• 제목/요약/키워드: Key Uniqueness

검색결과 62건 처리시간 0.02초

소수 코드를 이용한 블록 암호화 알고리즘 (A BLOCK CRYPTOGRAPHIC ALGORITHM BASED ON A PRIME CODE)

  • 송문빈;오재곤;정연모
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 추계종합학술대회 논문집(2)
    • /
    • pp.136-139
    • /
    • 2000
  • In this paper, we propose a prime code and a new cryptographic algorithm for encryption and decryption as its application. The characteristics of prime numbers with irregular distribution and uniqueness are used to generate the prime code. Based on the prime code, an encryption algorithm for secret key is presented. Since the algorithm requires simpler operations than existing encryption such as DES, the burden for hardware implementation of the encryption and decryption process is alleviated.

  • PDF

GLOBAL AXISYMMETRIC SOLUTIONS TO THE 3D NAVIER-STOKES-POISSON-NERNST-PLANCK SYSTEM IN THE EXTERIOR OF A CYLINDER

  • Zhao, Jihong
    • 대한수학회보
    • /
    • 제58권3호
    • /
    • pp.729-744
    • /
    • 2021
  • In this paper we prove global existence and uniqueness of axisymmetric strong solutions for the three dimensional electro-hydrodynamic model based on the coupled Navier-Stokes-Poisson-Nernst-Planck system in the exterior of a cylinder. The key ingredient is that we use the axisymmetry of functions to derive the Lp interpolation inequalities, which allows us to establish all kinds of a priori estimates for the velocity field and charged particles via several cancellation laws.

QUALITATIVE ANALYSIS OF ABR-FRACTIONAL VOLTERRA-FREDHOLM SYSTEM

  • Shakir M. Atshan;Ahmed A. Hamoud
    • Nonlinear Functional Analysis and Applications
    • /
    • 제29권1호
    • /
    • pp.113-130
    • /
    • 2024
  • In this work, we explore the existence and uniqueness results for a class of boundary value issues for implicit Volterra-Fredholm nonlinear integro-differential equations (IDEs) with Atangana-Baleanu-Riemann fractional (ABR-fractional) that have non-instantaneous multi-point fractional boundary conditions. The findings are supported by Krasnoselskii's fixed point theorem, Gronwall-Bellman inequality, and the Banach contraction principle. Finally, a demonstrative example is provided to support our key findings.

Tradeoff between Energy-Efficiency and Spectral-Efficiency by Cooperative Rate Splitting

  • Yang, Chungang;Yue, Jian;Sheng, Min;Li, Jiandong
    • Journal of Communications and Networks
    • /
    • 제16권2호
    • /
    • pp.121-129
    • /
    • 2014
  • The trend of an increasing demand for a high-quality user experience, coupled with a shortage of radio resources, has necessitated more advanced wireless techniques to cooperatively achieve the required quality-of-experience enhancement. In this study, we investigate the critical problem of rate splitting in heterogeneous cellular networks, where concurrent transmission, for instance, the coordinated multipoint transmission and reception of LTE-A systems, shows promise for improvement of network-wide capacity and the user experience. Unlike most current studies, which only deal with spectral efficiency enhancement, we implement an optimal rate splitting strategy to improve both spectral efficiency and energy efficiency by exploring and exploiting cooperation diversity. First, we introduce the motivation for our proposed algorithm, and then employ the typical cooperative bargaining game to formulate the problem. Next, we derive the best response function by analyzing the dual problem of the defined primal problem. The existence and uniqueness of the proposed cooperative bargaining equilibrium are proved, and more importantly, a distributed algorithm is designed to approach the optimal unique solution under mild conditions. Finally, numerical results show a performance improvement for our proposed distributed cooperative rate splitting algorithm.

Implementation and characterization of flash-based hardware security primitives for cryptographic key generation

  • Mi-Kyung Oh;Sangjae Lee;Yousung Kang;Dooho Choi
    • ETRI Journal
    • /
    • 제45권2호
    • /
    • pp.346-357
    • /
    • 2023
  • Hardware security primitives, also known as physical unclonable functions (PUFs), perform innovative roles to extract the randomness unique to specific hardware. This paper proposes a novel hardware security primitive using a commercial off-the-shelf flash memory chip that is an intrinsic part of most commercial Internet of Things (IoT) devices. First, we define a hardware security source model to describe a hardware-based fixed random bit generator for use in security applications, such as cryptographic key generation. Then, we propose a hardware security primitive with flash memory by exploiting the variability of tunneling electrons in the floating gate. In accordance with the requirements for robustness against the environment, timing variations, and random errors, we developed an adaptive extraction algorithm for the flash PUF. Experimental results show that the proposed flash PUF successfully generates a fixed random response, where the uniqueness is 49.1%, steadiness is 3.8%, uniformity is 50.2%, and min-entropy per bit is 0.87. Thus, our approach can be applied to security applications with reliability and satisfy high-entropy requirements, such as cryptographic key generation for IoT devices.

Key Strike Forces and Their Relation to High Level of Musculoskeletal Symptoms

  • Levanon, Yafa;Gefen, Amit;Lerman, Yehuda;Portnoy, Sigal;Ratzon, Navah Z.
    • Safety and Health at Work
    • /
    • 제7권4호
    • /
    • pp.347-353
    • /
    • 2016
  • Background: This study aimed to investigate the relation between key strike forces and musculoskeletal symptoms (MSS). Moreover, this study presents a key strike force measurement method to be used in a workplace setting. The correlation between key strike force characteristics and MSS was previously studied, but the measurement methods used either a single-key switch or force platforms applied under the keyboard. Most of the studies were conducted in a laboratory setting. The uniqueness of measurement methods in the current study is their ability to measure forces applied to a specific key in a workplace setting and to provide more information about specific key strike forces during typing. Methods: Twenty-four healthy computer workers were recruited for the study. The demographic questionnaire, and self-reported questionnaires for psychosocial status (General Nordic Questionnaire for Psychological and Social Factors at Work) and for detecting MSS were filled up, which later helped in dividing the participants into two groups (12 participants with pain and 12 without pain). Participants typed a predetermined text that utilized the instrumented keys multiple times. The dynamic forces applied to the keys were recorded and collected, using four thin and flexible force sensors attached to the preselected keys according to their location. Results: The results demonstrated that participants with high levels of MSS, specifically in the back and neck, in the last year exerted significantly higher key strike forces than those with lower levels of symptoms (p < 0.005). Conclusion: The key strike force exerted while typing on a keyboard may be a risk factor for MSS, and should therefore be considered in ergonomic evaluations and interventional programs.

형상 특징자 기반 강인성 3D 모델 해싱 기법 (Robust 3D Model Hashing Scheme Based on Shape Feature Descriptor)

  • 이석환;권성근;권기룡
    • 한국멀티미디어학회논문지
    • /
    • 제14권6호
    • /
    • pp.742-751
    • /
    • 2011
  • 본 논문에서는 형상 특징자인 열 커널 인증 (Heat Kernel Signature, HKS)를 기반으로 강인한 3D 모델 해싱을 제안한다. 키와 매개변수에 의존한 형상 특징자 기반 3D 모델 해싱을 제안한다. 제안한 방법에서는 Mesh Laplace 연산자의 고유치와 고유벡터에 의하여 각 꼭지점에 대한 전역 및 국부 타임 HKS 계수를 구한 다음, 이 계수들을 정방형 2D 셀로 군집화한다. 그리고 각 셀에 할당된 HKS 계수 쌍의 거리 가중치 기반으로 정의된 특징계수와 랜덤 계수 키와의 조합에 의하여 중간 해쉬 계수를 생성한 다음, 이진화 과정에 의하여 최종 이진 해쉬를 생성한다. 본 실험에서는 3D 범용 툴을 이용한 다양한 기하하적 공격과 위상학적 공격을 통하여 강인성을 평가하였고, 모델과 키 조합에 대한 해쉬의 유일성을 평가하였다. 또한 인증 범위를 만족히는 공격 세기를 측정함으로써 모델 공간성을 평가하였다. 실험결과로부터 제안한 3D 모델 해싱이 기존 해싱에 비하여 강인성 모델 공간성 및 유일성이 우수함을 확인하였다.

현대 패션 비평 특성에 관한 연구 (A Study on the Characteristics of Contemporary Fashion Criticism)

  • 박수진;하지수
    • 한국의류학회지
    • /
    • 제47권3호
    • /
    • pp.459-474
    • /
    • 2023
  • Contemporary fashion criticism tends to rely solely on the established art criticism process without consideration of the distinctive characteristics of fashion. Thus, this study aims to reveal the unique roles and characteristics of fashion criticism by recognizing it as an independent field in contemporary art with its own social significance. This study will first apply traditional art criticism models to analyze and explore contemporary fashion criticism's empirical content before uncovering the uniqueness of contemporary fashion criticism by content analysis. Contemporary fashion criticism discusses not just physical objects but various topics and ideas, as well. Accordingly, the existing criticism model was modified in this study to fit contemporary fashion criticism and organized into five stages: description of historical fashion, form description, external evaluation, interpretation, and internal evaluation. Commerciality, the human body, coordination, the critic's individuality, trends, and fashion-related persons were identified as key factors of contemporary fashion criticism's uniqueness. In conclusion, rather than build a single contemporary fashion model, this study found it more effective to create individual fashion criticism models suitable for detailed fields, as these enable the discussion of multifaceted topics in the fashion field. This study is expected to serve a meaningful guide for the fashion discourses.

Shear lag prediction in symmetrical laminated composite box beams using artificial neural network

  • Chandak, Rajeev;Upadhyay, Akhil;Bhargava, Pradeep
    • Structural Engineering and Mechanics
    • /
    • 제29권1호
    • /
    • pp.77-89
    • /
    • 2008
  • Presence of high degree of orthotropy enhances shear lag phenomenon in laminated composite box-beams and it persists till failure. In this paper three key parameters governing shear lag behavior of laminated composite box beams are identified and defined by simple expressions. Uniqueness of the identified key parameters is proved with the help of finite element method (FEM) based studies. In addition to this, for the sake of generalization of prediction of shear lag effect in symmetrical laminated composite box beams a feed forward back propagation neural network (BPNN) model is developed. The network is trained and tested using the data base generated by extensive FEM studies carried out for various b/D, b/tF, tF/tW and laminate configurations. An optimum network architecture has been established which can effectively learn the pattern. Computational efficiency of the developed ANN makes it suitable for use in optimum design of laminated composite box-beams.

Physical Layer Technique to Assist Authentication Based on PKI for Vehicular Communication Networks

  • Wen, Hong;Ho, Pin-Han
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권2호
    • /
    • pp.440-456
    • /
    • 2011
  • In this paper, we introduce a novel Public Key Infrastructure (PKI) based message authentication scheme that takes advantage of temporal and spatial uniqueness in physical layer channel responses for each transmission pair in vehicular communication networks. The proposed scheme aims at achieving fast authentication and minimizing the packet transmission overhead without compromising the security requirements, in which most messages can be authenticated through an extreme fast physical-layer authentication mechanism. We will demonstrate that the proposed secure authentication scheme can achieve very short message delay and reduced communication overhead through extensive analysis and simulation.