• Title/Summary/Keyword: Key String

Search Result 49, Processing Time 0.02 seconds

ID-Based Group Key Management Protocols for Dynamic Peer Groups (피어 그룹을 위한 ID 기반의 그룹키 관리 프로토콜)

  • Park, Young-Ho;Lee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.7
    • /
    • pp.922-933
    • /
    • 2004
  • In recent years, peer-to-peer network have a greate deal of attention for distributed computing or collaborative application, and work of ID-based public key systems have been focusing on the area of cryptography. In this paper, we propose ID-based group key management protocols for secure communication in autonomous peer group. Each member obtains his public/private key pair derived from his identification string from Private Key Generator. No central server participates in group key management protocol instead, all group members share the burden of group key management by the collaboration of themselves, so that our scheme avoids the single point of failure problem. In addition, our scheme considers the nature of dynamic peer group such as frequent joining and leaving of a member.

  • PDF

Pressure Contact Interconnection for High Reliability Medium Power Integrated Power Electronic Modules

  • Yang, Xu;Chen, Wenjie;He, Xiaoyu;Zeng, Xiangjun;Wang, Zhaoan
    • Journal of Power Electronics
    • /
    • v.9 no.4
    • /
    • pp.544-552
    • /
    • 2009
  • This paper presents a novel spring pressure contact interconnect technique for medium power integrated power electronics modules (IPEMs). The key technology of this interconnection is a spring which is made from Be-Cu alloy. By means of the string pressure contact, sufficient press-contact force and good electrical interconnection can be achieved. Another important advantage is that the spring exhibits excellent performance in enduring thermo-mechanical stress. In terms of manufacture procedure, it is also comparatively simple. A 4 kW half-bridge power inverter module is fabricated to demonstrate the performance of the proposed pressure contact technique. Electrical, thermal and mechanical test results of the packaged device are reported. The results of both the simulation and experiment have proven that a good performance can be achieved by the proposed pressure contact technique for the medium power IPEMs.

Provable Security of Key Derivation Functions Based on the Block Ciphers (블록암호 기반 키유도함수의 증명가능 안전성)

  • Kang, Ju-Sung;Yi, Ok-Yeon;Youm, Ji-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.3-16
    • /
    • 2010
  • Key derivation functions are used within many cryptographic systems in order to generate various keys from a fixed short key string. In this paper we survey a state-of-the-art in the key derivation functions and wish to examine the soundness of the functions on the view point of provable security. Especially we focus on the key derivation functions using pseudorandom functions which are recommended by NISI recently, and show that the variant of Double-Pipeline Iteration mode using pseudorandom permutations is a pseudorandom function. Block ciphers can be regarded as practical primitives of pseudorandom permutations.

A Method for Generating Robust Key from Face Image and User Intervention (얼굴과 사용자 입력정보를 이용하여 안전한 키를 생성하는 방법)

  • Kim, Hyejin;Choi, JinChun;Jung, Chang-hun;Nyang, DaeHun;Lee, KyungHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1059-1068
    • /
    • 2017
  • Even though BioHashing scheme can effectively extract binary string key from analog biometrics templates, it shows lower performance in stolen-token scenario due to dependency of the token. In this paper, to overcome this limitation, we suggest a new method of generating security key from face image and user intervention. Using BioHashing and GPT schemes, our scheme can adjust dependency of PIN for user authentication and generate robust key with sufficient length. We perform various experiments to show performance of the proposed scheme.

TG-SPSR: A Systematic Targeted Password Attacking Model

  • Zhang, Mengli;Zhang, Qihui;Liu, Wenfen;Hu, Xuexian;Wei, Jianghong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2674-2697
    • /
    • 2019
  • Identity authentication is a crucial line of defense for network security, and passwords are still the mainstream of identity authentication. So far trawling password attacking has been extensively studied, but the research related with personal information is always sporadic. Probabilistic context-free grammar (PCFG) and Markov chain-based models perform greatly well in trawling guessing. In this paper we propose a systematic targeted attacking model based on structure partition and string reorganization by migrating the above two models to targeted attacking, denoted as TG-SPSR. In structure partition phase, besides dividing passwords to basic structure similar to PCFG, we additionally define a trajectory-based keyboard pattern in the basic grammar and introduce index bits to accurately characterize the position of special characters. Moreover, we also construct a BiLSTM recurrent neural network classifier to characterize the behavior of password reuse and modification after defining nine kinds of modification rules. Extensive experimental results indicate that in online attacking, TG-SPSR outperforms traditional trawling attacking algorithms by average about 275%, and respectively outperforms its foremost counterparts, Personal-PCFG, TarGuess-I, by about 70% and 19%; In offline attacking, TG-SPSR outperforms traditional trawling attacking algorithms by average about 90%, outperforms Personal-PCFG and TarGuess-I by 85% and 30%, respectively.

Recovery Phrase Management Scheme for Public Blockchain Wallets based on OTP (공용 블록체인 지갑을 위한 OTP 기반 계정 복구 문자열 관리 체계)

  • Song, Seounghan;Kim, Suntae;Shin, Jung-Hoon;Lee, Jeong-Hyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.1
    • /
    • pp.35-44
    • /
    • 2020
  • The growing use of public blockchain-based virtual cryptocurrency calls for secure management of blockchain account information managed through cryptocurrency wallet programs. The previously proposed wallet program has high security in terms of managing an account's private key, but low security in managing an account's recovery phrase. Therefore, in this paper, we propose a safe management system of blockchain account recovery string based on the new user authentication method using the user's mobile device information and OTP technique to overcome the problem of the existing account recovery string management method. It also conducts an analysis of the proposed blockchain account recovery string management system based on the expected behavior scenario.

Theoretical modelling of post - buckling contact interaction of a drill string with inclined bore-hole surface

  • Gulyayev, V.I.;Andrusenko, E.N.;Shlyun, N.V.
    • Structural Engineering and Mechanics
    • /
    • v.49 no.4
    • /
    • pp.427-448
    • /
    • 2014
  • At present, the time of easy oil and gas is over. Now, the largest part of fossil fuels is concentrated in the deepest levels of tectonic structures and in the sea shelves. One of the most cumbersome operations of their extraction is the bore-hole drilling. In connection with austere tectonic and climate conditions, their drivage every so often is associated with great and diversified technological difficulties causing emergencies on frequent occasions. As a rule, they are linked with drill string accidents. A key role in prediction of these situations should play methods of theoretical modelling. For this reason, there is a growing need for development and implementation of new numerical methods for computer simulation of critical and post-critical behavior of drill strings (DSs). In this paper, the processes of non-linear deforming of a DS in cylindrical cavity of a deep bore-hole are considered. On the basis of the theory of curvilinear flexible rods, non-linear constitutive differential equations are deduced. The effects of the longitudinal non-uniform preloading, action of torque and interaction between the DS and the bore-hole surface are taken into account. Owing to the use of curvilinear coordinates in the constraining cylindrical surface and a specially chosen concomitant reference frame, it became possible to separate the desired variables and to reduce the total order of the equation system. To solve it, the method of continuation the solution by parameter and the transfer matrix technique are applied. As a result of the completed numerical analysis, the critical states of the DS loading in the cylindrical channels of inclined bore-holes are found. It is shown that the modes of the post-critical deforming of the DS are associated with its irregular spiral curving prevailing in the zone of bottom-hole-assembly. The possibility of invariant state generation during post-critical deforming is established, condition of its bifurcation is formulated. It is shown that infinite variety of loads can correspond to one geometrical configuration of the DS. They differ each from other by contact force functions.

Damage detection for beam structures using an angle-between-string-and-horizon flexibility matrix

  • Yan, Guirong;Duan, Zhongdong;Ou, Jinping
    • Structural Engineering and Mechanics
    • /
    • v.36 no.5
    • /
    • pp.643-667
    • /
    • 2010
  • The classical flexibility difference method detects damage by observing the difference of conventional deflection flexibility matrices between pre- and post-damaged states of a structure. This method is not able to identify multiple damage scenarios, and its criteria to identify damage depend upon the boundary conditions of structures. The key point behind the inability and dependence is revealed in this study. A more feasible flexibility for damage detection, the Angle-between-String-and-Horizon (ASH) flexibility, is proposed. The physical meaning of the new flexibility is given, and synthesis of the new flexibility matrix by modal frequencies and translational mode shapes is formulated. The damage indicators are extracted from the difference of ASH flexibility matrices between the pre- and post-damaged structures. One feature of the ASH flexibility is that the components in the ASH flexibility matrix are associated with elements instead of Nodes or DOFs. Therefore, the damage indicators based on the ASH flexibility are mapped to structural elements directly, and thus they can pinpoint the damaged elements, which is appealing to damage detection for complex structures. In addition, the change in the ASH flexibility caused by damage is not affected by boundary conditions, which simplifies the criteria to identify damage. Moreover, the proposed method can determine relatively the damage severity. Because the proposed damage indicator of an element mainly reflects the deflection change within the element itself, which significantly reduces the influence of the damage in one element on the damage indicators of other damaged elements, the proposed method can identify multiple damage locations. The viability of the proposed approach has been demonstrated by numerical examples and experimental tests on a cantilever beam and a simply supported beam.

Modified Edit Distance Method for Finding Similar Words in Various Smartphone Keypad Environment (다양한 스마트폰 키패드 환경에서 유사 단어 검색을 위한 수정된 편집 거리 계산 방법)

  • Song, Yeong-Kil;Kim, Hark-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.12-18
    • /
    • 2011
  • Most smartphone use virtual keypads based on touch-pad. The virtual keypads often make typographical errors because of the physical limitations of device such as small screen and limited input methods. To resolve this problem, many similar word-finding methods have been studied. In the paper, we propose an edit distance method (a well-known string similarity measure) that is modified to consider various types of virtual keypads. The proposed method effectively covers typographical errors in various keypads by converting an input string into a physical key sequence and by reflecting characteristics of virtual keypads to edit scores. In the experiments with various keypads, the proposed method showed better performances than a typical edit distance method.

Improvement of Practical Suffix Sorting Algorithm (실용적인 접미사 정렬 알고리즘의 개선)

  • Jeong, Tae-Young;Lee, Tae-Hyung;Park, Kun-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.2
    • /
    • pp.68-72
    • /
    • 2009
  • The suffix array is a data structure storing all suffixes of a string in lexicographical order. It is widely used in string problems instead of the suffix tree, which uses a large amount of memory space. Many researches have shown that not only the suffix array can be built in O(n), but also it can be constructed with a small time and space usage for real-world inputs. In this paper, we analyze a practical suffix sorting algorithm due to Maniscalco and Puglisi [1], and we propose an efficient algorithm which improves Maniscalco-Puglisi's running time.