• Title/Summary/Keyword: key block

Search Result 695, Processing Time 0.034 seconds

A Study on the Estimation Process of Material handling Equipment for Offshore Plant Using System Engineering Approach (시스템엔지니어링 기반 해양플랜트 Material handling 장비 수량산출 프로세스에 관한 연구)

  • Han, Seong-Jong;Seo, Young-Kyun;Cho, Mang-Ik;Kim, Hyung-Woo;Park, Chang-soo
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.22 no.6
    • /
    • pp.785-795
    • /
    • 2019
  • This paper is a study on the modeling of the quantity estimation model for offshore plant Material handling equipment in FEED(Front End Engineering Design) verification stage using system engineering approach which is an engineering design methods. The relevant engineering execution procedure is not systemized although the operation method and Material handling equipment selection with weight and space constraints is a key part of the FEED. Using the system engineering process, the stakeholder requirements analysis process, the system requirements analysis, and the final system architecture design were sequentially performed, and the process developed through the functional development diagram and Requirement traceability matrix (RTM) was verified. In addition, based on the established process, we propose a Material handling quantity estimation model and Quantity calculation verification Table that can be applied at the FEED verification stage and we verify the applicability through case studies.

Design of a Wide Tuning Range DCO for Mobile-DTV Applications (Mobile-DTV 응용을 위한 광대역 DCO 설계)

  • Song, Sung-Gun;Park, Sung-Mo
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.5
    • /
    • pp.614-621
    • /
    • 2011
  • This paper presents design of a wide tuning range digitally controlled oscillator(DCO) for Mobile-DTV applications. DCO is the key element of the ADPLL block that generates oscillation frequencies. We proposed a binary delay chain(BDC) structure, for wide tuning range DCO, modifying conventional fixed delay chain. The proposed structure generates oscillation frequencies by delay cell combination which has a variable delay time of $2^i$ in the range of $0{\leq}i{\leq}n-1$. The BOC structure can reduce the number of delay cells because it make possible to select delay cell and resolution. We simulated the proposed DCO by Cadence's Spectre RF tool in 1.8V chartered $0.18{\mu}m$ CMOS process. The simulation results showed 77MHz~2.07GHz frequency range and 3ps resolution. The phase noise yields -101dBc/Hz@1MHz at Mobile-DTV maximum frequency 1675MHz and the power consumption is 5.87mW. The proposed DCO satisfies Mobile-DTV standards such as ATSC-M/H, DVB-H, ISDB-T, T-DMB.

A Study on Maturity Model for the Assessment of Cyber Resilience Level in the Defence Information System (국방정보시스템 사이버복원력 수준 평가를 위한 성숙도모델에 관한 연구)

  • Choi, Jae-hyeok;Kim, Wan-ju;Lim, Jae-sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1153-1165
    • /
    • 2019
  • Recently, threats of hacking have been increasing on the national intelligence service network and key infrastructure, including the defense field. The defense information system responds to threats from the outside through the network separation, but if the defense information system is hacked, it has a serious impact on the operations of wartime or peacetime military forces. Today, cyberattacks and threats are rising to unpredictable levels and making it practically impossible to completely block and prevent hacking threats completly. So, in this study proposed a maturity model to assess the level of cyber-resilience, which is the ability to ensure the system's viability and maintain continuity through rapid response and recovery if signs of cyberattacks by the defense information system are expected or occurred. The proposed maturity model is expected to contribute to improving the cyber security level of the defense information system by assessing the level of cyber resilience of the defense information system and identifying and supplementing fields that are lacking.

Anti-tumorigenic and Invasive Activity of Colon Cancer Cells Transfected with the Retroviral Vector Encoding Tissue Inhibitor of Metalloproteinase-2 (레트로바이러스를 이용한 Tissue Inhibitor of Metalloproteinase-2 유전자 발현이 대장암 세포의 전이 및 종양형성에 미치는 영향)

  • 오일웅;정자영;장석기;이수해;김연수;손여원
    • YAKHAK HOEJI
    • /
    • v.48 no.3
    • /
    • pp.189-196
    • /
    • 2004
  • Matrix metalloproteinases (MMPs) and tissue inhibitors of MMPs (TIMPs) playa key role in tumor invasion and metastasis. As an inhibitor of MMP-2, TIMP-2 is known to block both the invasive and metastatic behavior of cancer cells, and decrease tumor growth activity. We performed this study to investigate the effects of TIMP-2 over-expression induced by retroviral mediated gene transfer in vitro and in vivo. The human colon cancer cell line SW480 was transfected with the retroviral vector encoding TIMP-2. The effects of TIMP-2 over-expression were analyzed by invasion assay and gelatinase activity test in colon cancer cells and tumorigencity in nude mice. In evaluation of the transfection efficiency of the retroviral vector encoding TIMP-2 in colon cancer cells, we confirmed up-regulation of TIMP-2 expression dependent on the time of cell culture. In addition, inhibition of MMP-2 expression in SW480/TIMP-2 was shown by gelatin zymography. In the in vitro invasion assay SW480/TIMP-2 inhibited the invasiveness on matrigel coated with collagen. To determine whether TIMP-2 can modulate in vivo tumorigenicity and metastasis, SW480/TIMP-2 cells were injected subcutaneously in nude mice. The tumor mass formation of SW480/TIMP-2 cells in nude mice was markedly decreased compared to nontransfected cancer cells. These results showed that colon cancer cells transfected with the retroviral vector encoding TIMP-2 inhibits the invasiveness in vitro and tumorigenicity in vivo.

Performance Improvement of Distributed Compressive Video Sensing Using Reliability Estimation (신뢰성 예측을 이용한 분산 압축 비디오 센싱의 성능 개선)

  • Kim, Jin-soo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.6
    • /
    • pp.47-58
    • /
    • 2018
  • Recently, remote sensing video applications have become increasingly important in many wireless networks. Distributed compressive video sensing (DCVS) framework in these applications has been studied to reduce encoding complexity and to simultaneously capture and compress video data. Specially, a motion compensated block compressed sensing with smoothed projected Landweber (MC-BCS-SPL) has been actively researched for one useful algorithm of DCVS schemes, However, conventional MC-BCS-SPL schemes do not provide good visual qualities in reconstructed Wyner-Ziv (WZ) frames. In this paper, the conventional schemes of MC-BCS-SPL are described and then upgraded to provide better visual qualities in WZ frames by introducing reliability estimate between adjacent key frames and by constructing efficiently motion-compensated interpolated frames. Through experimental results, it is shown that the proposed algorithm is effective in providing better visual qualities than conventional algorithm.

A Design of Security SoC Prototype Based on Cortex-M0 (Cortex-M0 기반의 보안 SoC 프로토타입 설계)

  • Choi, Jun-baek;Choe, Jun-yeong;Shin, Kyung-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.251-253
    • /
    • 2019
  • This paper describes an implementation of a security SoC (System-on-Chip) prototype that interfaces a microprocessor with a block cipher crypto-core. The Cortex-M0 was used as a microprocessor, and a crypto-core implemented by integrating ARIA and AES into a single hardware was used as an intellectual property (IP). The integrated ARIA-AES crypto-core supports five modes of operation including ECB, CBC, CFB, CTR and OFB, and two master key sizes of 128-bit and 256-bit. The integrated ARIA-AES crypto-core was interfaced to work with the AHB-light bus protocol of Cortex-M0, and the crypto-core IP was expected to operate at clock frequencies up to 50 MHz. The security SoC prototype was verified by BFM simulation, and then hardware-software co-verification was carried out with FPGA implementation.

  • PDF

Blockchain-based Personal Information Authentication Method using Zero Knowledge Proofs (영지식을 활용한 블록체인 기반 개인정보 인증 기법)

  • Lee, Kwang Kyu
    • Smart Media Journal
    • /
    • v.10 no.3
    • /
    • pp.48-53
    • /
    • 2021
  • The authentication process is a key step that should be used to verify that a user is legitimate, and it should be used to verify that a user is a legitimate user and grant access only to that user. Recently, two-factor authentication and OTP schemes are used by most applications to add a layer of security to the login process and to address the vulnerability of using only one factor for authentication, but this method also allows access to user accounts without permission. This is a known security vulnerability. In this paper, we propose a Zero Knowledge Proofs (ZKP) personal information authentication scheme based on a Smart Contract of a block chain that authenticates users with minimal personal information exposure conditions. This has the advantage of providing many security technologies to the authentication process based on blockchain technology, and that personal information authentication can be performed more safely than the existing authentication method.

Integrity Support System for Blockchain-based explainable CCTV Video (블록체인 기반 설명 가능 CCTV 영상 무결성 지원 시스템)

  • Kim, Taeyoung;Hong, Joongi;Kang, Mingu;Song, Seounghan;Lee, Jeonghoon;Kim, Suntae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.15-21
    • /
    • 2021
  • The type of crimes is diverse and the number of crimes is increasing as society changes. This phenomenon is showing a higher trend in places with higher population density. Accordingly, many organizations install CCTV to reduce crime and provide key evidence of crime. Nevertheless, it is still weak to deal with crimes such as video manipulation targeting CCTV. Although blockchain-based CCTV image integrity techniques are applied to prevent manipulation, they only guarantee the manipulation integrity of the entire video and can't explain how certain sections of the video has been manipulated. Therefore, in this research, we propose a system for supporting explainable CCTV video integrity based on a block chain.

Security Analysis of Software-Oriented Stream Ciphers against Algebraic Attacks (소프트웨어 구현에 적합한 스트림 암호의 대수적 공격에 대한 안전성)

  • Sung Jaechul;Moon Dukjae;Im Hung-su;Chee Seongtaek;Lee Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.29-40
    • /
    • 2005
  • In this paper we consider the security of recently proposed software-orienred stram cipher HELIX, SCREAM, MUGI, and PANAMA against algebraic attacks. Algebraic attack is a key recovery attack by solving an over-defined system of multi-variate equations with input-output pairs of an algorithm. The attack was firstly applied to block ciphers with some algebraic properties and then it has been mon usefully applied to stream ciphers. However it is difficult to obtain over-defined algebraic equations for a given cryptosystem in general. Here we analyze recently proposed software-oriented stream ciphers by constructing a system of equations for each cipher. furthermore we propose three design considerations of software-oriented stream ciphers.

An Improved Round Reduction Attack on Triple DES Using Fault Injection in Loop Statement (반복문 오류 주입을 이용한 개선된 Triple DES 라운드 축소 공격)

  • Choi, Doo-Sik;Oh, Doo-Hwan;Park, Jeong-Soo;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.709-717
    • /
    • 2012
  • The round reduction on block cipher is a fault injection attack in which an attacker inserts temporary errors in cryptographic devices and extracts a secret key by reducing the number of operational round. In this paper, we proposed an improved round reduction method to retrieve master keys by injecting a fault during operation of loop statement in the Triple DES. Using laser fault injection experiment, we also verified that the proposed attack could be applied to a pure microprocessor ATmega 128 chip in which the Triple DES algorithm was implemented. Compared with previous attack method which is required 9 faulty-correct cipher text pairs and some exhaustive searches, the proposed one could extract three 56-bit secret keys with just 5 faulty cipher texts.