• Title/Summary/Keyword: S/key

Search Result 10,062, Processing Time 0.032 seconds

The Key Management System using the Secret Sharing Scheme Applicable to Smart Card (스마트 카드에 적용 가능한 비밀분산법을 이용한 키 관리 시스템)

  • Son, Young-Seol;Lee, Dong-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.585-594
    • /
    • 2004
  • When several service providers want to work together with only one master key, they need to properly distribute the key to participants who come in for the co-work business and then securely manage the distributed keys. This paper describes the system that can efficiently and securely manage the master key on the basis of the secret sharing scheme that can reconstruct original secret information as the necessity of reconstructing original secret arises. The proposed system can distribute secret information to several groups and also redistribute the secret to subgroup in proportion to the participant's security level using smart card-based (t, t)-(k, n)-threshold secret scheme for securely keeping secret information and authentication of participant's identification.

Expression of Bacillus subtilis proBA Genes and Reduction of Feedback Inhibition of Proline Synthesis Increases Proline Production and Confers Osmotolerance in Transgenic Arabidopsis

  • Chen, Mingqing;Wei, Hongbo;Cao, JunWei;Liu, Ruijie;Wang, Youliang;Zheng, Congyi
    • BMB Reports
    • /
    • v.40 no.3
    • /
    • pp.396-403
    • /
    • 2007
  • Proline accumulation has been shown to correlate with tolerance to drought and salt stresses in plants. We attempt to introduce the wild-type, mutant, and fusion proBA genes derived from Bacillus subtilis into Arabidopsis thaliana under the control of a strong promoter cauliflower mosaic virus 35S (CaMV35S). The transgenic plants produced higher level of free proline than control and the overproduction of proline resulted in the increased tolerance to osmotic stress in transgenic plants. Besides, the mutation in proBA genes, which were proved to lead $\alpha$-glutamyl kinase ($\alpha$-GK) reduces sensitivity to the end-product inhibition and the fusion of proB and proA also result in increasing proline production and confer osmotolerance in transgenic lines.

Hybrid Cryptosystem based on Diffie-Hellman over Elliptic Curve (타원 곡선 상의 Diffie-Hellman 기반 하이브리드 암호 시스템)

  • 정경숙;정태충
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.4
    • /
    • pp.104-110
    • /
    • 2003
  • In this paper, we proposed hybrid cryptosystem of Diffie-Hellman base in Elliptic Curve, and explained for specific protocol design. The proposed system is efficient hybrid cryptosystems system that offer implicit key authentication about sender and receiver unlike existing hybrid system. This system increased safety generating session key using pseudo-random number generator by cryptographic. Because the system is hybrid system, it is more efficient in calculation amount aspect supplementing merit and fault of public key system and secret key system. Also, the system can not get right plaintext except receiver even if sender's secret key is revealed and impersonation attack is impossible. And the system offers security on known keys without influencing in safety of other session's cryptogram even if session key is exposed. And the system is provided safety about mutual entity authentication and replay attack.

  • PDF

Effect of Annealing Temperature on Soft Magnetic Properties of Cold Rolled 0.30 mm Thick Fe-6.5wt.%Si Foils

  • Fang, X.S.;Lin, J.P.;Liang, Y.F.;Ye, F.;Zhang, L.Q.;Chen, G.L.
    • Journal of Magnetics
    • /
    • v.16 no.2
    • /
    • pp.177-180
    • /
    • 2011
  • 0.30 mm thick and 90 mm wide thin foils made of Fe-6.5wt.%Si alloy were successfully fabricated by traditional rolling. The as-rolled sheets had good shapes and shining metal luster. The effects of annealing temperature on the magnetic properties of the sheets were investigated. Excellent Dc properties ($H_c$: 11.55 A/m, ${\mu}_m$: 23710, and $B_s$: 1.439 T) were obtained at an annealing temperature of 1453 K for 1.5 h. At low frequencies ($\leq$ 1 kHz), heat treatment temperature has little effect on iron loss which remained at the level of 9.8 W/kg. Annealing at 1273 K for 1.5 h is optimum for frequencies above 5 kHz.

Investigation on moisture migration of unsaturated clay using cross-borehole electrical resistivity tomography technique

  • Lei, Jiang;Chen, Weizhong;Li, Fanfan;Yu, Hongdan;Ma, Yongshang;Tian, Yun
    • Geomechanics and Engineering
    • /
    • v.25 no.4
    • /
    • pp.295-302
    • /
    • 2021
  • Cross-borehole electrical resistivity tomography (ERT) is an effective groundwater detection tool in geophysical investigations. In this paper, an artificial water injection test was conducted on a small clay sample, where the high-resolution cross-borehole ERT was used to investigate the moisture migration law over time. The moisture migration path can be two-dimensionally imaged based on the relationship between resistivity and saturation. The hydraulic conductivity was estimated, and the magnitude ranged from 10-11 m/s to 10-9 m/s according to the comparison between the simulation flow and the saturation distribution inferred from ERT. The results indicate that cross-borehole ERT could help determine the resistivity distribution of small size clay samples. Finally, the cross-borehole ERT technique has been applied to investigate the self-sealing characteristics of clay.

Secure Key Exchange Protocols against Leakage of Long-tenn Private Keys for Financial Security Servers (금융 보안 서버의 개인키 유출 사고에 안전한 키 교환 프로토콜)

  • Kim, Seon-Jong;Kwon, Jeong-Ok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.119-131
    • /
    • 2009
  • The world's widely used key exchange protocols are open cryptographic communication protocols, such as TLS/SSL, whereas in the financial field in Korea, key exchange protocols developed by industrial classification group have been used that are based on PKI(Public Key Infrastructure) which is suitable for the financial environments of Korea. However, the key exchange protocols are not only vulnerable to client impersonation attacks and known-key attacks, but also do not provide forward secrecy. Especially, an attacker with the private keys of the financial security server can easily get an old session-key that can decrypt the encrypted messages between the clients and the server. The exposure of the server's private keys by internal management problems, etc, results in a huge problem, such as exposure of a lot of private information and financial information of clients. In this paper, we analyze the weaknesses of the cryptographic communication protocols in use in Korea. We then propose two key exchange protocols which reduce the replacement cost of protocols and are also secure against client impersonation attacks and session-key and private key reveal attacks. The forward secrecy of the second protocol is reduced to the HDH(Hash Diffie-Hellman) problem.

Analyses of Formulas in "Key to Therapeutics of Children's Diseases (小兒藥證直訣)" (소아약증직결(小兒藥證直訣)의 처방분석(處方分析))

  • Cho, Hyun-Jin;Park, Ki-Jeong;Park, Sun-Dong
    • Herbal Formula Science
    • /
    • v.19 no.2
    • /
    • pp.119-133
    • /
    • 2011
  • Objectives : This study aimed to reveal the characteristics of formulas in "Key to Therapeutics of Children's Diseases" by analysis of crude drugs that constitute formulas. Methods : To analyze the formulas, We classified the formulas to presenting symptom classification. And within that categories, the crude drugs in formulas were diagrammatized. Results : After those analyses, we brought a conclusion as like these. 1. The formulas classified into some categories that include chronic consumption disease, parasitization, digestive system disease, febricity, infectious disease, respiratory disease, skin disease, infirmity and etc. 2. We analyzed the characteristic of formulas by categorization of crude drug combination. In this way, we recognized that Qian Yi(錢乙) frequently used cold crude drugs unlike the trend of S$\grave{o}$ng(宋) dynasty doctors. 3. The prescription that described in "Key to Therapeutics of Children's Diseases" can be found in "Treasured Mirror of Eastern Medicine(東醫寶鑑)" and the other books on posterity. Conclusions : Through these researches, we verified that Qian Yi affect cold herbal and mineral drugs. This tendency of Qian Yi have an effect on the Nourish yin school. And several decades of formulas of "Key to Therapeutics of Children's Diseases" contain in part of pediatrics on "Treasured Mirror of Eastern Medicine". We reconfirmed that Qian Yi affected profound influence on the development of pediatrics and Nourish yin school.

Secure private key exchange method based on optical interferometry using biometric finger print (생체 지문을 이용한 광학 간섭계에 기반한 안전한 개인키 교환 기법)

  • Jeon, Seok-Hee;Gil, Sang-Keun
    • Journal of IKEEE
    • /
    • v.25 no.1
    • /
    • pp.42-46
    • /
    • 2021
  • A novel key exchange cryptographic method utilizing biometric finger print as a user's private key is proposed. Each unknown users' finger print is encrypted by optical phase-shifting interferometry principle and is changed into two ciphers, which are exchanged with the other party over a public communication network for secret key sharing. The transmitted ciphers generate a complex hologram, which is used to calculate a shared secret key for each user. The proposed method provides high security when applied to a secret key sharing encryption system.

A Curriculum of a Subject of Enneagram for Developing Key Competency of University Students

  • Park, Jongjin
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.346-351
    • /
    • 2022
  • This paper is to propose a curriculum of a subject of Enneagram which is to be open to develop key competency of university students. In the modern days of the 4th industrial revolution universities are being called for key competency-based education and innovation in education. Universities suggested various key competencies according to the university's founding philosophies. And they have been reorganizing the liberal arts curriculum in a way that it can reinforce key competencies of the students in the aspect of liberal arts education. In this paper, an example of C university which has 3 key competencies such as, citizenship, character, and creative intelligence was presented. Enneagram is a good candidate for developing self-development which is sub-competency of character.

Identification of a Novel Human Lysophosphatidic Acid Acyltransferase, LPAAT-theta, Which Activates mTOR Pathway

  • Tang, Wenwen;Yuan, Jian;Chen, Xinya;Gu, Xiuting;Luo, Kuntian;Li, Jie;Wan, Bo;Wang, Yingli;Yu, Long
    • BMB Reports
    • /
    • v.39 no.5
    • /
    • pp.626-635
    • /
    • 2006
  • Lysophosphatidic acid acyltransferase (LPAAT) is an intrinsic membrane protein that catalyzes the synthesis of phosphatidic acid (PA) from lysophosphatidic acid (LPA). It is well known that LPAAT is involved in lipid biosynthesis, while its role in tumour progression has been of emerging interest in the last few years. To date, seven members of the LPAAT gene family have been found in human. Here we report a novel LPAAT member, designated as LPAAT-theta, which was 2728 base pairs in length and contained an open reading frame (ORF) encoding 434 amino acids. The LPAAT-theta gene consisted of 12 exons and 11 introns, and mapped to chromosome 4q21.23. LPAAT-theta was ubiquitously expressed in 18 human tissues by RT-PCR analysis. Subcellular localization of LPAAT-theta-EGFP fusion protein revealed that LPAAT-theta was distributed primarily in the endoplasmic reticulum (ER) of COS-7 cells. Furthermore, we found that the overexpression of LPAAT-theta can induce mTOR-dependent p70S6K phosphorylation on Thr389 and 4EBP1 phosphorylation on Ser65 in HEK293T cells.