• Title/Summary/Keyword: Combination Key Generation

Search Result 30, Processing Time 0.019 seconds

Combination Key Generation Scheme Robust to Updates of Personal Information (결합키 생성항목의 갱신에 강건한 결합키 생성 기법)

  • Jang, Hobin;Noh, Geontae;Jeong, Ik Rae;Chun, Ji Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.915-932
    • /
    • 2022
  • According to the Personal Information Protection Act and Pseudonymization Guidelines, the mapping is processed to the hash value of the combination key generation items including Salt value when different combination applicants wish to combine. Example of combination key generation items may include personal information like name, phone number, date of birth, address, and so on. Also, due to the properties of the hash functions, when different applicants store their items in exactly the same form, the combination can proceed without any problems. However, this method is vulnerable to combination in scenarios such as address changing and renaming, which occur due to different database update times of combination applicants. Therefore, we propose a privacy preserving combination key generation scheme robust to updates of items used to generate combination key even in scenarios such as address changing and renaming, based on the thresholds through probabilistic record linkage, and it can contribute to the development of domestic Big Data and Artificial Intelligence business.

PRaCto: Pseudo Random bit generator for Cryptographic application

  • Raza, Saiyma Fatima;Satpute, Vishal R
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6161-6176
    • /
    • 2018
  • Pseudorandom numbers are useful in cryptographic operations for using as nonce, initial vector, secret key, etc. Security of the cryptosystem relies on the secret key parameters, so a good pseudorandom number is needed. In this paper, we have proposed a new approach for generation of pseudorandom number. This method uses the three dimensional combinational puzzle Rubik Cube for generation of random numbers. The number of possible combinations of the cube approximates to 43 quintillion. The large possible combination of the cube increases the complexity of brute force attack on the generator. The generator uses cryptographic hash function. Chaotic map is being employed for increasing random behavior. The pseudorandom sequence generated can be used for cryptographic applications. The generated sequences are tested for randomness using NIST Statistical Test Suite and other testing methods. The result of the tests and analysis proves that the generated sequences are random.

Identification of Plasmid-Free Chlamydia muridarum Organisms Using a Pgp3 Detection-Based Immunofluorescence Assay

  • Chen, Chaoqun;Zhong, Guangming;Ren, Lin;Lu, Chunxue;Li, Zhongyu;Wu, Yimou
    • Journal of Microbiology and Biotechnology
    • /
    • v.25 no.10
    • /
    • pp.1621-1628
    • /
    • 2015
  • Chlamydia possesses a conserved 7.5 kb plasmid that is known to play an important role in chlamydial pathogenesis, since some chlamydial organisms lacking the plasmid are attenuated. The chlamydial transformation system developed recently required the use of plasmid-free organisms. Thus, the generation and identification of plasmid-free organisms represent a key step in understanding chlamydial pathogenic mechanisms. A tricolor immunofluorescence assay for simultaneously detecting the plasmid-encoded Pgp3 and whole organisms plus DNA staining was used to screen C. muridarum organisms selected with novobiocin. PCR was used to detect the plasmid genes. Next-generation sequencing was then used to sequence the genomes of plasmid-free C. muridarum candidates and the parental C. muridarum Nigg strain. We generated five independent clones of plasmid-free C. muridarum organisms by using a combination of novobiocin treatment and screening plaque-purified clones with anti-Pgp3 antibody. The clones were confirmed to lack plasmid genes by PCR analysis. No GlgA protein or glycogen accumulation was detected in cells infected with the plasmid-free clones. More importantly, whole-genome sequencing characterization of the plasmid-free C. muridarum organism and the parental C. muridarum Nigg strain revealed no additional mutations other than loss of the plasmid in the plasmid-free C. muridarum organism. Thus, the Pgp3-based immunofluorescence assay has allowed us to identify authentic plasmid-free organisms that are useful for further investigating chlamydial pathogenic mechanisms.

Group key management protocol adopt to cloud computing environment (클라우드 컴퓨팅 환경에 적합한 그룹 키 관리 프로토콜)

  • Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.12 no.3
    • /
    • pp.237-242
    • /
    • 2014
  • Recently, wind energy is expanding to combination of computing to forecast of wind power generation as well as intelligent of wind powerturbine. Wind power is rise and fall depending on weather conditions and difficult to predict the output for efficient power production. Wind power is need to reliably linked technology in order to efficient power generation. In this paper, distributed power generation forecasts to enhance the predicted and actual power generation in order to minimize the difference between the power of distributed power short-term prediction model is designed. The proposed model for prediction of short-term combining the physical models and statistical models were produced in a physical model of the predicted value predicted by the lattice points within the branch prediction to extract the value of a physical model by applying the estimated value of a statistical model for estimating power generation final gas phase produces a predicted value. Also, the proposed model in real-time National Weather Service forecast for medium-term and real-time observations used as input data to perform the short-term prediction models.

A Comprehensive Study on Key Components of Grayscale-based Deepfake Detection

  • Seok Bin Son;Seong Hee Park;Youn Kyu Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.8
    • /
    • pp.2230-2252
    • /
    • 2024
  • Advances in deep learning technology have enabled the generation of more realistic deepfakes, which not only endanger individuals' identities but also exploit vulnerabilities in face recognition systems. The majority of existing deepfake detection methods have primarily focused on RGB-based analysis, offering unreliable performance in terms of detection accuracy and time. To address the issue, a grayscale-based deepfake detection method has recently been proposed. This method significantly reduces detection time while providing comparable accuracy to RGB-based methods. However, despite its significant effectiveness, the "key components" that directly affect the performance of grayscale-based deepfake detection have not been systematically analyzed. In this paper, we target three key components: RGB-to-grayscale conversion method, brightness level in grayscale, and resolution level in grayscale. To analyze their impacts on the performance of grayscale-based deepfake detection, we conducted comprehensive evaluations, including component-wise analysis and comparative analysis using real-world datasets. For each key component, we quantitatively analyzed its characteristics' performance and identified differences between them. Moreover, we successfully verified the effectiveness of an optimal combination of the key components by comparing it with existing deepfake detection methods.

A novel framework for the construction of cryptographically secure S-boxes

  • Razi Arshad;Mudassir Jalil;Muzamal Hussain;Abdelouahed Tounsi
    • Computers and Concrete
    • /
    • v.34 no.1
    • /
    • pp.79-91
    • /
    • 2024
  • In symmetric cryptography, a cryptographically secure Substitution-Box (S-Box) is a key component of a block cipher. S-Box adds a confusion layer in block ciphers that provide resistance against well-known attacks. The generation of a cryptographically secure S-Box depends upon its generation mechanism. In this paper, we propose a novel framework for the construction of cryptographically secure S-Boxes. This framework uses a combination of linear fractional transformation and permutation functions. S-Boxes security is analyzed against well-known security criteria that include nonlinearity, bijectiveness, strict avalanche and bits independence criteria, linear and differential approximation probability. The S-Boxes can be used in the encryption of any grayscale digital images. The encrypted images are analyzed against well-known image analysis criteria that include pixel changing rates, correlation, entropy, and average change of intensity. The analysis of the encrypted image shows that our image encryption scheme is secure.

Novel Trusted Hierarchy Construction for RFID Sensor-Based MANETs Using ECCs

  • Kumar, Adarsh;Gopal, Krishna;Aggarwal, Alok
    • ETRI Journal
    • /
    • v.37 no.1
    • /
    • pp.186-196
    • /
    • 2015
  • In resource-constrained, low-cost, radio-frequency identification (RFID) sensor-based mobile ad hoc networks (MANETs), ensuring security without performance degradation is a major challenge. This paper introduces a novel combination of steps in lightweight protocol integration to provide a secure network for RFID sensor-based MANETs using error-correcting codes (ECCs). The proposed scheme chooses a quasi-cyclic ECC. Key pairs are generated using the ECC for establishing a secure message communication. Probability analysis shows that code-based identification; key generation; and authentication and trust management schemes protect the network from Sybil, eclipse, and de-synchronization attacks. A lightweight model for the proposed sequence of steps is designed and analyzed using an Alloy analyzer. Results show that selection processes with ten nodes and five subgroup controllers identify attacks in only a few milliseconds. Margrave policy analysis shows that there is no conflict among the roles of network members.

Numerical Study of Entropy Generation with Nonlinear Thermal Radiation on Magnetohydrodynamics non-Newtonian Nanofluid Through a Porous Shrinking Sheet

  • Bhatti, M.M.;Abbas, T.;Rashidi, M.M.
    • Journal of Magnetics
    • /
    • v.21 no.3
    • /
    • pp.468-475
    • /
    • 2016
  • In this article, entropy generation on MHD Williamson nanofluid over a porous shrinking sheet has been analyzed. Nonlinear thermal radiation and chemical reaction effects are also taken into account with the help of energy and concentration equation. The fluid is electrically conducting by an external applied magnetic field while the induced magnetic field is assumed to be negligible due to small magnetic Reynolds number. The governing equations are first converted into the dimensionless expression with the help of similarity transformation variables. The solution of the highly nonlinear coupled ordinary differential equation has been obtained with the combination of Successive linearization method (SLM) and Chebyshev spectral collocation method. Influence of all the emerging parameters on entropy profile, temperature profile and concentration profile are plotted and discussed. Nusselt number and Sherwood number are also computed and analyzed. It is observed that entropy profile increases for all the physical parameters. Moreover, it is found that when the fluid depicts non-Newtonian (Williamson fluid) behavior then it causes reduction in the velocity of fluid, however, non-Newtonian behavior enhances the temperature and nanoparticle concentration profile.

Design of short-term forecasting model of distributed generation power for wind power (풍력 발전을 위한 분산형 전원전력의 단기예측 모델 설계)

  • Song, Jae-Ju;Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.3
    • /
    • pp.211-218
    • /
    • 2014
  • Recently, wind energy is expanding to combination of computing to forecast of wind power generation as well as intelligent of wind powerturbine. Wind power is rise and fall depending on weather conditions and difficult to predict the output for efficient power production. Wind power is need to reliably linked technology in order to efficient power generation. In this paper, distributed power generation forecasts to enhance the predicted and actual power generation in order to minimize the difference between the power of distributed power short-term prediction model is designed. The proposed model for prediction of short-term combining the physical models and statistical models were produced in a physical model of the predicted value predicted by the lattice points within the branch prediction to extract the value of a physical model by applying the estimated value of a statistical model for estimating power generation final gas phase produces a predicted value. Also, the proposed model in real-time National Weather Service forecast for medium-term and real-time observations used as input data to perform the short-term prediction models.

Reduction of the Retransmission Delay for Heterogeneous Devices in Dynamic Opportunistic Device-to-device Network

  • Chen, Sixuan;Zou, Weixia;Liu, Xuefeng;Zhao, Yang;Zhou, Zheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.4662-4677
    • /
    • 2018
  • The dynamic opportunistic device-to-device (DO-D2D) network will frequently emerge in the fifth generation (5G) wireless communication due to high-density and fast-moving mobile devices. In order to improve the Quality of Experience (QoE) of users with different computing capacity devices in the DO-D2D network, in this paper, we focus on the study of how to reduce the packets retransmission delay and satisfy heterogeneous devices. To select as many devices as possible to transmit simultaneously without interference, the concurrent transmitters-selecting algorithm is firstly put forward. It jointly considers the number of packets successfully received by each device and the device's connectivity. Then, to satisfy different devices' demands while primarily ensuring the base-layer packets successfully received by all the devices, the layer-cooperation instantly decodable network coding is presented, which is used to select transmission packets combination for each transmitter. Simulation results illustrate that there is an appreciable retransmission delay gain especially in the poor channel quality network compared to the traditional base-station (BS) retransmission algorithm. In addition, our proposed algorithms perform well to satisfy the different demands of users with heterogeneous devices.