• Title/Summary/Keyword: Asymmetric key

Search Result 171, Processing Time 0.028 seconds

A Study on Secure Binding Update Protocol Supporting Mobile Nodes with Constraint Computational Power in Mobile IPv6 Environment (모바일 IPv6 환경에서 제한된 계산 능력을 갖는 모바일 노드를 지원하는 바인딩 갱신 인증 프로토콜에 관한 연구)

  • Choi, Sung-Kyo;You, Il-Sun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.11-25
    • /
    • 2005
  • In MIPv6 environment, an important design consideration for public key based binding update protocols is to minimize asymmetric cryptographic operations in mobile nodes with constraint computational power, such as PDAs and cellular phones, For that, public key based protocols such as CAM-DH. SUCV and Deng-Zhou-Bao's approach provides an optimization to offload asymmetric cryptographic operations of a mobile node to its home agent. However, such protocols have some problems in providing the optimization. Especially, CAM-DH with this optimization does not unload all asymmetric cryptographic operations from the mobile node, while resulting in the home agent's vulnerability to denial of service attacks. In this paper, we improve the drawbacks of CAM-DH. Furthermore, we adopt Aura's two hash-based CGA scheme to increase the cost of brute-force attacks searching for hash collisions in the CGA method. The comparison of our protocol with other public key based protocols shows that our protocol can minimize the MN's computation overhead, in addition to providing better manageability and stronger security than other protocols.

  • PDF

Regulatory Mechanism of Spindle Movements during Oocyte Meiotic Division

  • Ai, Jun-Shu;Li, Mo;Schatten, Heide;Sun, Qing-Yuan
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.22 no.11
    • /
    • pp.1477-1486
    • /
    • 2009
  • Female germ cell meiotic divisions are typically asymmetric, giving rise to two daughter cells with different sizes. Spindle movements including spindle migration from the oocyte center to the cortex and spindle rotation from parallel to perpendicular (typically in the mouse) at the cortex are crucial for these asymmetric divisions and therefore are crucial for gamete production. Different regulatory mechanisms for spindle movements have been determined in different species and a wide variety of different molecular components and processes that are involved in spindle movements have also been identified in different species. Here, we review the current state of knowledge as well as our understanding of mechanisms for spindle movements in different systems with focus on three main aspects: microtubules (MT), microfilaments (MF) and molecules associated with cytoskeletal organization as well as molecules that are not directly related to the cytoskeleton. How they might interact or function independently during female meiotic divisions in different species is discussed in detail.

Cement/PVDF hollow-fiber hybrid basement membrane: Preparation, microstructure, and separation application

  • Yabin, Zhang;Xiongfei, Du;Taotao, Zhao
    • Membrane and Water Treatment
    • /
    • v.13 no.6
    • /
    • pp.291-301
    • /
    • 2022
  • In this study, cement/PVDF hollow-fiber hybrid membranes were prepared via a mixed process of diffusion-induced phase separation and hydration. The presence of X-ray diffraction peaks of Ca(OH)2, an AFt phase, an AFm phase, and C-S-H phase confirmed the hydration reaction. Good hydrophilicity was obtained. The cross-sectional and surface morphologies of the hybrid membranes showed that an asymmetric pore structure was formed. Hydration products comprising parallel plates of Ca(OH)2, fibrous ettringite AFt, and granulated particles AFm were obtained gradually. For the hybrid membranes cured for different time, the pore-size distribution was similar but the porosity decreased because of blocking of the hydration products. In addition, the water flux decreased with hydration time, and carbon retention was 90% after 5 h of rejection treatment. Almost all the Zn2+ ions were adsorbed by the hybrid membrane. The above results proved that the obtained membrane could be alternative as basement membrane for separation application.

Randomized Block Size (RBS) Model for Secure Data Storage in Distributed Server

  • Sinha, Keshav;Paul, Partha;Amritanjali, Amritanjali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4508-4530
    • /
    • 2021
  • Today distributed data storage service are being widely used. However lack of proper means of security makes the user data vulnerable. In this work, we propose a Randomized Block Size (RBS) model for secure data storage in distributed environments. The model work with multifold block sizes encrypted with the Chinese Remainder Theorem-based RSA (C-RSA) technique for end-to-end security of multimedia data. The proposed RBS model has a key generation phase (KGP) for constructing asymmetric keys, and a rand generation phase (RGP) for applying optimal asymmetric encryption padding (OAEP) to the original message. The experimental results obtained with text and image files show that the post encryption file size is not much affected, and data is efficiently encrypted while storing at the distributed storage server (DSS). The parameters such as ciphertext size, encryption time, and throughput have been considered for performance evaluation, whereas statistical analysis like similarity measurement, correlation coefficient, histogram, and entropy analysis uses to check image pixels deviation. The number of pixels change rate (NPCR) and unified averaged changed intensity (UACI) were used to check the strength of the proposed encryption technique. The proposed model is robust with high resilience against eavesdropping, insider attack, and chosen-plaintext attack.

A Novel Authenticated Group Key Distribution Scheme

  • Shi, Run-hua;Zhong, Hong;Zhang, Shun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.935-949
    • /
    • 2016
  • In this paper, we present a novel authenticated group key distribution scheme for large and dynamic multicast groups without employing traditional symmetric and asymmetric cryptographic operations. The security of our scheme is mainly based on the basic theories for solving linear equations. In our scheme, a large group is divided into many subgroups, where each subgroup is managed by a subgroup key manager (SGKM) and a group key generation center (GKGC) further manages all SGKMs. The group key is generated by the GKGC and then propagated to all group members through the SGKMs, such that only authorized group members can recover the group key but unauthorized users cannot. In addition, all authorized group members can verify the authenticity of group keys by a public one-way function. The analysis results show that our scheme is secure and efficient, and especially it is very appropriate for secure multicast communications in large and dynamic client-server networks.

Atomic Force Microscopy of Asymmetric Membranes from Turtle Erythrocytes

  • Tian, Yongmei;Cai, Mingjun;Xu, Haijiao;Ding, Bohua;Hao, Xian;Jiang, Junguang;Sun, Yingchun;Wang, Hongda
    • Molecules and Cells
    • /
    • v.37 no.8
    • /
    • pp.592-597
    • /
    • 2014
  • The cell membrane provides critical cellular functions that rely on its elaborate structure and organization. The structure of turtle membranes is an important part of an ongoing study of erythrocyte membranes. Using a combination of atomic force microscopy and single-molecule force spectroscopy, we characterized the turtle erythrocyte membrane structure with molecular resolution in a quasi-native state. High-resolution images both leaflets of turtle erythrocyte membranes revealed a smooth outer membrane leaflet and a protein covered inner membrane leaflet. This asymmetry was verified by single-molecule force spectroscopy, which detects numerous exposed amino groups of membrane proteins in the inner membrane leaflet but much fewer in the outer leaflet. The asymmetric membrane structure of turtle erythrocytes is consistent with the semi-mosaic model of human, chicken and fish erythrocyte membrane structure, making the semi-mosaic model more widely applicable. From the perspective of biological evolution, this result may support the universality of the semi-mosaic model.

High Efficiency Power Amplifier Based on Digital Pre-Distortion (디지털전치왜곡 기반 고효율 전력증폭기 설계)

  • Kwon, Ki-Dae;Yoon, Wonsik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.8
    • /
    • pp.1847-1853
    • /
    • 2014
  • The PAPR of the input signal is increased due to OFDMA signal in a mobile communication system. High efficiency of a power amplifier, which accounts for power consumption, is a very important key technology. Digital Pre-Distortion techniques were used to improve the linearity of the power amplifier. The Asymmetric Doherty scheme was used to improve the efficiency of the power amplifier. In this paper, we propose a new structure of Asymmetric Doherty. Drive power amplifier part is separated as main path and peak path, and phase shifter is employed to improve power combine characteristics of the Doherty Amplifier. Also, envelope tracking technology for drive gate bais in drive peak amplifier is used to improve efficiency.

Proposal of ID-Based Cryptosystems Integrating Digital Signature and Key Distribution (개인정보에 기초한 서명 및 키 분배 통합 암호시스템의 제안)

  • Ha, Jae-Cheol;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.3
    • /
    • pp.57-70
    • /
    • 1996
  • It would be desirable in network to implement an efficient asymmetric key cryptosystem which can not only solve the public key authentication problem but also integrate digital signature and key distribution, We propose two ID-based key distribution systems integrated with digital signature, and analyze them in computation and implementation. The first is based on the EIGamal-typed signature scheme, and the second is based on the RSA scheme, Both can be employed in one-pass and interactive key distribution systems.

Realization of the Biba Security Model in an OSI-distributed (OSI-분산 시스템에서의 Biba Security 모델의 구현)

  • Park, Chong-Hwa
    • The Journal of Information Technology
    • /
    • v.5 no.2
    • /
    • pp.35-45
    • /
    • 2002
  • This paper discusses a distributed implementation of the Biba security policy model. Implementation of an service in the OSI-RM is not sufficient for enforcing the Biba model. Also confidentiality services are necessary. Public Key Systems(PKSs) are considered for the realization of these security services. In this paper symmetric & asymmetric cryptographic systems are considered for the realization of these security service. It is investigated how key-distributions can be found resulting in a minimum number of key.

  • PDF

Highly Enantioselective Addition of Diethylzinc to Aldehydes Catalyzed by Novel Chiral tert-Amino Alcohols

  • Zhang, Cong-Hai;Yan, Sheng-Jiao;Pan, Sheng-Qiang;Huang, Rong;Lin, Jun
    • Bulletin of the Korean Chemical Society
    • /
    • v.31 no.4
    • /
    • pp.869-873
    • /
    • 2010
  • A series of novel chiral tert-amino alcohols 4a-h derived from enantiomerically pure phenylalanine were synthesized efficiently and used as chiral ligands in the catalytic enantioselective ethylation of aldehydes with diethylzinc (diethylzinc-to-aldehyde addition). The use of 10 mol % of the amino alcohols led to the corresponding sec-alcohols with excellent enantioselectivities (up to 100% ee) and high yields.