• Title/Summary/Keyword: TDES

Search Result 10, Processing Time 0.023 seconds

TDES CODER USING SSE2 TECHNOLOGY

  • Koo, In-Hoi;Kim, Tae-Hoon;Ahn, Sang-Il
    • Proceedings of the KSRS Conference
    • /
    • 2007.10a
    • /
    • pp.114-117
    • /
    • 2007
  • DES is an improvement of the algorithm Lucifer developed by IBM in the 1977. IBM, the National Security Agency (NSA) and the National Bureau of Standards (NBS now National Institute of Standards and Technology NIST) developed the DES algorithm. The DES has been extensively studied since its publication and is the most widely used symmetric algorithm in the world. But nowadays, Triple DES (TDES) is more widely used than DES especially in the application in case high level of data security is required. Even though TDES can be implemented based on standard algorithm, very high speed TDES codec performance is required to process when encrypted high resolution satellite image data is down-linked at high speed. In this paper, Intel SSE2 (Streaming SIMD (Single-Instruction Multiple-Data) Extensions 2 of Intel) is applied to TDES Decryption algorithm and proved its effectiveness in the processing time reduction by comparing the time consumed for two cases; original TDES Decryption and TDES Decryption with SSE2

  • PDF

Effect of the density profile of a star on the bolometric light curve in tidal disruption events

  • Park, Gwanwoo;Kimitake, Hayasaki
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.43 no.1
    • /
    • pp.56.1-56.1
    • /
    • 2018
  • Tidal disruption events (TDEs) provide evidence for quiescent supermassive black holes (SMBHs) in the centers of inactive galaxies. TDEs occur when a star on a parabolic orbit approaches close enough to a SMBH to be disrupted by the tidal force of the SMBH. The subsequent super-Eddington accretion of stellar debris falling back to the SMBH produces a characteristic flare lasting several months. The theoretically expected bolometric light curve decays with time as proportional to $t^{-5/3}$. However, the light curves observed in most of the optical-UV TDEs deviate from the $t^{-5/3}$ decay rate especially at early time, while the light curves of some soft-X-ray TDEs are overall in good agreement with the $t^{-5/3}$ law. Therefore, it is required to construct the theoretical model for explaining these light curve variations consistently. In this paper, we revisit the mass fallback rates analytically and semi-analytically by taking account of the structure of the star, which is simply modeled by the polytrope. We find the relation between a polytropic index and the power law index of the mass fallback rate. We also discuss whether and how the decay curves, which we derived, fit the observed ones.

  • PDF

Analysis On Encryption Process In Data For Satellite

  • Bae, Hee-Jin
    • Proceedings of the KSRS Conference
    • /
    • 2008.10a
    • /
    • pp.216-219
    • /
    • 2008
  • It is necessary to study encryption for protection and safe transmission of the important information. Specially, the security in satellite data is also getting more and more important. This paper introduces DES and TDES algorithm, studies how to apply to satellite data with those algorithms and process of encryption and decryption for satellite data. Proposed encryption process in this paper will be utilized in satellite data for encryption in many satellites.

  • PDF

Time-Coobservability in the Decentralized Supervisory Control of Timed Discrete Event Systems (시간 이산 사건 시스템의 분산 관리 제어에서 시간-상호관측가능성)

  • Park, Seong-Jin;Choi, Ho-Lim
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.15 no.4
    • /
    • pp.396-399
    • /
    • 2009
  • This paper presents the notion of time-coobservability as a core condition far the existence of a decentralized supervisor achieving a given language specification in a timed discrete event system (TDES). A TDES is modeled by the framework of Brandin & Wonham [5], and the decentralized supervisory control architecture presented is extended from the untimed architecture of Yoo & Lafortune [1]. To develop the time-coobservability of a language specification, specifically this paper presents the C&P time-coobservability and D&A time-coobservability in the consideration of the event tick and forcing mechanism of decentralized supervisors.

Dependence of tidal disruption flares on stellar density profile and orbital properties

  • Park, Gwanwoo;Hayasaki, Kimitake
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.44 no.1
    • /
    • pp.48.2-48.2
    • /
    • 2019
  • Tidal disruption events (TDEs) provide evidence for quiescent supermassive black holes (SMBHs) in the centers of inactive galaxies. TDEs occur when a star on a parabolic orbit approaches close enough to a SMBH to be disrupted by the tidal force of the SMBH. The subsequent super-Eddington accretion of stellar debris falling back to the SMBH produces a characteristic flare lasting several months. It is theoretically expected that the bolometric light curve decays with time as proportional to $t^{-5/3}$. However, some of the observed X-ray light curves deviate from the $t^{-5/3}$ decay rate, while some of them are overall in good agreement with the $t^{-5/3}$ law. Therefore, it is required to construct the theoretical model for explaining these light curve variations consistently. In this paper, we revisit the mass fallback rates semi-analytically by taking account of the stellar internal structure, orbital eccentricity and penetration factor. We find that the mass fallback rate is shallower than the standard $t^{-5/3}$ decay rate independently of the polytropic index, and the orbital eccentricity only changes the magnitude of the mass fallback rate. Furthermore, the penetration factor significantly can modify the magnitude and variation of mass fallback rate. We confirm these results by performing the computational hydrodynamic simulations. We also discuss the relevance of our model by comparing these results with the observed light curves.

  • PDF

The implementation of Block Cipher Algorithm Correctness Test Module (블록 암호 알고리즘 정확성 테스트 모듈 구현)

  • 정성민;박성근;김석우;서창호;김일준
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.564-568
    • /
    • 2002
  • 정보보호 평가는 크게 시스템 평가인 CC평가와 암호모듈 평가인 CMVP평가고 나눌 수 있다. 본 논문은 암호모듈 평가 방법으로 북미 CMVP의 3가지 블록 알고리즘시험방법인 KAT(Known Answer Test), MCT(Monte Calro Test), MMT(Multi-block Message Test)를 JAVA환경에 적용하여 시범 구현하였다. 대상 알고리즘은 CMVP의 4가지 블록 알고리즘(DES, TDES, AES, Skipjack)을, 테스트 방법으로 MOVS, TMOVS, AESAVS를 선정하여 FIPS표준을 적용하였다. 구현 환경으로는 JCA기반의 Cryptix를 채택하여 CMVP의 블록 암호 알고리즘 테스트 시스템 중 일부를 구현하였다.

  • PDF

VLSI Design of Cryptographic Processor for SEED and Triple DES Encryption Algorithm (SEED 와 TDES 암호 알고리즘을 구현하는 암호 프로세서의 VLSI 설계)

  • 정진욱;최병윤
    • Proceedings of the IEEK Conference
    • /
    • 2000.06b
    • /
    • pp.169-172
    • /
    • 2000
  • This paper describes design of cryptographic processor which can execute SEED, DES, and triple DES encryption algorithm. To satisfy flexible architecture and area-efficient structure, the processor has I unrolled loop structure with hardware sharing and can support four standard mode, such as ECB, CBC, CFB, and OFB modes. To reduce overhead of key computation, the precomputation technique is used. Also to eliminate increase of processing time due to data input and output time, background I/O technique is used which data input and output operation execute in parallel with encryption operation of cryptographic processor. The cryptographic processor is designed using 2.5V 0.25 $\mu\textrm{m}$ CMOS technology and consists of about 34.8K gates. Its peak performances is about 250 Mbps under 100 Mhz ECB SEED mode and 125 Mbps under 100 Mhz triple DES mode.

  • PDF

Citation patterns in a core library journal, 1970-1990 (도서관학 학술지에 나타난 인용형태 분석)

  • Yu, Jae Ok
    • Journal of the Korean Society for information Management
    • /
    • v.10 no.2
    • /
    • pp.111.2-111.2
    • /
    • 1993
  • This study reports on some find~ngr from a b~bliometric survey of resear~.h papers publ~shed ~n a core ~ournalof library science. 1.OX:i citations from :37 journal at-tdes in the Journal of the Korean Library and InformationScience Society (1970-1WO) are analyzed. Core journals and core authors are identified, Bibliometric characteristicsof the literature of hbrarv science and trends over tme in th~s discipline art discussed.

Citation Patterns in a Core Library Journal, 1970-1990 (도서관학 학술지에 나타난 인용형태 분석)

  • 유재옥
    • Journal of the Korean Society for information Management
    • /
    • v.10 no.2
    • /
    • pp.145-167
    • /
    • 1993
  • This study reports on some find~ngr from a b~bliometric survey of resear~.h papers publ~shed ~n a core ~ournal of library science. 1.OX:i citations from :37 journal at-tdes in the Journal of the Korean Library and Information Science Society (1970-1WO) are analyzed. Core journals and core authors are identified, Bibliometric characteristics of the literature of hbrarv science and trends over tme in th~s discipline art discussed.

  • PDF

A Study on Improved Hash Key Frame based Scrambling Encryption Algorithm (향상된 해쉬 키 프레임 기반 스크램블링 암호화 알고리즘 연구)

  • Yun, Sang-Jun;Park, Chul-Woo;Kim, Kee-Chen
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.277-279
    • /
    • 2013
  • 스크램블링(Scrambling)은 네트워크에서 영상을 전송할 때 보안을 위해 데이터를 특정한 키에 의해 암호화 하여 전송함으로써, 수신자만이 원본 영상으로 복원할 수 있도록 하는 기술이다. 스크램블링은 전송에서 TDES, AES 뿐만아닌 SEED, AIRA의 암호화 알고리즘을 사용한다. 이 경우 암복호화에 많은 시간이 소요되어 실시간 전송환경에서는 전송속도 저하에 따른 QoS 문제가 발생한다. 이와 같은 문제를 해결하기 위해 기존 연구에서는 속도가 빠른 해쉬 함수를 이용하여 스크램블링 암호화 하는 기법을 제안하였다. 하지만 원본 이미지의 일부가 노출될 경우 이후 원본프레임이 노출될 수 있는 문제점을 가지고 있다. 본 논문에서는 이러한 문제점을 방지하기 위해 다중 해쉬 키 프레임을 이용한 Multi Hash key Frame based Scrambling Encryption 알고리즘을 제안한다. 성능평가에서는 제안하는 스크램블링 기법에 대한 암복호화 비용과 성능을 측정하였으며, 기존기법과 비교하였을 때 원본 노출로 인한 대입공격 취약성 부분을 기존 해쉬 함수의 보안 안전성만큼 향상시켰다.