• Title/Summary/Keyword: Key way

Search Result 1,486, Processing Time 0.031 seconds

Development and Performance Evaluation of Small and Practical Key Way Machine (실용적인 소형 Key 홈 가공기 개발 및 성능평가)

  • 조종래;고권호;정윤교
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.04a
    • /
    • pp.496-500
    • /
    • 2001
  • When we cut a key way on the axial or on the boss, we generally use a slotter or a broach. To do the key seating, turing operations have to be preceded and then the key on the axial or on the boss can be seated. For this reason, the production process of key way cutting becomes complicated. If is necessary to simplify the process and we have developed a small practical machine for key way cutting. The machine is located on the carriage of the lathe. Using this small and practical key way machine, after operation the turing, you do not have to remove the workpiece from the chuck of the lathe to carry on the key seating process. The developed machine will save cutting time and the cost.

  • PDF

A Provable One-way Authentication Key Agreement Scheme with User Anonymity for Multi-server Environment

  • Zhu, Hongfeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.811-829
    • /
    • 2015
  • One-way authenticated key agreement protocols, aiming at solving the problems to establish secure communications over public insecure networks, can achieve one-way authentication of communicating entities for giving a specific user strong anonymity and confidentiality of transmitted data. Public Key Infrastructure can design one-way authenticated key agreement protocols, but it will consume a large amount of computation. Because one-way authenticated key agreement protocols mainly concern on authentication and key agreement, we adopt multi-server architecture to realize these goals. About multi-server architecture, which allow the user to register at the registration center (RC) once and can access all the permitted services provided by the eligible servers. The combination of above-mentioned ideas can lead to a high-practical scheme in the universal client/server architecture. Based on these motivations, the paper firstly proposed a new one-way authenticated key agreement scheme based on multi-server architecture. Compared with the related literatures recently, our proposed scheme can not only own high efficiency and unique functionality, but is also robust to various attacks and achieves perfect forward secrecy. Finally, we give the security proof and the efficiency analysis of our proposed scheme.

Analysis of Mutual Authentication, Key generation and Key exchange mechanism of IEEE 802.11i (IEEE 802-11i의 상호인증과 키 생성 및 교환 메커니즘 분석)

  • 박지혜;문일현;이옥연;김창범
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.249-253
    • /
    • 2003
  • 기존의 무선 랜의 보안상의 문제점들을 해결하기 위하여 사용자와 인증자사이의 상호인증과 키를 교환하는 메커니즘이 요구된다. 이것을 보안하기 위해 IEEE 802.11i에서 키 체계와 4-Way Handshake를 제안하였다. 본 논문에서 언급되는 키 생성 및 교환 메커니즘은 사용자와 서버간의 인증된 마스터키를 통한 사용자와 인증자의 상호인증과, 키 생성과 키 교환하는 방법에 초점을 맞추고 있다. 이러한 키를 생성하기 위한 Pairwise 키 체계와 키 교환을 위한 4-Way Handshake, 4-Way Handshake에서 사용되는 EAPOL-Key message에 대하여 분석하였다.

  • PDF

Segment Training Based Individual Channel Estimation for Multi-pair Two-Way Relay Network with Power Allocation

  • He, Xiandeng;Zhou, Ronghua;Chen, Nan;Zhang, Shun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.566-578
    • /
    • 2018
  • In this paper, we design a segment training based individual channel estimation (STICE) scheme for the classical two-way relay network (TWRN) with multi-pair sources (MPS) and amplify-and-forward (AF). We adopt the linear minimum mean square error (LMMSE) channel estimator to minimize the mean square error (MSE) without channel estimation error, where the optimal power allocation strategy from the relay for different sources is obtained. Then the MSE gains are given with different source pairs among the proposed power allocation scheme and the existing power allocation schemes. Numerical results show that the proposed method outperforms the existing ones.

A Study on the Certification System in Electromic Commerce (전자상거래(電子商去來)의 인증체계(認證體系)에 관한 고찰(考察))

  • Ha, Kang Hun
    • Journal of Arbitration Studies
    • /
    • v.9 no.1
    • /
    • pp.367-390
    • /
    • 1999
  • The basic requirements for conducting electronic commerce include confidentiality, integrity, authentication and authorization. Cryptographic algorithms, make possible use of powerful authentication and encryption methods. Cryptographic techniques offer essential types of services for electronic commerce : authentication, non-repudiation. The oldest form of key-based cryptography is called secret-key or symmetric encryption. Public-key systems offer some advantages. The public key pair can be rapidly distributed. We don't have to send a copy of your public key to all the respondents. Fast cryptographic algorithms for generating message digests are known as one-way hash function. In order to use public-key cryptography, we need to generate a public key and a private key. We could use e-mail to send public key to all the correspondents. A better, trusted way of distributing public keys is to use a certification authority. A certification authority will accept our public key, along with some proof of identity, and serve as a repository of digital certificates. The digital certificate acts like an electronic driver's license. The Korea government is trying to set up the Public Key Infrastructure for certificate authorities. Both governments and the international business community must involve archiving keys with trusted third parties within a key management infrastructure. The archived keys would be managed, secured by governments under due process of law and strict accountability. It is important that all the nations continue efforts to develop an escrowed key in frastructure based on voluntary use and international standards and agreements.

  • PDF

Comparison of cecal microbiota composition in hybrid pigs from two separate three-way crosses

  • Yang, Yuting;Shen, Liyan;Gao, Huan;Ran, Jinming;Li, Xian;Jiang, Hengxin;Li, Xueyan;Cao, Zhenhui;Huang, Ying;Zhao, Sumei;Song, Chunlian;Pan, Hongbin
    • Animal Bioscience
    • /
    • v.34 no.7
    • /
    • pp.1202-1209
    • /
    • 2021
  • Objective: The intestinal microbiota plays an important role in host physiology, metabolism, immunity, and behavior. And host genetics could influence the gut microbiota of hybrid animals. The three-way cross model is commonly utilized in commercial pig production; however, the use of this model to analyse the gut microbial composition is rarely reported. Methods: Two three-way hybrid pigs were selected, with Saba pigs as the starting maternal pig: Duroc× (Berkshire×Saba) (DBS) pig, Berkshire×(Duroc×Saba) (BDS) pig. One hundred pigs of each model were reared from 35 days (d) to 210 d. The body weight or feed consumption of all pigs were recorded and their feed/gain (F/G) ratio was calculated. On day 210, 10 pigs from each three-way cross were selected for slaughter, and cecal chyme samples were collected for 16S rRNA gene sequencing. Results: The final body weight (FBW) and average daily gain (ADG) of DBS pigs were significantly higher than those of BDS pigs (p<0.05), while the F/G ratios of DBS pigs were significantly lower than those of BDS pigs (p<0.05). The dominant phyla in DBS and BDS pigs were Bacteroidetes (55.23% vs 59%, respectively) and Firmicutes (36.65% vs 34.86%, respectively) (p>0.05). At the genus level, the abundance of Prevotella, Roseburia, and Anaerovibrio in DBS pigs was significantly lower than in BDS pigs (p<0.01). The abundance of Eubacterium, Clostridium XI, Bacteroides, Methanomassiliicoccus, and Parabacteroides in DBS pigs was significantly higher than in BDS pigs (p<0.05). The FBWs and ADGs were positively correlated with Bacteroides, ClostridiumXI, and Parabacteroides but negatively correlated with the Prevotella, Prevotella/Bacteroides (P/B) ratio, Roseburia, and Anaerovibrio. Conclusion: These results indicated that host genetics affect the cecal microbiota composition and the porcine gut microbiota is associated with growth performance, thereby suggesting that gut microbiota composition may be a useful biomarker in porcine genetics and breeding.

Optimal Diversity-Multiplexing Tradeoff of MIMO Multi-way Relay Channel

  • Su, Yuping;Li, Ying
    • ETRI Journal
    • /
    • v.35 no.5
    • /
    • pp.919-922
    • /
    • 2013
  • A MIMO multi-way relay channel with full data exchange in which K users exchange messages with each other via the help of a single relay is considered. For the case in which each link is quasi-static Rayleigh fading and the relay is full-duplex, the fundamental diversity-multiplexing tradeoff (DMT) is investigated, and we show that a compress-and-forward relay protocol can achieve the optimal DMT.

Adaptive Cooperation for Bidirectional Communication in Cognitive Radio Networks

  • Gao, Yuan;Zhu, Changping;Deng, Zhixiang;Tang, Yibin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1279-1300
    • /
    • 2017
  • In the interweave cognitive networks, the interference from the primary user degrades the performance of the cognitive user transmissions. In this paper, we propose an adaptive cooperation scheme in the interweave cognitive networks to improve the performance of the cognitive user transmissions. In the proposed scheme for the bidirectional communication of two end-source cognitive users, the bidirectional communication is completed through the non-relay direct transmission, the one-way relaying cooperation transmission, and the two-way relaying cooperation transmission depending on the limited feedback from the end-sources. For the performance analysis of the proposed scheme, we derive the outage probability and the finite-SNR diversity multiplexing tradeoff (f-DMT) in a closed form, considering the imperfect spectrum sensing, the interference from the primary user, and the power allocation between the relay and the end-sources. The results show that compared with the direct transmissions (DT), the pure one-way relaying transmissions (POWRT), and the pure two-way relaying transmissions (PTWRT), the proposed scheme has better outage performance. In terms of the f-DMT, the proposed scheme outperforms the full cooperation transmissions of the POWRT and PTWRT.

A Flexible Key Recovery System with One-way Key Distribution Property (일방향 키 분배 기능을 가지는 유연한 키 복구 시스템)

  • Yu, Jun-Seok;Kim, Hui-Do;Jeon, Jong-Min;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.8C no.3
    • /
    • pp.235-244
    • /
    • 2001
  • 급속산 암호의 민간 부문 확산에 따라 암소 사용으로 인한 부작용을 방지하기 위한 대책으로 키 복구에 대한 연구가 활발히 진행되고 있다. 그러나 지금까지 제시된 기존의 키 복구 기술들은 그 대부분이 정부의 법 집행권 보장에만 설계초점을 맞추고 있기 때문에 다양한 사용자들의 요구를 충족시키기 어렵다. 본 논문에서는 키 복구 시스템에 대한 사용주체들의 입장을 고려하여 다양한 환경에서 사용할 수 있는 키 복구 시스템을 제안한다. 제안하는 방식은 암호통신 과정 중에 키가 분배되는 일방향 키 분배가 가능하고 기존의 시스템만큼 효율적이며, 충분한 유연성을 제공한다.

  • PDF

Key Predistribution Schemes in Distributed Wireless Sensor Network (분산 무선 센서 네트워크에서의 선수 키 분배 방법)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.646-648
    • /
    • 2010
  • A Sensor Node in Wireless Sensor Network has very limited resources such as processing capability, memory capacity, battery power, and communication capability. When the communication between any two sensor nodes are required to be secured, the symmetric key cryptography technique is used for its advantage over public key cryptography in terms of requirement of less resources. Keys are pre-distributed to each sensor node from a set of keys called key pool before deployment of sensors nodes. Combinatorial design helps in a great way to determine the way keys are drawn from the key pool for distributing to individual sensor nodes. We study various deterministic key predistribution techniques that are based on combinatorial design.

  • PDF