.5
    • /
    • pp.641-652
    • /
    • 2002
  • In this paper, proposes Kerberos certification mechanism that improve certification service of PKINIT base that announce in IETF CAT Working Group. Bid to certificate other realm because search position of outside realm through DNS and apply X.509 directory certification system, acquire public key from DNS server by chain (CertPath) between realms by certification and Key exchange way that provide service between realms applying X.509, DS/DNS of PKINIT base. In order to provide regional services, Certification and key exchange between realms use Kerberos symmetric method and Session connection used Directory service to connection X.509 is designed using an asymmetric method. By efficient TGT (Ticket Granting Ticket) exchange and reusability of ticket, A Design of Kerberos system that have effect and simplification of certification formality that reduce overload on communication.

  • PDF

Identification of the Genes Involved in the Fruiting Body Production and Cordycepin Formation of Cordyceps militaris Fungus

  • Zheng, Zhuang-Li;Qiu, Xue-Hong;Han, Ri-Chou
    • Mycobiology
    • /
    • v.43 no.1
    • /
    • pp.37-42
    • /
    • 2015
  • A mutant library of Cordyceps militaris was constructed by improved Agrobacterium tumefaciens-mediated transformation and screened for degradation features. Six mutants with altered characters in in vitro and in vivo fruiting body production, and cordycepin formation were found to contain a single copy T-DNA. T-DNA flanking sequences of these mutants were identified by thermal asymmetric interlaced-PCR approach. ATP-dependent helicase, cytochrome oxidase subunit I and ubiquitin-like activating enzyme were involved in in vitro fruiting body production, serine/threonine phosphatase involved in in vivo fruiting body production, while glucose-methanol-choline oxidoreductase and telomerase reverse transcriptase involved in cordycepin formation. These genes were analyzed by bioinformatics methods, and their molecular function and biology process were speculated by Gene Ontology (GO) analysis. The results provided useful information for the control of culture degeneration in commercial production of C. militaris.

Incorporating RSA with a New Symmetric-Key Encryption Algorithm to Produce a Hybrid Encryption System

  • Prakash Kuppuswamy;Saeed QY Al Khalidi;Nithya Rekha Sivakumar
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.196-204
    • /
    • 2024
  • The security of data and information using encryption algorithms is becoming increasingly important in today's world of digital data transmission over unsecured wired and wireless communication channels. Hybrid encryption techniques combine both symmetric and asymmetric encryption methods and provide more security than public or private key encryption models. Currently, there are many techniques on the market that use a combination of cryptographic algorithms and claim to provide higher data security. Many hybrid algorithms have failed to satisfy customers in securing data and cannot prevent all types of security threats. To improve the security of digital data, it is essential to develop novel and resilient security systems as it is inevitable in the digital era. The proposed hybrid algorithm is a combination of the well-known RSA algorithm and a simple symmetric key (SSK) algorithm. The aim of this study is to develop a better encryption method using RSA and a newly proposed symmetric SSK algorithm. We believe that the proposed hybrid cryptographic algorithm provides more security and privacy.

Memory-efficient Public Key Encryption with Keyword Search in Server (서버에서 효율적인 메모리 사용량을 제공하는 공개키 기반 검색 암호 시스템)

  • Kwon, Eun-Jeong;Seo, Jae-Woo;Lee, Pil-Joong;Park, Young-Man;Lee, Hae-Gyu;Kim, Yeong-Heon;Chong, Hak-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.3-15
    • /
    • 2008
  • In 2000, Song. et. al. firstly proposed the Searchable Keyword Encryption System that treated a problem to search keywords on encrypted data. Since then, various Searchable Keyword Encryption Systems based on symmetric and asymmetric methods have been proposed. However, the Searchable Keyword Encryption Systems based on public key system has a problem that the index size for searching keywords on encrypted data increases linearly according to the number of keyword. In this paper, we propose the method that reduces the index size of Searchable Keyword Encryption based on public key system using Bloom Filter, apply the proposed method to PEKS(Public key Encryption with Keyword Search) that was proposed by Boneh. et. al., and analyze efficiency for the aspect of storage.

Reverse Baby-step 2k-ary Adult-step Method for 𝜙((n) Decryption of Asymmetric-key RSA (비대칭키 RSA의 𝜙(n) 해독을 위한 역 아기걸음- 2k-ary 성인걸음법)

  • Lee, Sang-Un
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.25-31
    • /
    • 2014
  • When the public key e and the composite number n=pq are disclosed but not the private key d in an asymmetric-key RSA, message decryption is carried out by obtaining ${\phi}(n)=(p-1)(q-1)=n+1-(p+q)$ and subsequently computing $d=e^{-1}(mod{\phi}(n))$. The most commonly used decryption algorithm is integer factorization of n/p=q or $a^2{\equiv}b^2$(mod n), a=(p+q)/2, b=(q-p)/2. But many of the RSA numbers remain unfactorable. This paper therefore applies baby-step giant-step discrete logarithm and $2^k$-ary modular exponentiation to directly obtain ${\phi}(n)$. The proposed algorithm performs a reverse baby-step and $2^k$-ary adult-step. As a results, it reduces the execution time of basic adult-step to $1/2^k$ times and the memory $m={\lceil}\sqrt{n}{\rceil}$ to l, $a^l$ > n, hence obtaining ${\phi}(n)$ by executing within l times.

Dispersion Effects of Wave Force on Interlocking Caisson Breakwater with Shear-Key (전단키형 인터로킹 케이슨 방파제의 파력분산효과)

  • Song, Sung Hoon;Park, Min Su;Jeong, Youn Ju;Hwang, Yoon Koog
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.39 no.1
    • /
    • pp.195-201
    • /
    • 2019
  • Long caisson breakwaters can improve the structural safety of a caisson due to the wave dispersion effect which reduces the average wave force acting on one caisson. However, in order to make long caissons, there are many manufacturing and construction limitations. Recently, interlocking caisson systems, which are to form a long caisson by interlocking individual caissons with adjacent caissons, have been much attention. In the present study, a interlocking caisson system with shear-keys was proposed and the wave dispersion effect according to the shear-key was evaluated analytically. As a result, (1) Because of the asymmetric shape of the interlocking caisson, the structure behavior and the wave dispersion effect of one are also asymmetric. (2) The wave dispersion effect is more influenced by the distribution and characteristics of wave acting on each caisson rather than the shape of the shear-key such as shear angle, height, shear length ratio. (3) The interlocking caisson breakwater is almost the same behavior and wave dispersion effect as a fully integrated breakwater.

An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices (저전력 모바일 장치에 적합한 효율적인 동적 그룹 키 동의)

  • Cho Seokhyang;Nam Junghyun;Kim Seungjoo;Won Dongho;Lee Hyejoo;Choi Jinsoo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.157-168
    • /
    • 2005
  • Group key agreement protocols are designed to provide a group of parties securely communicating over a public network with a session key. The mobile computing architecture is asymmetric in the sense of computational capabilities of participants. That is, the protocol participants consist of the stationary server(application servers) with sufficient computational Power and a cluster of mobile devices(clients) with limited computational resources. It is desirable to minimize the amount of computation performed by each group member in a group involving low-power mobile devices such as smart cards or personal digital assistants(PDAs). Furthermore we are required to update the group key with low computational costs when the members need to be excluded from the group or multiple new members need to be brought into an existing group. In this paper, we propose a dynamic group key protocol which offers computational efficiency to the clients with low-power mobile devices. We compare the total communicative and computational costs of our protocol with others and prove its suity against a passive adversary in the random oracle model.

Improved Accountable Internet Protocol Using Signature (시그니처를 이용한 향상된 Accountable 인터넷 프로토콜)

  • Park, Gi-Tae;Lee, Jae-Hwoon;Jung, Hee-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.200-206
    • /
    • 2014
  • Accountable Internet Protocol (AIP) is one of the future Internet architectures to provide accountability concept by using the self-certifying address that is derived by the public key of the host. In AIP, when a host sends a packet, a domain that is located between the source and the destination hosts discards the packet in order to verify the source IP address. Therefore, performance degradation can occur due to packet discard especially when there is asymmetric route. In this paper, we propose the improved AIP mechanism to verify the source IP address without discarding the packet by including the timestamp, public key value and the signature for protecting from forfeiting the source address. Security safety of the proposed mechanism is evaluated and the proposed mechanism can provide the more robust security as well as reducing the latency due to discarding packets.