• Title/Summary/Keyword: Full security

Search Result 298, Processing Time 0.032 seconds

Generalized Hardware Post-processing Technique for Chaos-Based Pseudorandom Number Generators

  • Barakat, Mohamed L.;Mansingka, Abhinav S.;Radwan, Ahmed G.;Salama, Khaled N.
    • ETRI Journal
    • /
    • v.35 no.3
    • /
    • pp.448-458
    • /
    • 2013
  • This paper presents a generalized post-processing technique for enhancing the pseudorandomness of digital chaotic oscillators through a nonlinear XOR-based operation with rotation and feedback. The technique allows full utilization of the chaotic output as pseudorandom number generators and improves throughput without a significant area penalty. Digital design of a third-order chaotic system with maximum function nonlinearity is presented with verified chaotic dynamics. The proposed post-processing technique eliminates statistical degradation in all output bits, thus maximizing throughput compared to other processing techniques. Furthermore, the technique is applied to several fully digital chaotic oscillators with performance surpassing previously reported systems in the literature. The enhancement in the randomness is further examined in a simple image encryption application resulting in a better security performance. The system is verified through experiment on a Xilinx Virtex 4 FPGA with throughput up to 15.44 Gbit/s and logic utilization less than 0.84% for 32-bit implementations.

Implementation of Education Network using Switching System, Wired System and Radio Communication System (교환시스템과 유${\cdot}$무선통신 시스템을 이용한 교육용 통신망 구현)

  • Park, Jin-Taek;Gahng, Hae-Dong;Park, Young-Goo;Hong, Jin-Keun
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.4
    • /
    • pp.1-10
    • /
    • 2000
  • In this paper, an educational-purposed tree-type telecommunication network using the switching system, and the wired and radio transmission systems which are applied is implemented. Also, the proper training method for the network such as the digital full electronic switching training, the networking experiment, the optical transmission experiment, is developed to robust the adaptation ability to the actual various environment of telecommunication network of the trainers. The technical information such as the technical manuals, the user manuals and the maintenance skill reports are collected and database using Oracle DB system for the effective educational use.

  • PDF

A Study on the Airport and Airspace Management (공항 및 공역관리 제도 개선에 관한 연구)

  • Kim, Byeong-Jong;Yang, Han-Mo
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.12
    • /
    • pp.246-274
    • /
    • 2000
  • This paper discusses the qualification criteria for international hub airport and suggests the strategies for Inchon International Airport (IIA) to be the hub airport in the East Asia. Recently, many East and Southeast Asia countries have invested on large scale international airports like Chap Lak Kok airport, Pudong airport etc.. as Korea have done on IIA. IIA to be open in 2001 will face a serious competition with these airport. Being a hub airport requires geographic proximity. sufficient volume of local traffic. uncongested infrastructure, a good accessibility to surrounding industrial centers. high quality of service to the airline. In order to promote airlines to land at IIA. Korea Government need to establish Open Sky Policy to many countries and national flag carriers of Korea need to be involved in a global alliance. Developing vicinity of IIA as free trade zone will generated more local traffic which makes IIA as more attractive candidate for airlines. The Korea airspace is one of the most restricted area in the world becuase of the national security. which limits civil aircraft maneuvers. The airspace need to be re-structured to exploit the full capacity of IIA.

  • PDF

A Study on the Adaptation and Prospects of the 3-dimensional Computer graphics in the field of Fashion Design (웹스페이스 시대에 3차원 컴퓨터 그래픽스를 도입한 의상디자인 분야의 현황 및 전망에 관한 연구)

  • Bae Lee-Sa;Lee In-Seong
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.7 no.2
    • /
    • pp.1-10
    • /
    • 2005
  • This study intends to examine extensively on the current situation where the full capacity of 3D CG is not being highlighted because of the lack of the information and the awareness and to look at how the virtual reality technology is being applied ranging from the design of the clothes to the marketing. A set of processes ranging from the development of the clothing design to the marketing will be performed on the web. Designers will design with 3D CG and make the patterns and will hand this over to the producer together with the virtual swatch. But there are important problems to work out. First, it is the problem of the virtual fitting room. Second, it is the absence of the 3D CG, which is easy and convenient for the clothing design. Third, it is to perfect the visual reconstruction. Fourth, it is the security of the distribution system. Fifth, it also calls for the strengthened internet network that can smooth the flow of the tremendous data. Consumer will be able to produce according to their needs and will become designer and producer at the same time, resulting in the achievement of the consumer-oriented marketing in real sense.

  • PDF

Advanced n based Packet Marking Mechanism for IP Traceback (TTL 기반 패킷 마킹 방식을 적용한 IP 패킷 역추적 기법)

  • Lee Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.13-25
    • /
    • 2005
  • Distributed Denial-of-Service(DDoS) attack prevent users from accessing services on the target network by spoofing its origin source address with a large volume of traffic. The objective of IP Traceback is to determine the real attack sources, as well as the full path taken by the attack packets. Existing IP Traceback methods can be categorized as proactive or reactive tracing. Existing PPM based tracing scheme(such as router node appending, sampling and edge sampling) insert traceback information in IP packet header for IP Traceback. But, these schemes did not provide enhanced performance in DDoS attack. In this paper, we propose a 'TTL based advanced Packet Marking' mechanism for IP Traceback. Proposed mechanism can detect and control DDoS traffic on router and can generate marked packet for reconstructing origin DDoS attack source, by which we can diminish network overload and enhance traceback performance.

  • PDF

Institutionalization for the Real Estate Electronic Commerce System and Security System of Real Estate Contents (부동산전자상거래시스템 제도화 방안과 부동산컨텐츠 보안에 관한 연구)

  • Kim, Dong-Hyun;Kang, Byung-Gi
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.2
    • /
    • pp.118-128
    • /
    • 2008
  • Currently analyzed the various real estate electronic transaction relation service present condition which is enforced from the government offices. And applied a real estate electronic transaction and enforces and the representative instance which selected analyzed. Analysis leads, groped the constituent unit by construction plan of real estate electronic transaction system of governmental leading and unit system construction investigated a priority. And delivered Real Estate Contents Information in DRM Serever for authentication, decoding, and license downloading for cases of charged contents. This can retain the merits of P2P technology to its full extent while solving the biggest issue addressed: copyright problems.

  • PDF

A Study on the Effect of the Use of Reserve Officers on the Military (예비역 간부 활용이 군에 미치는 효과 연구)

  • Han, Bongkyu;Yang, Gumyong;Kim, Gakgyu
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.2
    • /
    • pp.147-158
    • /
    • 2020
  • Korea Ministry of National Defense has directed the state-of-the-art technology Forces troops structures that can respond to security threats in all directions through the Defense Innovation 2.0, which aims to reorganize the personnel and organizations in response to population decline. An implement of effective analysis to maintain combat power is necessary due to possible restrictions on combat power, especially in division of mobilization where reserve manpower is operated frequently. In this study, the normal operations of the reserve officers were investigated, the direct effects of the combat forces of the reserve officers was analyzed using ARENA modeling, and the budget required to operate the innovation and indirect effects of employment of veterans were studied. The result of the simulation proved to be effective in demonstrating unit combat power when the reserve officer was in full-time operations and economic benefits were also significant in terms of efficiency of defense budget management.

Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE

  • Chen, Zehong;Zhang, Peng;Zhang, Fangguo;Huang, Jiwu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2292-2309
    • /
    • 2017
  • Ciphertext policy attribute-based encryption (CP-ABE) is a useful cryptographic technology for guaranteeing data confidentiality but also fine-grained access control. Typically, CP-ABE can be divided into two classes: small universe with polynomial attribute space and large universe with unbounded attribute space. Since the learning with errors over rings (R-LWE) assumption has characteristics of simple algebraic structure and simple calculations, based on R-LWE, we propose a small universe CP-ABE scheme to improve the efficiency of the scheme proposed by Zhang et al. (AsiaCCS 2012). On this basis, to achieve unbounded attribute space and improve the expression of attribute, we propose a large universe CP-ABE scheme with the help of a full-rank differences function. In this scheme, all polynomials in the R-LWE can be used as values of an attribute, and these values do not need to be enumerated at the setup phase. Different trapdoors are used to generate secret keys in the key generation and the security proof. Both proposed schemes are selectively secure in the standard model under R-LWE. Comparison with other schemes demonstrates that our schemes are simpler and more efficient. R-LWE can obtain greater efficiency, and unbounded attribute space means more flexibility, so our research is suitable in practices.

A Study on the Readjustment Plans for Solution of Conflict in Gaeseong Complex - Centering around the Inter-Korean Commercial Arbitration System (개성공단 분쟁해결 제도 정비방안 - 남북상사중재제도를 중심으로)

  • Hwangbo, Hyun
    • Journal of Arbitration Studies
    • /
    • v.29 no.4
    • /
    • pp.3-31
    • /
    • 2019
  • In order to achieve full-scale economic cooperation between North Korea and South Korea, the Gaesong Industrial Complex should reopen first. In this case, the Inter-Korean commercial arbitration system should be clearly established to effectively resolve the disputes arising in the special economic zones of the Gaesong Industrial Complex. Even though the Inter-Korean Investment Security Agreement, the Agreement on the Resolution of Commercial Disputes between North Korea and South Korea, the Agreement on the Formation and Operation of the Inter-Korean Commercial Arbitration Committee, and the Agreement on the Formation and Operation of the Inter-Korean Commercial Arbitration Committee in the Gaesong Industrial District are in place, specific arbitration procedure is not concretely agreed upon and realized between the two Koreas. Therefore, the realization of commercial arbitration between them led by the Ministry of Unification or the government should be accomplished. In addition, it is necessary to consider the administrative trial or administrative litigation system in order to deal with administrative disputes that are not subject to commercial arbitration. Lastly, discussions on legal integration between the two Koreas should continue, focusing on the special economic zone of the Gaesong Industrial Complex, in order to prevent integration from being hindered by a different culture for a long time.

Development of a Half-Duplex Communication Device for Use via Human Skin (인체 임피던스를 이용한 양방향 통신 시스템의 설계)

  • Kim, Won-Jun;Song, Kyo-Yong;Kim, Young-Pil;Ko, Dong-Young;Kim, Jung-Han
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.24 no.5
    • /
    • pp.583-587
    • /
    • 2015
  • In this study, a half-duplex mutual communication device via human skin was developed. Frequency-shift keying (FSK) digital modulation and demodulation control were used to transmit and receive data. Data communication through the human body is an effective communication technique and has high-grade security characteristics. In addition, making contact is a natural instinct of humans. Transmitting data through the human body is currently a highly conspicuous technology, because recently a lot of commercial sensors for humans have been developed. A body area network (BAN) can be easily constructed by this communication method on human skin. In this study, a half-duplex FSK mutual communication device was developed using a commercial FSK modulator and demodulator. A special control switching circuit and communication sequence were developed for mutual communication through human skin.