• Title/Summary/Keyword: Triple Security

Search Result 57, Processing Time 0.025 seconds

A Performance Comparison between XEN and KVM Hypervisors While Using Cryptographic Algorithms

  • Mohammed Al-Shalabi;Waleed K. Abdulraheem;Jafar Ababneh;Nader Abdel Karim
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.61-70
    • /
    • 2024
  • Cloud Computing is internet-based computing, where the users are provided with whatever service they need from the resources, software, and information. Recently, the security of cloud computing is considered as one of the major issues for both cloud service providers CSP and end-users. Privacy and highly confidential data make many users refuse to store their data within cloud computing, since data on cloud computing is not dully secured. The cryptographic algorithm is a technique which is used to maintain the security and privacy of the data on the cloud. In this research, we applied eight different cryptographic algorithms on Xen and KVM as hypervisors on cloud computing, to be able to measure and compare the performance of the two hypervisors. Response time and CPU utilization while encryption and decryption have been our aspects to measure the performance. In terms of response time and CPU utilization, results show that KVM is more efficient than Xen on average at 11.5% and 11% respectively. While TripleDES cryptographic algorithm shows a more efficient time response at Xen hypervisor than KVM.

Triple Error Correcting Reed Solomon Decoder Design Using Galois Subfield Inverse Calculator And Table ROM

  • An Hyeong-Keon;Hong Young-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.1C
    • /
    • pp.8-13
    • /
    • 2006
  • A new RS(Reed Solomon) Decoder design method, using Galois Subfield GF($2^4$) Multiplier, is described. The Decoder is designed using Normalized error position stored ROM. Here New Inverse Calculator in GF($2^8$) is designed, which is simpler and faster than the classical GF($2^8$) direct inverse calculator, using the Galois Subfield GF($2^4$) Arithmatic operator.

Implementation of Secure POS SYSTEM (안전한 POS System의 구현)

  • 박동규;황유동
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.2
    • /
    • pp.70-77
    • /
    • 2001
  • This paper focuses on the design and implementation of the secure POS SYSTEM We propose a secure POS SYSTEM with RSA, MD5, Triple-DES for security and with RBAC model for access control. The client authentication is implemented before the data transferred be4ween client and server in proposed POS SYSTEM. We apply security algorithms with it, so that it can maintain confidentiality and integrity In addition. we apply RBAC model for access control of data. We verified the proposed system's stability by applying the proposed system to real works.

Japan's gastrodiplomacy as soft power: global washoku and national food security

  • Farina, Felice
    • Journal of Contemporary Eastern Asia
    • /
    • v.17 no.1
    • /
    • pp.152-167
    • /
    • 2018
  • Until recently, Japanese cuisine was known only for sushi and was still considered exotic outside the archipelago. However, today the number of specialized restaurants which serve other traditional foods is constantly increasing all over the world, making Japanese gastronomy one of the most influential. Japanese government has supported the promotion of national cuisine worldwide in different ways, making washoku (Japanese traditional cuisine) one of the main elements of Japan's soft power and cultural diplomacy. In this paper, I will analyse the connection between Japan's gastrodiplomacy, defined as the use of typical food and dishes as an instrument of soft power, and Japan's food security strategy. I will argue that the strategy of promotion of washoku worldwide is not a mere act of popularization of Japanese food but it is strictly related to the issue of the low self-sufficiency rate of the country, as the main objective of the government is the raise of food export, in order to foster agricultural production and improve self-sufficiency.

TDES CODER USING SSE2 TECHNOLOGY

  • Koo, In-Hoi;Kim, Tae-Hoon;Ahn, Sang-Il
    • Proceedings of the KSRS Conference
    • /
    • 2007.10a
    • /
    • pp.114-117
    • /
    • 2007
  • DES is an improvement of the algorithm Lucifer developed by IBM in the 1977. IBM, the National Security Agency (NSA) and the National Bureau of Standards (NBS now National Institute of Standards and Technology NIST) developed the DES algorithm. The DES has been extensively studied since its publication and is the most widely used symmetric algorithm in the world. But nowadays, Triple DES (TDES) is more widely used than DES especially in the application in case high level of data security is required. Even though TDES can be implemented based on standard algorithm, very high speed TDES codec performance is required to process when encrypted high resolution satellite image data is down-linked at high speed. In this paper, Intel SSE2 (Streaming SIMD (Single-Instruction Multiple-Data) Extensions 2 of Intel) is applied to TDES Decryption algorithm and proved its effectiveness in the processing time reduction by comparing the time consumed for two cases; original TDES Decryption and TDES Decryption with SSE2

  • PDF

Three-key Triple Data Encryption Algorithm of a Cryptosystem Based on Phase-shifting Interferometry

  • Seok Hee Jeon;Sang Keun Gil
    • Current Optics and Photonics
    • /
    • v.7 no.6
    • /
    • pp.673-682
    • /
    • 2023
  • In this paper, a three-key triple data encryption algorithm (TDEA) of a digital cryptosystem based on phase-shifting interferometry is proposed. The encryption for plaintext and the decryption for the ciphertext of a complex digital hologram are performed by three independent keys called a wavelength key k1(λ), a reference distance key k2(dr) and a holographic encryption key k3(x, y), which are represented in the reference beam path of phase-shifting interferometry. The results of numerical simulations show that the minimum wavelength spacing between the neighboring independent wavelength keys is about δλ = 0.007 nm, and the minimum distance between the neighboring reference distance keys is about δdr = 50 nm. For the proposed three-key TDEA, choosing the deviation of the key k1(λ) as δλ = 0.4 nm and the deviation of the key k2(dr) as δdr = 500 nm allows the number of independent keys k1(λ) and k2(dr) to be calculated as N(k1) = 80 for a range of 1,530-1,562 nm and N(dr) = 20,000 for a range of 35-45 mm, respectively. The proposed method provides the feasibility of independent keys with many degrees of freedom, and then these flexible independent keys can provide the cryptosystem with very high security.

A Study Security Measures for Protection of VIP in the G20 Summit (G20 정상회의 시 주(主)행사장에서의 VIP 안전대책 방안에 관한 연구)

  • Lee, Sun-Ki;Lee, Choong-Soo
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.91-123
    • /
    • 2010
  • The threat factors available for occurrence given G20 Summit Meeting are expected leader terrorism, hostage terrorism, bomb terrorism, public facilities terrorism, and aircraft terrorism. As for the threat groups, which are expected in Korea, the North Korea, Islam extremist group, and the group such as NGO organization of being opposed to international meeting are regarded as having possibility of causing hazard. Thus, the purpose of this study is to suggest VIP Security-measure plans in the main site in preparation for G20 Summit Meeting. Accordingly, each country in the world is adopting 'the principle of Triple Ring' in common. Thus, it elicited a coping plan by 1st line(inner ring) 2nd line(middle ring) 3rd line(outer ring) based on this principle, and proposed even an opinion together that will need to be reflected in light of policy for the VIP security measures. In conclusion, as for the VIP Security-measure plans in the main site in preparation for G20 Summit Meeting, In the inner ring(safety sector), first, an intercepting measure needs to be devised for a spot of getting into and out of vehicles given the Straight Street. Second, the Walking Formation needs to be reinforced boldly in the exposed area. In the middle ring(security sector), first, the control plan needs to be devised by considering particularity of the main site. Second, there is necessity for adopting the efficient security badge operation plan that is included RFID function within security badge. In the outer ring(aid protective sector), first, there is necessity of preparing for several VIP terrorisms, of collecting information and intelligence, and of reinforcing the information collection system against terrorism under the cooperation with the overseas information agency. Second, the urgent measure training in time of emergency needs to be carried out toward security agent event manpower. Third, to maintain the certain pace in VIP motorcade, the efficient traffic control system needs to be operated. Finally, as for what will need to be reflected in light of policy for VIP security measures, first, there is necessity for allowing VIP residence to be efficiently dispersed to be distributed and controlled. Second, there is necessity for allowing impure element to misjudge or attack to be failed by utilizing diverse deception operations. Third, according to the reorganization in North Korea's Organization of the South Directed Operations, the powerful 'military-support measure' needs to be driven from this G20 Summit Meeting. For this, the necessity was proposed for further reinforcing the front back defense posture under the supervision of the Ministry of National Defense and for positively coping even with detecting and removing poison in preparation for CBR (chemical, biological, and radio-logical) terrorism.

  • PDF

Seismic response analysis of isolated offshore bridge with friction sliding bearings

  • Wang, Baofu;Han, Qiang;Jia, Junfeng
    • Earthquakes and Structures
    • /
    • v.16 no.6
    • /
    • pp.641-654
    • /
    • 2019
  • This paper investigates the seismic response of a typical non-navigable continuous girder bridge isolated with friction sliding bearings of the Hong Kong-Zhuhai-Macao link projects in China. The effectiveness of the friction pendulum system (FPS) and accuracy of the numerical model were evaluated by a 1/20 scaled bridge model using shaking table tests. Based on the hysteretic properties of friction pendulum system (FPS), double concave friction pendulum (DCFP), and triple friction pendulum system (TFPS), seismic response analyses of isolated bridges with the three sliding-type bearings are systematically carried out considering soil-pile interaction under offshore soft clay conditions. The fast nonlinear analysis (FNA) method and response spectrum are employed to investigate the seismic response of isolated offshore bridge structures. The numerical results show that the implementation of the three sliding-type bearings effectively reduce the base shear and bending moment of the reinforced concrete pier, at the cost of increasing the absolute displacement of the bridge superstructure. Furthermore, the TFPS and DCFP bearings show better isolation effect than FPS bearing for the example continuous girder bridge.

Electro-fatigue Characteristic of Shape Memory Alloy Applied to the Electrosurgical Knee Wand of Variation of Wand Head Angle in Electrosurgical Knee Surgeries (헤드각이 변화하는 Electrosurgical Knee Wand에 적용된 형상기억합금 스프링의 전기적 피로특성)

  • An, Jae-Uk;Kim, Cheol-Woong;Lee, Ho-Sang;Wang, Joon-Ho;Oh, Dong-Joon
    • Proceedings of the KSME Conference
    • /
    • 2008.11a
    • /
    • pp.1547-1552
    • /
    • 2008
  • The tip of these catheter with straight needles is not able to reach in the vicinity of the disc bulging, which are the cause of the low back pain and because the far indirect radio-frequency treatment results in the decompression, the nucleoplasty has the limit. Many incurable diseases has not been solved due to the unexistence of the advanced technique for the MIS human body catheter device. To increase the possibility of nucleoplasty, the needle tip should be located at the closest area of the lesion. For this reason, the best way to increase the success rate of the operation is that the needle tip should access 3-dimensionally to the operating field as soon as possible. To achieve this aim, our studies are restricted as follows: 1) the SMA catheter design to control the 3-dimensional direction, 2) the security of the immediate response by the positive control of the SMA element thermal distribution using Peltier thermoelectric elements, 3) the aquisition of the control data by monitoring the relationship between the temperature of SMA element and the displacement, and 4) the design of the controller to guarantee the accurate location.

  • PDF

An Efficient RDF Query Validation for Access Authorization in Subsumption Inference (포함관계 추론에서 접근 권한에 대한 효율적 RDF 질의 유효성 검증)

  • Kim, Jae-Hoon;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.36 no.6
    • /
    • pp.422-433
    • /
    • 2009
  • As an effort to secure Semantic Web, in this paper, we introduce an RDF access authorization model based on an ontology hierarchy and an RDF triple pattern. In addition, we apply the authorization model to RDF query validation for approved access authorizations. A subscribed SPARQL or RQL query, which has RDF triple patterns, can be denied or granted according to the corresponding access authorizations which have an RDF triple pattern. In order to efficiently perform the query validation process, we first analyze some primary authorization conflict conditions under RDF subsumption inference, and then we introduce an efficient query validation algorithm using the conflict conditions and Dewey graph labeling technique. Through experiments, we also show that the proposed validation algorithm provides a reasonable validation time and when data and authorizations increase it has scalability.