• Title/Summary/Keyword: one round

Search Result 998, Processing Time 0.033 seconds

One-round Protocols for Two-Party Authenticated Key Exchange (1-라운드 양자간 키 교환 프로토콜)

  • Jeong, Ik-Rae;Lee, Dong-Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.1_2
    • /
    • pp.110-118
    • /
    • 2006
  • Cryptographic protocol design in a two-party setting has of tel ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channel). In particular, most protocols for two-party key exchange have been designed assuming that parties alternate sending their messages (i.e., assuming a bidirectional half-duplex channel). However, by taking advantage of the communication characteristics of the network it may be possible to design protocols with improved latency. This is the focus of the present work. We present three provably-secure protocols for two-party authenticated key exchange (AKE) which require only a single round. Our first, most efficient protocol provides key independence but not forward secrecy. Our second scheme additionally provides forward secrecy but requires some additional computation. Security of these two protocols is analyzed in the random oracle model. Our final protocol provides the same strong security guarantees as our second protocol, but is proven secure in the standard model. This scheme is only slightly less efficient (from a computational perspective) than the previous ones. Our work provides the first provably- secure one-round protocols for two-party AKE which achieve forward secrecy.

SITM Attacks on Skinny-128-384 and Romulus-N (Skinny-128-384와 Romulus-N의 SITM 공격)

  • Park, Jonghyun;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.807-816
    • /
    • 2022
  • See-In-The-Middle (SITM) is an analysis technique that uses Side-Channel information for differential cryptanalysis. This attack collects unmasked middle-round power traces when implementing block ciphers to select plaintext pairs that satisfy the attacker's differential pattern and utilize them for differential cryptanalysis to recover the key. Romulus, one of the final candidates for the NIST Lightweight Cryptography standardization competition, is based on Tweakable block cipher Skinny-128-384+. In this paper, the SITM attack is applied to Skinny-128-384 implemented with 14-round partial masking. This attack not only increased depth by one round, but also significantly reduced the time/data complexity to 214.93/214.93. Depth refers to the round position of the block cipher that collects the power trace, and it is possible to measure the appropriate number of masking rounds required when applying the masking technique to counter this attack. Furthermore, we extend the attack to Romulus's Nonce-based AE mode Romulus-N, and Tweakey's structural features show that it can attack with less complexity than Skinny-128-384.

Performance of Institute of Occupational Health, Korean Industrial Health Association in Proficiency Analytical Testing Program (대한산업보건협회 산업보건연구소의 PAT 정도관리 참여결과)

  • Lee, Jun-Seong;Yoo, Ho-Kyum;Oh, Mi-Soon;Park, Wha-Me;Yun, Gi-Sang;Choi, Ho-Chun;Chung, Kyou-Chull
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.6 no.2
    • /
    • pp.313-321
    • /
    • 1996
  • Our laboratoy has been participated in Proficiency Analytical Testing (PAT) program which is operated by the Americal Industrial Hygiene Association in cooperation with the National Institute for Occupational Safety and Health (NIOSH). The program is designed to assist a laboratory improve its analytical performance by providing samples on a quarterly basis, evaluating the results, and providing reports on how well the laboratory performed. Evaluation of the results reported here covers five rounds of the PAT program (round 121~round 125). The way a laboratory is evaluated by PAT program is as follows: 1) There is no overall proficiency rating given to a laboratory. 2) A proficiency rating is given for each type of analyze (i.e., metals, silica, asbestos, solvents) that a laboratory analyzed. 3) Proficiency is rated acceptable ("A") if Z score lies between -3 and +3, and unacceptable if Z score is either higher than +3 ("H") or lower than -3 ("Lo"). Z score = (reported data - reference value) / standard deviation 4) For a laboratory to be rated proficient it must either have had no outliers over the most recent two rounds or of the samples actually analyzed over the past year (past four rounds), 75 % or more of the analyze sample results must be acceptable. According to the above rating criteria of PAT program, performance of metals including cadmium, lead, chromium and zinc, and asbestos sample analyses were rated acceptable ("A"). For silica analyses, all samples except one out of four samples in round 122 was rated high("H") were acceptable showing 95 % of ing 95 % of acceptance rate (19/20) throughout the rounds. Analyses of organic solvents were done on 52 samples in 9 types including methanol(MOH), 1,1,1-trichloroethane(MCM), tetrachloroethylene(PCE), trichloroethylene(TCE), benzene(BNZ), o-xylene(OXY), toluene(TOL), chloroform(CFM), 1,2-dichloroethane(DCE). All samples analyzed were rated acceptable except 2 samples that were rated high; one out of each four MCM and TCE samples in round 121, and one that was low out of four o-xylene analyses in round 122 indicating 94 % of acceptance rate(49/52) throughout the rounds. According to the laboratory rating criteria, our laboratory is rated proficient so far for all types of contaminants.

  • PDF

A TCP-Friendly Control Method using Neural Network Prediction Algorithm (신경회로망 예측 알고리즘을 적용한 TCP-Friednly 제어 방법)

  • Yoo, Sung-Goo;Chong, Kil-To
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.105-107
    • /
    • 2006
  • As internet streaming data increase, transport protocol such as TCP, TGP-Friendly is important to study control transmission rate and share of Internet bandwidth. In this paper, we propose a TCP-Friendly protocol using Neural Network for media delivery over wired Internet which has various traffic size(PTFRC). PTFRC can effectively send streaming data when occur congestion and predict one-step ahead round trip time and packet loss rate. A multi-layer perceptron structure is used as the prediction model, and the Levenberg-Marquardt algorithm is used as a traning algorithm. The performance of the PTFRC was evaluated by the share of Bandwidth and packet loss rate with various protocols.

  • PDF

Measurements of a Round Jet with High-Definition 3D-PTV

  • Hwang, Tae-Gyu;Doh, Deog-Hee;Saga Tetsuo;Kenneth D. Kihm
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.28 no.8
    • /
    • pp.1211-1224
    • /
    • 2004
  • Two round jets. impinged and pulsed. were measured with high-resolution 3D-PTV technique. The measurement system consists of three CCD cameras, Ar-ion laser, an image grabber and a host computer. Two fitness functions were introduced in a genetic algorithm in order to enhance the correspondences of the particles. One was based on a concept of the continuum theory and the other one was based on a minimum distance error. The velocity profiles of the impinged jet obtained by the constructed 3D-PTV system were compared with those of LDV measurements made in this study. The head vortex of the jet was visualized by LIF and was reconstructed by the constructed high-resolution 3D-PTV system for comparisons.

INFLUENCES OF APICOECTOMY AND RETROGRADE CAVITY PREPARATION METHODS ON THE APICAL LEAKAGE (치근단절제 및 역충전와동 형성방법이 치근단누출에 미치는 영향)

  • Yang, Jeong-Ok;Kim, Sung-Kyo;Kwon, Tae-Kyung
    • Restorative Dentistry and Endodontics
    • /
    • v.23 no.2
    • /
    • pp.537-549
    • /
    • 1998
  • The purpose of this study was to evaluate the influence of root resection and retrograde cavity preparation methods on the apical leakage in endodontic surgery. To investigate the effect of various root resection and retrograde cavity preparation methods on the apical leakage, 71 roots of extracted human maxillary anterior teeth and 44 mesiobuccal roots of extracted human maxillary first molars were used. Root canals of the all the specimens were prepared with step-back technique and filled with gutta-percha by lateral condensation method. Three millimeters of each root was resected at a 45 degree angle or perpendicular to the long axis of the tooth according to the groups. Retrograde cavities were prepared with ultrasonic instruments or a slow-speed round bur, and occlusal access cavities were filled with zinc oxide eugenol cement. Three coats of clear nail polish were placed on the lateral and coronal surfaces of the specimens except the apical cut one millimeter. All the specimens were immerged in 2% methylene blue solution for 7 days in an incubator at $37^{\circ}C$. The teeth were dissolved in 14 ml of 35% nitric acid solution and the dye present within the root canal system was returned to solution. The leakage of dye was quantitatively measured via spectrophotometric method. The obtained data were analysed statistically using two-way ANOVA and Duncans Multiple Range Test. The results were as follows: 1. No statistically significant difference was observed between ultrasonic retrograde cavity preparation method and slow-speed round bur technique, without apical bevel (p>0.05). 2. Ultrasonic retrograde preparation method showed significantly less apical leakage than slow-speed round bur technique, with bevel (p<0.0001). 3. No statistically significant difference was found between beveled resected root surface and non-beveled resected root surface, with ultrasonic technique (p>0.05). 4. Non-beveled resected root surface showed significantly less apical leakage than beveled resected root surface, with slow-speed round bur technique (p<0.0001). 5. No statistically significant difference in apical leakage was found between the group of retrograde cavity prepared parallel to the long axis of the tooth and the group of one prepared perpendicular to the long axis of the tooth (p>0.05). 6. Regarding isthmus preparation, ultrasonic retrograde preparation method showed significantly less apical leakage than slow-speed round bur technique, in the mesiobuccal root of maxillary molar, without bevel (p<0.0001).

  • PDF

A Study on Phrygia Headgear (프리기아[Phrygia] 모자에 대한 연구)

  • Yi-Chang Youngsoo
    • Journal of the Korean Society of Costume
    • /
    • v.55 no.4 s.94
    • /
    • pp.138-150
    • /
    • 2005
  • Phrygia headgear has an important meaning from the perspectives of costume history and cultural exchanges in ancient times. This study is to investigate the prototype of Phrygia headgear through analysis of its manufacturing methods and styles on the basis of prior studies on ancient sculptures and literatures conducted by European researchers and to examine its history and meanings. In these ways, this study will be helpful in understanding the importance of Phrygia headgear in cultural exchanges between the East and the West. Results of this study can be summarized as follows: Phrygia headgear was orn by eastern tribes, so it was a symbol of those from the east in ancient times. Phrygia headgear is frequently found in Greek artistic works of 5th to 4th century BC that depicted eastern tribes. Also, this headgear can be observed in artistic works for Mithras, Attis, or other gods. Since Phrygia headgear's shape is similar to that of Homer's helm, many researchers believe that it might be originated from Homer's helm. This headgear made of oxen scrotum(stierbeutel) or its surrounding skin has a long end at the top. This long end is round and drooping toward the front side. From such unique shape, we top. This long end is round and drooping toward the front side. From such unique shape, we top. This long end is round and drooping toward the front side. From such unique shape, we can draw a conclusion that Phrygia headgear was made of oxen scrotum and its surrounding skin. Dependingy on drooping patterns, there are various shapes, such as the round, tightly swollen one worn by Mithras, the tongue-shaped one found in Basilika S. Apolinare Nuovo's mosaic depicting three wise men, the balloon-shaped one frequently found in Greek vases depicting Scythian, and the one drooping to the side depicted in Alexandersarkophag. Further, some Phrygia headgear has covers for neck and ears. For example, Phrygia headgear worn by Persian Satrap tribe has such covers attached to the head part. Meanwhile, Phrygia headgear worn by Amazone tribe does not show such separate covers, Rather, one piece of oxen skin was tanned and finished to make such covers. Wearing Phrygia headgear can be interpreted in several ways. Use of animal's skin for wearing things is a unique aspect in ancient societies because they believed that wearing animal skin would give them power of the animal. Further, Phrygia headgear made of oxen scrotum was a symbol of reproductive power to women.

Efficient Fault-Tolerant Conference-Key Agreement using ID-based One Round Tripartite Key Agreement Protocol (아이디 기반의 일 라운드 삼자 간 키 합의 프로토콜을 이용한 효율적인 결함 허용 회의 키 합의 방법)

  • Lee, Sang-Ho;Kim, Jong;Hong, Sung-Je
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.5
    • /
    • pp.512-516
    • /
    • 2008
  • A conference-key agreement protocol is essential for computer network conferences that need secure communications. Especially, the fault-tolerant conference-key agreement can make a shared conference-key even if some make conferees disturb the key agreement processes. However, the performance of the previous fault-tolerant conference-key agreement protocols is decreasing significantly when the number of fake conferees is increasing. In this paper, we propose an efficient fault-tolerant conference key agreement protocol. Our scheme is based on the ID-based one round tripartite conference key agreement protocol. Simulation results show our scheme's efficiency against Yi's method especially when the number of fake conferees is large.

Air-Side Performance of Fin-and-Tube Heat Exchangers Having Sine Wave Fins and Oval Tubes (사인 웨이브 핀과 타원관으로 구성된 핀-관 열교환기의 공기측 성능)

  • Choi, Byung-Nam;Yi, Fung;Sim, Hyun-Min;Kim, Nae-Hyun
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.25 no.5
    • /
    • pp.279-288
    • /
    • 2013
  • Heat transfer and pressure drop characteristics of fin-and-tube heat exchangers having sine wave fins and oval tubes were investigated. Oval tubes having an aspect ratio of 0.6 were made, by deforming 12.7 mm round tubes. Twelve samples, having different fin pitch and tube row, were tested. The effect of fin pitch on the j and f factors was negligible. The effect of the tube row on the j factor, however, was different from that of common fin-and-tube heat exchangers having plain fins and round tubes. The highest j factor was obtained for a two-row configuration, while the lowest one was obtained for a one-row configuration. A possible reason was attributed to the flow mixing characteristics of the sine wave channel of the present geometry. Comparison with a plain fin-and-tube heat exchanger having 15.88 mm O. D. round tube reveals that the present oval fin-and-tube heat exchanger shows generally superior thermal performance, except for the one-row configuration.

Determination of Energy and Nutrient Utilization of Enzyme-treated Rump Round Meat and Lotus Root Designed for Senior People with Young and Age d Hens as an Animal Model

  • Park, Okrim;Kim, Jong Woong;Lee, Hong-Jin;Kil, Dong Yong;Auh, Joong-Hyuck
    • Food Science of Animal Resources
    • /
    • v.36 no.1
    • /
    • pp.109-113
    • /
    • 2016
  • This study aimed to examine the nutrient utilization of rump round meat and lotus root using young (32 wk) and aged hens (108 wk) as an animal model. Rump round meat and lotus root were prepared with or without enzymatic treatment. For each age group of laying hens, a total of 24 Hy-Line Brown laying hens were randomly allotted to one of two dietary treatments with six replicates. For rump round meat, the true total tract retention rate (TTTR) of dry matter (DM) and nitrogen (N) were unaffected by either enzymatic treatment or hen age. However, aged hens had greater (p<0.01) TTTR of energy and crude fat than young hens. Enzymatic treatment did not influence the TTTR of energy or crude fat. In addition, we did not observe any significant interaction between the TTTR of DM, energy, N, or crude fat in rump round meat and hen age or enzymatic treatment. The TTTR of DM remained unchanged between controls and enzyme-treated lotus root for young hens. However, enzyme-treated lotus root exhibited greater (p<0.05) TTTR of DM than control lotus root for aged hens, resulting in a significant interaction (p<0.05). The TTTR of energy and N in lotus roots were greater (p<0.01) for aged hens than for young hens. In conclusion, enzymatic treatment exerted beneficial effects on energy and nutrient utilization in aged hens, suggesting the aged hen model is practical for simulation of metabolism of elderly individuals.