• Title/Summary/Keyword: key block

Search Result 695, Processing Time 0.024 seconds

A Study on Implementation of Authentication System for Home Networking Service (홈 네트워크 서비스를 위한 인증시스템 구현에 관한 연구)

  • Lee, Ki-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.6
    • /
    • pp.1091-1098
    • /
    • 2009
  • In this paper, we designed the authentication system for home network service and applied it to actual sensor nodes. The pair-wise pre-distribution key skim is applied for prevention of authentication key from sniffing on the wireless sensor networks. The authentication key and data are encrypted by using the CBC mode RC5 algorithm based on the SPINS. The experimental environment consists of a base station (BS)and sensor nodes and each sensor node sends both sensing data and the encrypted authentication key to the BS. For simulations we set up some what-if scenarios of security menaces in home network service.Slightly modified the TOS_Msg data arrays of TinyOS is suggested to store 8-byte authentication key which can enable data encryption and authentication at the each sensor node. As a result, malfunction caused by communication between BS and nodes of other groups of added nodes having malicious purpose can be protected. Also, we confirmed that a critical data of home networking service like vital signal can be transmitted securely through this system by encryption technique.

A Quantitative Evaluation and Comparison of Harmonic Elimination Algorithms Based on Moving Average Filter and Delayed Signal Cancellation in Phase Synchronization Applications

  • Xiong, Liansong;Zhuo, Fang;Wang, Feng;Liu, Xiaokang;Zhu, Minghua;Yi, Hao
    • Journal of Power Electronics
    • /
    • v.16 no.2
    • /
    • pp.717-730
    • /
    • 2016
  • The harmonic components of grid voltage result in oscillations of the calculated phase obtained via phase synchronization. This affects the security and stability of grid-connected converters. Moving average filter, delayed signal cancellation and their related harmonic elimination algorithms are major methods for such issues. However, all of the existing methods have their limitations in dealing with multiple harmonics issues. Furthermore, few studies have focused on a comparison and evaluation of these algorithms to achieve optimal algorithm selections in specific applications. In this paper, these algorithms are quantitatively analyzed based on the derived mathematical models. Moreover, an enhanced moving average filter and enhanced delayed signal cancellation algorithms, which are applicable for eliminating a group of selective harmonics with only one calculation block, are proposed. On this basis, both a comprehensive comparison and a quantitative evaluation of all of the aforementioned algorithms are made from several aspects, including response speed, required data storage size, sensitivity to sampling frequency, and elimination of random noise and harmonics. With the conclusions derived in this paper, better overall performance in terms of harmonic elimination can be achieved. In addition, experimental results under different conditions demonstrate the validity of this study.

Ultrasonic Vibration and Rheocasting for Refinement of Mg-Zn-Y Alloy Reinforced with LPSO Structure

  • Lu, Shulin;Yang, Xiong;Hao, Liangyan;Wu, Shusen;Fang, Xiaogang;Wang, Jing
    • Metals and materials international
    • /
    • v.24 no.6
    • /
    • pp.1315-1326
    • /
    • 2018
  • In this work, ultrasonic vibration (UV) and rheo-squeeze casting was first applied on the Mg alloy reinforced with long period stacking ordered (LPSO) structure. The semisolid slurry of Mg-Zn-Y alloy was prepared by UV and processed by rheosqueeze casting in succession. The effects of UV, Zr addition and squeeze pressure on microstructure of semisolid Mg-Zn-Y alloy were studied. The results revealed that the synergic effect of UV and Zr addition generated a finer microstructure than either one alone when preparing the slurries. Rheo-squeeze casting could significantly refine the LPSO structure and ${\alpha}-Mg$ matrix in $Mg_{96.9}Zn_1Y_2Zr_{0.1}$ alloy without changing the phase compositions or the type of LPSO structure. When the squeeze pressure increased from 0 to 400 MPa, the block LPSO structure was completely eliminated and the average thickness of LPSO structure decreased from 9.8 to $4.3{\mu}m$. Under 400 MPa squeeze pressure, the tensile strength and elongation of the rheocast $Mg_{96.9}Zn_1Y_2Zr_{0.1}$ alloy reached the maximum values, which were 234 MPa and 17.6%, respectively, due to its fine ${\alpha}-Mg$ matrix (${\alpha}1-Mg$ and ${\alpha}2-Mg$ grains) and LPSO structure.

A New Block Cipher for 8-bit Microprocessor (8 비트 마이크로프로세서에 적합한 블록암호 알고리즘)

  • 김용덕;박난경;이필중
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1997.11a
    • /
    • pp.303-314
    • /
    • 1997
  • 계산능력이 제한된 8비트 마이크로프로세서에 적합하도록 모든 기본 연산을 8비트 단위로 처리하는, 블록 크기는 64비트, 키 크기는 128비트인, Feistel 구조의 블록 암호 알고리즘을 제시한다. 이 알고리즘의 안전도는 잘 알려진 two-key triple-DES[ANSI86]나 IDEA[Lai92]와 비견할 만하며, 처리속도는 single-DES[NBS77]보다도 10∼20배 빠르다. 본 논문에서는 이 알고리즘의 설계원칙 및 안전성 분석에 대하여 설명하였고, 다른 알고리즘과의 통계적 특성 및 성능에 대해서도 비교하였다.

  • PDF

Cryptanalysis of Shrinking Generator by Golomb's Randomness Postillate (Golomb의 공리를 이용한 Shrinking Generator의 분석)

  • 김정헌;권기호;박명진
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.4 no.2
    • /
    • pp.105-111
    • /
    • 2001
  • The shrinking generator is simple and stateable, and known that has good security properties. The bits of one output( $R_1$) are used to determine whether the corresponding bits of the second output will be used as part of the overall keystream. Two LFSRs consisting the generator generate pseudorandom sequences satisfying Golomb's postulates. We used this property to analyze the stream of LFSR $R_1$ of the generator.

  • PDF

ELS FTF algorithm fot ARMA spectral estimation (ARMA스펙트럼 추정을 위한 ELS FTF 알고리즘)

  • 이철희;장영수;남현도;양홍석
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1989.10a
    • /
    • pp.427-430
    • /
    • 1989
  • For on-line ARMA spectral estimation, the fast transversal filter algorithm of extended least squares method(ETS FTF) is presented. The projection operator, a key tool for geometric approach, is used in the derivation of the algorithm. ELS FTF is a fast time update recursion which is based on the fact that the correlation matrix of ARMA model satisfies the shift invariance property in each block, and thus it takes 10N+31 MADPR.

  • PDF

A BLOCK CRYPTOGRAPHIC ALGORITHM BASED ON A PRIME CODE (소수 코드를 이용한 블록 암호화 알고리즘)

  • 송문빈;오재곤;정연모
    • Proceedings of the IEEK Conference
    • /
    • 2000.11b
    • /
    • pp.136-139
    • /
    • 2000
  • In this paper, we propose a prime code and a new cryptographic algorithm for encryption and decryption as its application. The characteristics of prime numbers with irregular distribution and uniqueness are used to generate the prime code. Based on the prime code, an encryption algorithm for secret key is presented. Since the algorithm requires simpler operations than existing encryption such as DES, the burden for hardware implementation of the encryption and decryption process is alleviated.

  • PDF

Implementation of A3 Algorithm for GSM System Using VHDL (VHDL을 이용한 GSM 시스템의 A3 알고리즘 구현)

  • 엄세욱;김규철
    • Proceedings of the IEEK Conference
    • /
    • 2000.11b
    • /
    • pp.192-195
    • /
    • 2000
  • GSM(Global System for Mobile Communication) system which is being used in Europe is composed A3, A5 and A8 algorithms. In this paper we implement A3 algorithm using VHDL, and verify the design by simulation. The A3 algorithm is divided into 3 parts, the encryption part, in which F-function encrypts 64 bit block data;the key generation part, which produces 32 bit subkeys;the control part, which produces the control code.

  • PDF

A Secure Modem System (데이타 보호용 모뎀 시스템)

  • 백기진;이창순;문상재
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1991.11a
    • /
    • pp.194-203
    • /
    • 1991
  • This paper presents the hardware development of a secure modem system for personal computers. This system consists of a data encryption system and an existing modem. The algorithm of LUCIFER-type with block size of 64-bit is used for data encryption and Diffie-Hellman method is also employed for generation of the encryption key. We implement the system in hardware using the DSP56001.

  • PDF