• Title/Summary/Keyword: process communication

Search Result 7,486, Processing Time 0.037 seconds

NIST Lightweight Cryptography Standardization Process: Classification of Second Round Candidates, Open Challenges, and Recommendations

  • Gookyi, Dennis Agyemanh Nana;Kanda, Guard;Ryoo, Kwangki
    • Journal of Information Processing Systems
    • /
    • v.17 no.2
    • /
    • pp.253-270
    • /
    • 2021
  • In January 2013, the National Institute of Standards and Technology (NIST) announced the CAESAR (Competition for Authenticated Encryption: Security, Applicability, and Robustness) contest to identify authenticated ciphers that are suitable for a wide range of applications. A total of 57 submissions made it into the first round of the competition out of which 6 were announced as winners in March 2019. In the process of the competition, NIST realized that most of the authenticated ciphers submitted were not suitable for resource-constrained devices used as end nodes in the Internet-of-Things (IoT) platform. For that matter, the NIST Lightweight Cryptography Standardization Process was set up to identify authenticated encryption and hashing algorithms for IoT devices. The call for submissions was initiated in 2018 and in April 2019, 56 submissions made it into the first round of the competition. In August 2019, 32 out of the 56 submissions were selected for the second round which is due to end in the year 2021. This work surveys the 32 authenticated encryption schemes that made it into the second round of the NIST lightweight cryptography standardization process. The paper presents an easy-to-understand comparative overview of the recommended parameters, primitives, mode of operation, features, security parameter, and hardware/software performance of the 32 candidate algorithms. The paper goes further by discussing the challenges of the Lightweight Cryptography Standardization Process and provides some suitable recommendations.

Nonlinear Process Modeling Using Hard Partition-based Inference System (Hard 분산 분할 기반 추론 시스템을 이용한 비선형 공정 모델링)

  • Park, Keon-Jun;Kim, Yong-Kab
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.7 no.4
    • /
    • pp.151-158
    • /
    • 2014
  • In this paper, we introduce an inference system using hard scatter partition method and model the nonlinear process. To do this, we use the hard scatter partition method that partition the input space in the scatter form with the value of the membership degree of 0 or 1. The proposed method is implemented by C-Means clustering algorithm. and is used for the initial center values by means of binary split. by applying the LBG algorithm to compensate for shortcomings in the sensitive initial center value. Hard-scatter-partitioned input space forms the rules in the rule-based system modeling. The premise parameters of the rules are determined by membership matrix by means of C-Means clustering algorithm. The consequence part of the rules is expressed in the form of polynomial functions and the coefficient parameters of each rule are determined by the standard least-squares method. The data widely used in nonlinear process is used to model the nonlinear process and evaluate the characteristics of nonlinear process.

A Study on Searching Stabled EMI Shielding Effectiveness Measurement Point for Military Communication Shelter Using Support Vector Machine and Process Capability Analysis (서포트 벡터 머신과 공정능력분석을 이용한 군 통신 쉘터의 EMI 차폐효과 안정 포인트 탐색 연구)

  • Ku, Ki-Beom;Kwon, Jae-Wook;Jin, Hong-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.321-328
    • /
    • 2019
  • A military shelter for communication and information is necessary to optimize the integrated combat ability of weapon systems in the network centric warfare. Therefore, the military shelter is required for EMI shielding performance. This study examines the stable measurement points for EMI shielding effectiveness of a military shelter for communication and information. The measurement points were found by analyzing the EMI shielding effectiveness measurement data with data mining technique and process capability analysis. First, a support vector machine was used to separate the measurement point that has stable EMI shielding effectiveness according to set condition. Second, this process was conducted with process capability analysis. Finally, the results of data mining technique were compared with those of process capability analysis. As a result, 24 measurement points with stable EMI shielding effectiveness were found.

Audio /Speech Codec Using Variable Delay MDCT/IMDCT (가변 지연 MDCT/IMDCT를 이용한 오디오/음성 코덱)

  • Sangkil Lee;In-Sung Lee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.2
    • /
    • pp.69-76
    • /
    • 2023
  • A high-quality audio/voice codec using the MDCT/IMDCT process can perfectly restore the current frame through an overlap-add process with the previous frame. In the overlap-add process, an algorithm delay equal to the frame length occurs. In this paper, we propose a MDCT/IMDCT process that reduces algorithm delay by using a variable phase shift in MDCT/IMDCT process. In this paper, a low-delay audio/speech codec was proposed by applying the low delay MDCT/IMDCT algorithm to the ITU-T standard codec G.729.1 codec. The algorithm delay in the MDCT/IMDCT process can be reduced from 20 ms to 1.25 ms. The performance of the decoded output signal of the audio/speech codec to which low-delay MDCT/IMDCT is applied is evaluated through the PESQ test, which is an objective quality test method. Despite of the reduction in transmission delay, it was confirmed that there is no difference in sound quality from the conventional method.

L3 Socialization of a Group of Mongolian Students Through the Use of a Written Communication Channel in Korea: A Case Study

  • Kim, Sun-Young
    • Cross-Cultural Studies
    • /
    • v.19
    • /
    • pp.411-444
    • /
    • 2010
  • This paper explored the academic socialization of a group of Mongolian college students, learning Korean as their L3 (Third Language), by focusing on their uses of an electronic communication channel. From a perspective of the continua of bi-literacy, this case study investigated how Mongolian students who had limited exposure to a Korean learning community overcame academic challenges through the use of a written communication channel as a tool in the socialization process. Data were collected mainly through three methods: written products, interviews, and questionnaires. The results from this study were as follows. Interactional opportunities for these minority students were seriously constrained during the classroom practices in a Korean-speaking classroom. They also described the lack of communicative competence in Korean and the limited roles played by L2 (English) communication as key barriers to classroom practices. However, students' ways of engaging in electronic interactions differed widely in that they were able to broaden interactional circles by communicating their expertise and difficulties with their Korean peers through the electronic channel. More importantly, the communication pattern of "L2-L2/L3-L3" (on a L2-L3 continuum) emerging from data demonstrated how these students used a written channel as a socialization tool to mediate their learning process in a new community of learning. This study argues that a written communication channel should be taken as an essential part of teaching practices especially for foreign students who cannot speak Korean fluently in multi-cultural classes.

Secure Communication Schemes over ISO/IEEE 11073-20601 for Smart Healthcare Service

  • Kim, Sang Kon;Kim, Tae Kon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2225-2238
    • /
    • 2022
  • For advanced healthcare services, a variety of agents should maintain reliable connections with the manager and communicate personal health and medical information. The ISO/IEEE 11073 standards provide convenient interoperability and the optimized exchange protocol (OEP) supports efficient communication for devices. However, the standard does not specify secure communication, and sensitive personal information is easily exposed through attacks. Malicious attacks may lead to the worst results owing to service errors, service suspension, and deliberate delays. All possible attacks on the communication are analyzed in detail, and the damage is specifically identified. In this study, novel secure communication schemes over the 20601 OEP are proposed by introducing an authentication process while maintaining compatibility with existing devices. The agent performs a secure association with the manager for mutual authentication. However, communication with mutual authentication is not completely free from attacks. Message encryption schemes are proposed for concrete security. The authentication process and secure communication schemes between the secure registered agent (SRA) and the secure registered manager (SRM) are implemented and verified. The experimental analysis shows that the complexities of the SRA and SRM are not significantly different from those of the existing agent and manager.

Power system protection IED design using an embedded processor (임베디드 프로세서를 이용한 계통 보호 IED 설계)

  • Yoon, Ki-Don;Son, Young-Ik;Kim, Kab-Il
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.711-713
    • /
    • 2004
  • In the past time, the protection relay did only a protection function. Currently, its upgraded device i.e. IED(Intelligent Electric Device) has been designed to protect, control, and monitor the whole power system automatically. Also the device is desired to successfully measure important elements of the power system. This paper considers design method of a digital protection IED with a function of measuring various elements and a communication function. The protection IED is composed of the specific function modules that are signal process module, communication module, input/output module and main control module. A signal process module use a DSP processor for analysis of input signal. Main control module use a embedded processor, Xscale, that has an ARM Core. The communication protocol uses IEC61850 protocol that becomes standard in the future. The protection IED is able to process mass information with high-performance processor. As each function module is designed individually, the reliability of the device can be enhanced.

  • PDF

Morphological Operations to Segment a Tumor from a Magnetic Resonance Image

  • Thapaliya, Kiran;Kwon, Goo-Rak
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.1
    • /
    • pp.60-65
    • /
    • 2014
  • This paper describes an efficient framework for the extraction of a brain tumor from magnetic resonance (MR) images. Before the segmentation process, a median filter is used to filter the image. Then, the morphological gradient is computed and added to the filtered image for intensity enhancement. After the enhancement process, the thresholding value is calculated using the mean and the standard deviation of the image. This thresholding value is used to binarize the image followed by the morphological operations. Moreover, the combination of these morphological operations allows to compute the local thresholding image supported by a flood-fill algorithm and a pixel replacement process to extract the tumor from the brain. Thus, this framework provides a new source of evidence in the field of segmentation that the specialist can aggregate with the segmentation results in order to soften his/her own decision.

Analysis of SSL Communication Process in CNG Crypto Library (CNG 암호 라이브러리에서의 SSL 통신과정 분석)

  • Lee, Kyungroul;Oh, Insu;Lee, Sun-Young;Yim, Kangbin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.5
    • /
    • pp.1027-1037
    • /
    • 2017
  • By a spread of utilizing environment of the CNG library, it is required to analyze its vulnerability. For this reason, in this paper, we analyzed SSL communication process in CNG library. This study is expected to draw vulnerabilities and security threats and improve security criteria for various applications to fully take advantage of the CNG library.

A Study on a Forecasting the Demand for the Future Mobile Communication Service by Integrating the Mobile Communication Technology (이동통신기술과의 연관성을 고려한 차세대 이동통신서비스의 수요예측에 관한 연구)

  • 주영진;김선재
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.29 no.1
    • /
    • pp.87-99
    • /
    • 2004
  • In this paper, we have developed a technology-service relationship model which describes the diffusion process of a group of services and relevant technologies, and have applied the developed model to the prediction of the number of subscribers to the next generation mobile service. The technology-service relationship model developed in this paper incorporates the developing process of relevant technologies, a supply-side factor, into the diffusion process of specific services, while many diffusion models and multi-generation diffusion models in previous researches are mainly reflect the demand-side factors. So, the proposed model could effectively applied to the telecommunication services where the developing of the relevant technologies are very essential to the service Penetration. In our application, the Proposed model provides a competitive substitution between the next generation mobile service and the traditional mobile service.