• Title/Summary/Keyword: Asymmetric key

Search Result 172, Processing Time 0.031 seconds

A study on the Development Direction of Unmanned Systems for Subterranean Operations for the Special Operations Teams (특수작전팀의 지하작전용 무인체계 발전방향 연구)

  • Sang-Keun Cho;Jong-Hoon Kim;Sung-Jun Park;Bum-June Kwon;Ga-Ram Jeong;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.307-312
    • /
    • 2023
  • North Korea has already been using underground space for military purposes for decades, and is currently developing it as a key base for operating asymmetric forces. Accordingly, the special operations teams need fighting methods, weapon systems, and organizational structures to carry out subterranean operations. This paper presents an unmanned system platform for subterranean operations that combines tilt-rotor type drones, high-tech sensors, communication repeaters, and small robots, and a system that can be operated by special operation teams. Based on this, the survivability of the special operations teams can be strengthened and operational utility can be maximized. Afterwards, if Special Warfare Command collects collective intelligence based on the ideas related to subterranean operations presented in this paper and further develops these, it will be possible to drive subterranean operations doctrines, weapon systems, and organizational structures optimized for the battlefield on the Korean Theater of Operations in the near future.

Spectrum Hole Utilization in Cognitive Two-way Relaying Networks

  • Gao, Yuan;Zhu, Changping;Tang, Yibin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.890-910
    • /
    • 2014
  • This paper investigates the spectrum hole utilization of cooperative schemes for the two-way relaying model in order to improve the utilization efficiency of limited spectrum holes in cognitive radio networks with imperfect spectrum sensing. We propose two specific bidirectional secondary data transmission (BSDT) schemes with two-step and three-step two-way relaying models, i.e., two-BSDT and three-BSDT schemes, where the spectrum sensing and the secondary data transmission are jointly designed. In the proposed cooperative schemes, the best two-way relay channel between two secondary users is selected from a group of secondary users serving as cognitive relays and assists the bi-directional communication between the two secondary users without a direct link. The closed-form asymptotic expressions for outage probabilities of the two schemes are derived with a primary user protection constraint over Rayleigh fading channels. Based on the derived outage probabilities, the spectrum hole utilization is calculated to evaluate the percentage of spectrum holes used by the two secondary users for their successful information exchange without channel outage. Numerical results show that the spectrum hole utilization depends on the spectrum sensing overhead and the channel gain from a primary user to secondary users. Additionally, we compare the spectrum hole utilization of the two schemes as the varying of secondary signal to noise ratio, the number of cognitive relays, and symmetric and asymmetric channels.

Seismic responses of transmission tower-line system under coupled horizontal and tilt ground motion

  • Wei, Wenhui;Hu, Ying;Wang, Hao;Pi, YongLin
    • Earthquakes and Structures
    • /
    • v.17 no.6
    • /
    • pp.635-647
    • /
    • 2019
  • Tests and theoretical studies for seismic responses of a transmission tower-line system under coupled horizontal and tilt (CHT) ground motion were conducted. The method of obtaining the tilt component from seismic motion was based on comparisons from the Fourier spectrum of uncorrected seismic waves. The collected data were then applied in testing and theoretical analysis. Taking an actual transmission tower-line system as the prototype, shaking table tests of the scale model of a single transmission tower and towers-line systems under horizontal, tilt, and CHT ground motions were carried out. Dynamic equations under CHT ground motion were also derived. The additional P-∆ effect caused by tilt motion was considered as an equivalent horizontal lateral force, and it was added into the equations as the excitation. Test results were compared with the theoretical analysis and indicated some useful conclusions. First, the shaking table test results are consistent with the theoretical analysis from improved dynamic equations and proved its correctness. Second, the tilt component of ground motion has great influence on the seismic response of the transmission tower-line system, and the additional P-∆effect caused by the foundation tilt, not only increases the seismic response of the transmission tower-line system, but also leads to a remarkable asymmetric displacement effect. Third, for the tower-line system, transmission lines under ground motion weaken the horizontal displacement and acceleration responses of transmission towers. This weakening effect of transmission lines to the main structure, however, will be decreased with consideration of tilt component.

A Digital Image Watermarking Scheme using ElGamal Function (ElGarnal함수를 사용하는 디지털 이미지 워터마킹 기법)

  • Lee, Jean-Ho;Kim, Tai-Yun
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.1-8
    • /
    • 2002
  • Digital image watermarking is a technique for the purpose of protecting the ownership of the image by embedding proprietary watermarks in a digital image. It is required for the digital image watermarking scheme to pursue the robustness against water marking attacks and the perceptual Invisibility more than usual in steganography area, to guarantee not a hidden watermarking algorithm but the publicity of water-marking algorithm details and hidden use of key, which can protect the unauthorized user access from detection. In this paper we propose a new copyright watermarking scheme, which is barred on one-way hash functions using ElGamal functions and modular operations. ElGamal functions are widely used in cryptographic systems. Our watermarking scheme is robust against LSB(least significant bit) attacks and gamma correction attack, and also perceptually invisible. We demonstrate the characteristics of our proposed watermarking scheme through experiments. It is necessary to proceed as the future work the algorithm of achieving at the same time both the pseudo-randomness for the steno-key generation and the asymmetric-key generation.

A Multi-Stage Encryption Technique to Enhance the Secrecy of Image

  • Mondal, Arindom;Alam, Kazi Md. Rokibul;Ali, G.G. Md. Nawaz;Chong, Peter Han Joo;Morimoto, Yasuhiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2698-2717
    • /
    • 2019
  • This paper proposes a multi-stage encryption technique to enhance the level of secrecy of image to facilitate its secured transmission through the public network. A great number of researches have been done on image secrecy. The existing image encryption techniques like visual cryptography (VC), steganography, watermarking etc. while are applied individually, usually they cannot provide unbreakable secrecy. In this paper, through combining several separate techniques, a hybrid multi-stage encryption technique is proposed which provides nearly unbreakable image secrecy, while the encryption/decryption time remains almost the same of the exiting techniques. The technique consecutively exploits VC, steganography and one time pad (OTP). At first it encrypts the input image using VC, i.e., splits the pixels of the input image into multiple shares to make it unpredictable. Then after the pixel to binary conversion within each share, the exploitation of steganography detects the least significant bits (LSBs) from each chunk within each share. At last, OTP encryption technique is applied on LSBs along with randomly generated OTP secret key to generate the ultimate cipher image. Besides, prior to sending the OTP key to the receiver, first it is converted from binary to integer and then an asymmetric cryptosystem is applied to encrypt it and thereby the key is delivered securely. Finally, the outcome, the time requirement of encryption and decryption, the security and statistical analyses of the proposed technique are evaluated and compared with existing techniques.

Aerodynamic performance evaluation of different cable-stayed bridges with composite decks

  • Zhou, Rui;Ge, Yaojun;Yang, Yongxin;Du, Yanliang;Zhang, Lihai
    • Steel and Composite Structures
    • /
    • v.34 no.5
    • /
    • pp.699-713
    • /
    • 2020
  • The aerodynamic performance of long-span cable-stayed bridges is much dependent on its geometrical configuration and countermeasure strategies. In present study, the aerodynamic performance of three composite cable-stayed bridges with different tower configurations and passive aerodynamic countermeasure strategies is systematically investigated by conducting a series of wind tunnel tests in conjunction with theoretical analysis. The structural characteristics of three composite bridges were firstly introduced, and then their stationary aerodynamic performance and wind-vibration performance (i.e., flutter performance, VIV performance and buffeting responses) were analyzed, respectively. The results show that the bridge with three symmetric towers (i.e., Bridge I) has the lowest natural frequencies among the three bridges, while the bridge with two symmetric towers (i.e., Bridge II) has the highest natural frequencies. Furthermore, the Bridge II has better stationary aerodynamic performance compared to two other bridges due to its relatively large drag force and lift moment coefficients, and the improvement in stationary aerodynamic performance resulting from the application of different countermeasures is limited. In contrast, it demonstrates that the application of both downward vertical central stabilizers (UDVCS) and horizontal guide plates (HGP) could potentially significantly improve the flutter and vortex-induced vibration (VIV) performance of the bridge with two asymmetric towers (i.e., Bridge III), while the combination of vertical interquartile stabilizers (VIS) and airflow-depressing boards (ADB) has the capacity of improving the VIV performance of Bridge II.

A Secure Energy-Efficient Routing Scheme Using Distributed Clustering in Wireless Sensor Networks (무선 센서 네트워크에서 분산 클러스터링을 이용한 안전한 에너지 효율적인 라우팅 기술)

  • Cheon, EunHong;Lee, YonSik
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.3-9
    • /
    • 2016
  • The wireless sensor networks have become an economically viable monitoring solution for a wide variety of civilian and military applications. The main challenge in wireless sensor networks is the secure transmission of information through the network, which ensures that the network is secure, energy-efficient and able to identify and prevent intrusions in a hostile or unattended environment. In that correspondence, this paper proposes a distributed clustering process that integrates the necessary measures for secure wireless sensors to ensure integrity, authenticity and confidentiality of the aggregated data. We use the notion of pre-distribution of symmetric and asymmetric keys for a secured key management scheme, and then describe the detailed scheme which each sensor node within its cluster makes use of the pre-distribution of cryptographic parameters before deployment. Finally, we present simulation results for the proposed scheme in wireless sensor network.

A Color-Reaction-Based Biochip Detection Assay for RIF and INH Resistance of Clinical Mycobacterial Specimens

  • Xue, Wenfei;Peng, Jingfu;Yu, Xiaoli;Zhang, Shulin;Zhou, Boping;Jiang, Danqing;Chen, Jianbo;Ding, Bingbing;Zhu, Bin;Li, Yao
    • Journal of Microbiology and Biotechnology
    • /
    • v.26 no.1
    • /
    • pp.180-189
    • /
    • 2016
  • The widespread occurrence of drug-resistant Mycobacterium tuberculosis places importance on the detection of TB (tuberculosis) drug susceptibility. Conventional drug susceptibility testing (DST) is a lengthy process. We developed a rapid enzymatic color-reaction-based biochip assay. The process included asymmetric multiplex PCR/templex PCR, biochip hybridization, and an enzymatic color reaction, with specific software for data operating. Templex PCR (tem-PCR) was applied to avoid interference between different primers in conventional multiplex-PCR. We applied this assay to 276 clinical specimens (including 27 sputum, 4 alveolar lavage fluid, 2 pleural effusion, and 243 culture isolate specimens; 40 of the 276 were non-tuberculosis mycobacteria specimens and 236 were M. tuberculosis specimens). The testing process took 4.5 h. A sensitivity of 50 copies per PCR was achieved, while the sensitivity was 500 copies per PCR when tem-PCR was used. Allele sequences could be detected in mixed samples at a proportion of 10%. Detection results showed a concordance rate of 97.46% (230/236) in rifampicin resistance detection (sensitivity 95.40%, specificity 98.66%) and 96.19% (227/236) in isoniazid (sensitivity 93.59%, specificity 97.47%) detection with those of DST assay. Concordance rates of testing results for sputum, alveolar lavage fluid, and pleural effusion specimens were 100%. The assay provides a potential choice for TB diagnosis and treatment.

Privacy Preserving Keyword Search with Access Control based on DTLS (프라이버시를 보호하는 접근제어가 가능한 키워드 검색 기법)

  • Noh, Geon-Tae;Chun, Ji-Young;Jeong, Ik-Rae;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.35-44
    • /
    • 2009
  • To protect sensitive personal information, data will be stored in encrypted form. However in order to retrieve these encrypted data without decryption, there need efficient search methods to enable the retrieval of the encrypted data. Until now, a number of searchable encryption schemes have been proposed but these schemes are not suitable when dynamic users who have the permission to access the data share the encrypted data. Since, in previous searchable encryption schemes, only specific user who is the data owner in symmetric key settings or has the secret key corresponding to the public key for the encrypted data in asymmetric key settings can access to the encrypted data. To solve this problem, Stephen S. Yau et al. firstly proposed the controlled privacy preserving keyword search scheme which can control the search capabilities of users according to access policies of the data provider. However, this scheme has the problem that the privacy of the data retrievers can be breached. In this paper, we firstly analyze the weakness of Stephen S. Yau et al.'s scheme and propose privacy preserving keyword search with access control. Our proposed scheme preserves the privacy of data retrievers.

A Study on the Modulus Multiplier Speed-up Throughput in the RSA Cryptosystem (RSA 암호시스템의 모듈러 승산기 처리속도 향상을 위한 연구)

  • Lee, Seon-Keun;Jeung, Woo-Yeol
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.3
    • /
    • pp.217-223
    • /
    • 2009
  • Recently, the development of the various network method can generate serious social problems. So, it is highly required to control security of network. These problems related security will be developed and keep up to confront with anti-security field such as hacking, cracking. The way to preserve security from hacker or cracker without developing new cryptographic algorithm is keeping the state of anti-cryptanalysis in a prescribed time by means of extending key-length. In this paper, the proposed montgomery multiplication structured unit array method in carry generated part and variable length multiplication for eliminating bottle neck effect with the RSA cryptosystem. Therefore, this proposed montgomery multiplier enforce the real time processing and prevent outer cracking.

  • PDF