• Title/Summary/Keyword: S/key

Search Result 10,062, Processing Time 0.038 seconds

Research of Secret Communication Using Quantum key Distribution and AES (양자키 교환과 AES를 이용한 비밀통신 연구)

  • Choung, Young-Chul;Rim, Kwang-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.84-90
    • /
    • 2014
  • Secret communication has developed from analogue communication to digital one. Secret communication which is based on digital communication has been designed succeeding safety of one-time pad. One-time pad's safety is attributed to the security of secret key's mutual storage and mutual synchronization that is the key's interchange basis is one of the essential factors. This manuscript examines mathematical stability of BB84 algorithm which is one of the quantum cryptography system, and conducts transmission of quantum key. The created key suggests One-time Pad algorithm which interchanges ciphertext implemented AES's 64th round.

The Key Success Factors of Design-oriented New Product Development Strategy : A Case Study of Chocolate-Phone (디자인 중심 신제품 개발 전략의 성공 요인 : 초콜릿 폰 개발 사례를 중심으로)

  • Ryu, Sung-Il;Kim, Jin-Woo;Jang, Seong-Keun
    • Korean Management Science Review
    • /
    • v.24 no.1
    • /
    • pp.1-24
    • /
    • 2007
  • The function of product design has been an important part for success on new product development. We deeply studied 'Chocolate-Phone' case which is considered as a representative of adopting design-oriented new product development strategy. According to this study, we found three contextual factors and nine key success factors for design-oriented new product development. The contextual factors consist of the strong needs for innovative product development, customer's needs for the emotional value, competitive situation for the new product launching. The key success factors consist of design, development, marketing, overall sides. The key success factors of design side are to select talented designers and take an insight for market and communication skill. The key success factors of development side are to possess high technological abilities, to do divergence with removing or giving up some function, management's strong support. The key success factors of marketing side are to bring core marketers from outside, capacity to gather ideas from outside. The key success factors of overall side are to share design-oriented principle with other functions and to change member's mind from engineer-oriented to market-oriented.

OTP-EKE: A Key Exchange Protocol based on One-Time-Password (OTP-EKE:원-타임-패스워드 기반의 키 고환 프로토콜)

  • Seo, Seung-Hyun;Cho, Tae-Nam;Lee, Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.5
    • /
    • pp.291-298
    • /
    • 2002
  • Mutual authentication is essential for key exchange protocols and password-based authentication scheme is used widely, which is convenient to users and executed on the cheap. Password-based protocol should be not only secure against attach but also efficient to reduce user's load. In this paper, we propose a new key exchange protocol, called OTP-EKE(One Time Password based Encrypted Key Exchange), to provide authentication and to share a session key between a server and a user. We choose a password-based scheme as a user authentication. Especially, we use a one-time-password verifier and server's public password to protect against attacks on server's directory. As for efficiency, we improve the performance by reducing the number of modular exponentiations and the number of rounds.

Optimization of membrane fouling process for mustard tuber wastewater treatment in an anoxic-oxic biofilm-membrane bioreactor

  • Chai, Hongxiang;Li, Liang;Wei, Yinghua;Zhou, Jian;Kang, Wei;Shao, Zhiyu;He, Qiang
    • Environmental Engineering Research
    • /
    • v.21 no.2
    • /
    • pp.196-202
    • /
    • 2016
  • Membrane bioreactor (MBR) technology has previously been used by water industry to treat high salinity wastewater. In this study, an anoxic-oxic biofilm-membrane bioreactor (AOB-MBR) system has been developed to treat mustard tuber wastewater of 10% salinity (calculated as NaCl). To figure out the effects of operating conditions of the AOB-MBR on membrane fouling rate ($K_V$), response surface methodology was used to evaluate the interaction effect of the three key operational parameters, namely time interval for pump (t), aeration intensity ($U_{Gr}$) and transmembrane pressure (TMP). The optimal condition for lowest membrane fouling rate ($K_V$) was obtained: time interval was 4.0 min, aeration intensity was $14.6 m^3/(m^2{\cdot}h)$ and transmembrane pressure was 19.0 kPa. And under this condition, the treatment efficiency with different influent loads, i.e. 1.0, 1.9 and $3.3kgCODm^{-3}d^{-1}$ was researched. When the reactor influent load was less than $1.9kgCODm^{-3}d^{-1}$, the effluent could meet the third discharge standard of "Integrated Wastewater Discharge Standard". This study suggests that the model fitted by response surface methodology can predict accurately membrane fouling rate within the specified design space. And it is feasible to apply the AOB-MBR in the pickled mustard tuber factory, achieving satisfying effluent quality.

Quantum Cryptanalysis for DES Through Attack Cost Estimation of Grover's Algorithm (Grover 알고리즘 공격 비용 추정을 통한 DES에 대한 양자 암호 분석)

  • Jang, Kyung-bae;Kim, Hyun-Ji;Song, Gyeong-Ju;Sim, Min-Ju;Woo, Eum-Si;Seo, Hwa-Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1149-1156
    • /
    • 2021
  • The Grover algorithm, which accelerates the brute force attack, is applicable to key recovery of symmetric key cryptography, and NIST uses the Grover attack cost for symmetric key cryptography to estimate the post-quantum security strength. In this paper, we estimate the attack cost of Grover's algorithm by implementing DES as a quantum circuit. NIST estimates the post-quantum security strength based on the attack cost of AES for symmetric key cryptography using 128, 192, and 256-bit keys. The estimated attack cost for DES can be analyzed to see how resistant DES is to attacks from quantum computers. Currently, since there is no post-quantum security index for symmetric key ciphers using 64-bit keys, the Grover attack cost for DES using 64-bit keys estimated in this paper can be used as a standard. ProjectQ, a quantum programming tool, was used to analyze the suitability and attack cost of the quantum circuit implementation of the proposed DES.

Secure Key Distribution Protocol for ZigBee Wireless Sensor Network (ZigBee 무선 센서 네트워크에서의 안전한 키 분배 프로토콜)

  • Oh, Su-Min;Choi, Soo-Kyeong;Kwon, Ye-Jin;Park, Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.745-759
    • /
    • 2012
  • It is shown in this paper that Yuksel-Nielson's key distribution scheme is not secure against key de-synchronization attack even though their scheme supplement ZigBee-2007 specification's security problems. Furthermore, a new key distribution scheme is proposed, which is the one to fix the security weakness of Yuksel-Nielson's scheme, as well as its security and performance analysis to verify its effectiveness.

A Modular On-the-fly Round Key Generator for AES Cryptographic Processor (AES 암호 프로세서용 모듈화된 라운드 키 생성기)

  • Choi Byeong-Yoon;Lee Jong-Hyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.1082-1088
    • /
    • 2005
  • Generating fast round key in AES Rijndael algorithm using three key sizes, such as 128, 192, and 256-bit keys is a critical factor to develop high throughput AES processors. In this paper, we propose on-the-fly round key generator which is applicable to the pipelined and non-pipelined AES processor in which cipher and decipher nodes must be implemented on a chip. The proposed round key generator has modular and area-and-time efficient structure implemented with simple connection of two key expander modules, such as key_exp_m and key_exp_s module. The round key generator for non-pipelined AES processor with support of three key lengths and cipher/decipher modes has about 7.8-ns delay time under 0.25um 2.5V CMOS standard cell library and consists of about 17,700 gates.

A Study on the Role of Construction Management in the Construction Turn-Key Projects (턴키사업과 CM의 역할)

  • Kim Kyung-Nam;Kim Jong-Hoon
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.223-232
    • /
    • 2002
  • The government, in order to settle and activate the use of Construction Management (CM) method, clarified the legal Issues pertaining to infrastructure development and is taking an active role to promote CM through government sponsored pilot projects. However, when a CM method is applied to a turn-key protect, many applicational difficulites are expected. With design and construction are performed under the simple responsibility in a turn-key method, roles of CM's is overlapped. Also, the characteristics of turn-key method are not reflected to the present $\lceil$CM Work Guideline$\rfloor$. Over the years, various problems have been identified from turn-key projects. Korea's $\lceil$CM Work Guideline$\rfloor$ is more inclusive compared to the CM services of CMAA and overlooks the importance of CM's roles in pre-design phase. In this study, CM's roles of pre-construction phase (pre-bidding, bidding, detail design, contracting) in construction turn-key projects were identified and complementary policy for institution was suggested. We further look into dividing the roles of the CM at turn-key project Into professional role and emotional role. Also, we speculate problems of the existing experience in turn-key projects and suggest a rough methodology on how these concepts can be adjusted for improve the turn-key method.

  • PDF

The Integrins Involved in Soybean Agglutinin-Induced Cell Cycle Alterations in IPEC-J2

  • Pan, Li;Zhao, Yuan;Yuan, Zhijie;Farouk, Mohammed Hamdy;Zhang, Shiyao;Bao, Nan;Qin, Guixin
    • Molecules and Cells
    • /
    • v.40 no.2
    • /
    • pp.109-116
    • /
    • 2017
  • Soybean agglutinin (SBA) is an anti-nutritional factor of soybean, affecting cell proliferation and inducing cytotoxicity. Integrins are transmembrane receptors, mediating a variety of cell biological processes. This research aims to study the effects of SBA on cell proliferation and cell cycle progression of the intestinal epithelial cell line from piglets (IPEC-J2), to identify the integrin subunits especially expressed in IPEC-J2s, and to analyze the functions of these integrins on IPEC-J2 cell cycle progression and SBA-induced IPEC-J2 cell cycle alteration. The results showed that SBA lowered cell proliferation rate as the cell cycle progression from G0/G1 to S phase (P < 0.05) was inhibited. Moreover, SBA lowered mRNA expression of cell cycle-related gene CDK4, Cyclin E and Cyclin D1 (P < 0.05). We successfully identified integrins ${\alpha}2$, ${\alpha}3$, ${\alpha}6$, ${\beta}1$, and ${\beta}4$ in IPEC-J2s. These five subunits were crucial to maintain normal cell proliferation and cell cycle progression in IPEC-J2s. Restrain of either these five subunits by their inhibitors, lowered cell proliferation rate, and arrested the cells at G0/G1 phase of cell cycle (P < 0.05). Further analysis indicated that integrin ${\alpha}2$, ${\alpha}6$, and ${\beta}1$ were involved in the blocking of G0/G1 phase induced by SBA. In conclusion, these results suggested that SBA lowered the IPEC-J2 cell proliferation rate through the perturbation of cell cycle progression. Furthermore, integrins were important for IPEC-J2 cell cycle progression, and they were involved in the process of SBA-induced cell cycle progression alteration, which provide a basis for further revealing SBA anti-proliferation and anti-nutritional mechanism.

Key Recovery Attacks on Zorro Using Related-Key Differential Characteristics, and Collision Attacks on PGV-Zorro (Zorro의 연관키 차분특성을 이용한 키 복구 공격 및 PGV-Zorro의 충돌쌍 공격)

  • Kim, Giyoon;Park, Eunhu;Lee, Jonghyeok;Jang, Sungwoo;Kim, Jihun;Kim, Hangi;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1059-1070
    • /
    • 2018
  • The block cipher Zorro is designed to reduce the implementation cost for side-channel countermeasure. It has a structure similar to AES, but the number of S-Boxes used is small. However, since the master key is used as the round key, it can be vulnerable to related key attacks. In this paper, we show key recovery attacks on Zorro using related-key differential characteristics. In addition, the related key differential characteristics are fatal when Zorro is used as the base block cipher of the hash function. In this paper, we describe how these characteristics can be linked to collision attacks in the PGV models.