• Title/Summary/Keyword: Random Number Generator

Search Result 150, Processing Time 0.041 seconds

Signal-Dependent Chaotic-State-Modulated Digital Secure Communication

  • Farooq, Omar;Datta, Sekharjit
    • ETRI Journal
    • /
    • v.28 no.2
    • /
    • pp.250-252
    • /
    • 2006
  • In this letter, a discrete state, discrete time chaotic pseudo random number generator (CPRNG) is presented for stream ciphering of text, audio, or image data. The CPRNG is treated as a finite state machine, and its state is modulated according to the input bit sequence of the signal to be encrypted. The modulated state sequence obtained can be transmitted as a spread spectrum or encrypted data.

  • PDF

Random Number Generator using Time Stamp Counter Register (타임 스템프 카운터 레지스터를 사용한 난수 발생기)

  • 이정희;표창우
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.322-324
    • /
    • 2004
  • 보안 시스템은 암호화 기능을 필요로 하고 암호화를 위 한 비밀키로 난수를 사용한다 난수 발생기에는 순수 난수 발생기와 의사 난수 발생기가 있다. 본 논문에서는 펜티엄부터 인텔 프로세서들이 가지고 있는 타임스탬프 카운터 레지스터(TSC MSR)에서 시드를 가져와 비트 가공을 통해 난수를 발생하는 난수 발생기를 구현하였다. 구현된 난수 발생기의 난수 품질을 평가하기 위해 순수 난수 발생기, 의사 난수 발생기의 난수 시퀀스와 비교하였다. 구현된 난수 발생기가 생성한 난수 시퀀스는 순수 난수 발생기의 난수 시퀀스와 큰 차이가 없고 특정 디바이스 없이 응용이 간단하다는 점에서 보안 시스템의 암호화키로 사용하기에 적합하다.

  • PDF

Research of Pseudo-Random Number Generator for Cryptography in Client-Server Environment (클라이언트-서버 환경에서 암호계를 위한 의사 난수 발생에 대한 연구)

  • 김도완;정태충
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10a
    • /
    • pp.649-651
    • /
    • 1999
  • 본 논문에서는 각종 암호계에 중요하게 이용되는 난수를 클라이언트-서버 환경에서 생성하는 방법에 대해 연구하였다. 완벽하게 랜덤으로 생성되는 난수를 만든다는 것은 불가능하므로, 난수를 발생시키는 알고리즘의 목표는, 입수할 수 있는 정보만으로는 예측 불가능한 랜덤성을 가지는 것이다. 여기서는 클라이언트-서버 환경의 특징을 이용해 돌연변이를 만들어 좀 더 강한 랜덤성을 지니는 난수의 생성을 조합 시프트 레지스터를 이용해 연구하였다.

  • PDF

A Study on the Credible Simulation Results of Telecommunication Networks (통신 네트워크에 대한 시뮬레이션 수행결과의 신뢰도에 관한 연구)

  • 이종숙;박형우;정해덕
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.175-177
    • /
    • 2003
  • 본 논문에서는 신뢰도가 높은 시뮬레이션 최종결과를 얻기 위한 2가지 중요 요건인 (1) 독립적이고 균일하게 분포된(independent and uniformly distributed) 난수를 발생시키는 적절한 난수 발생기(pseudo-random number generator)의 사용과 (2) 적절한 시뮬레이션 데이터의 분석 기법에 대해서 고려하였다. 통신 네트워크 분야의 저명한 논문지들에 발표된 논문들을 조사하였다. 조사한 결과에 의하면 컴퓨터 시뮬레이션 기법이 아주 일반적인 연구 기법으로 사용되어지고 있었으나, 시뮬레이션이 통계적 실험임을 고려하지 않은 결과물도 아주 많았다. 따라서, 본 논문에서는 시뮬레이션 결과의 신뢰도를 높이기 위한 지침을 언급하였다.

  • PDF

Performance of privacy Amplification in Quantum Key Distribution Systems (양자 키 분배 시스템에서 보안성 증폭의 성능 분석)

  • Lee, Sun-Yui;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.111-116
    • /
    • 2018
  • This paper introduces the concept of a random universal hash function to amplify security in a quantum key distribution system. It seems to provide security amplification using the relationship between quantum error correction and security. In addition, the approach in terms of security amplification shows that phase error correction offers better security. We explain how the universal hash function enhances security using the BB84 protocol, which is a typical example of QKD(Quantum Key Distribution). Finally, we show that the BB84 protocol using random privacy amplification is safe at higher key rates than Mayers' performance at the same error rate.

Analytic simulator and image generator of multiple-scattering Compton camera for prompt gamma ray imaging

  • Kim, Soo Mee
    • Biomedical Engineering Letters
    • /
    • v.8 no.4
    • /
    • pp.383-392
    • /
    • 2018
  • For prompt gamma ray imaging for biomedical applications and environmental radiation monitoring, we propose herein a multiple-scattering Compton camera (MSCC). MSCC consists of three or more semiconductor layers with good energy resolution, and has potential for simultaneous detection and differentiation of multiple radio-isotopes based on the measured energies, as well as three-dimensional (3D) imaging of the radio-isotope distribution. In this study, we developed an analytic simulator and a 3D image generator for a MSCC, including the physical models of the radiation source emission and detection processes that can be utilized for geometry and performance prediction prior to the construction of a real system. The analytic simulator for a MSCC records coincidence detections of successive interactions in multiple detector layers. In the successive interaction processes, the emission direction of the incident gamma ray, the scattering angle, and the changed traveling path after the Compton scattering interaction in each detector, were determined by a conical surface uniform random number generator (RNG), and by a Klein-Nishina RNG. The 3D image generator has two functions: the recovery of the initial source energy spectrum and the 3D spatial distribution of the source. We evaluated the analytic simulator and image generator with two different energetic point radiation sources (Cs-137 and Co-60) and with an MSCC comprising three detector layers. The recovered initial energies of the incident radiations were well differentiated from the generated MSCC events. Correspondingly, we could obtain a multi-tracer image that combined the two differentiated images. The developed analytic simulator in this study emulated the randomness of the detection process of a multiple-scattering Compton camera, including the inherent degradation factors of the detectors, such as the limited spatial and energy resolutions. The Doppler-broadening effect owing to the momentum distribution of electrons in Compton scattering was not considered in the detection process because most interested isotopes for biomedical and environmental applications have high energies that are less sensitive to Doppler broadening. The analytic simulator and image generator for MSCC can be utilized to determine the optimal geometrical parameters, such as the distances between detectors and detector size, thus affecting the imaging performance of the Compton camera prior to the development of a real system.

Security Improvement of Authentication Method Using Transfer Agent in USN

  • Cho, Do-Eun
    • International Journal of Contents
    • /
    • v.7 no.4
    • /
    • pp.35-43
    • /
    • 2011
  • USN is a technology to detect human external environment. It is an important factor in buildinga ubiquitous computing environment. In this thesis, an authentication method was proposed to allow the sensor nodes, which have weak computing operation capability, to safely communicate with each other in USN and guarantee the anonymity of users for their privacy. In the proposed authentication method that takes into account the characteristics of sensor network, sensor nodes based on a symmetric key algorithm do not transfer keys directly, instead, they mix the random numbers received from AS to generate keys necessary for communications, having a master key and a pseudo-random number generator.In addition, in this thesis, TA was adopted to minimize the leakage of users' information, and a scheme through which virtual IDs received from AS are delivered to sensor nodes was applied to improve anonymity.

A Study of Statistical Analysis of Rock Joint Directional Data (암반 절리 방향성 자료의 통계적 분석 기법에 관한 연구)

  • 류동우;김영민;이희근
    • Tunnel and Underground Space
    • /
    • v.12 no.1
    • /
    • pp.19-30
    • /
    • 2002
  • Rock joint orientation is one of important geometric attributes that have an influence on the stability of rock structures such as rock slopes and tunnels. Especially, statistical models of the geometric attributes of rock joints can provide a probabilistic approach of rock engineering problems. The result from probabilistic modeling relies on the choice of statistical model. Therefore, it is critical to define a representative statistical model for joint orientation data as well as joint size and intensity and build up a series of modeling procedure including analytical validation. In this paper, we have examined a theoretical methodology for the statistical estimate and hypothesis analysis based upon Fisher distribution and bivariate normal distribution. In addition, we have proposed the algorithms of random number generator which is applied to the simulation of rock joint networks and risk analysis.

Design of Control Block for Passive UHF RFID Tag IC (수동형 UHF대역 RFID 태그 IC의 제어부 설계)

  • Woo, Cheol-Jong;Cha, Sang-Rok;Kim, Hak-Yun;Choi, Ho-Yong
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.9
    • /
    • pp.41-49
    • /
    • 2008
  • This paper presents a design of the control block of a passive UHF RFID tag IC according to EPCglobal Class-1 Generation-2 UHF RFID 1.1.0 Protocol. The control block includes a PIE block, CRC5/CRC16, a Slot Counter, a Random Number Generator, a Main Control Block, a Encoder and a Memory Interface. The control block has been designed using the Verilog HDL and has been simulated. Functional simulation results for the overall control block operation show that 11 instructions with 7 states are operated correctly. Also, the control block has been implemented with 36,230 gates by Synopsys Design Compiler and Apollo using Magnachip 0.25$\mu$m technology.