The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] FMS(7hit)

1-7hit
  • IVs to Skip for Immunizing WEP against FMS Attack

    Kazukuni KOBARA  Hideki IMAI  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E91-B No:1
      Page(s):
    164-171

    The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over-the-air communication. While almost all of the WLAN (Wireless LAN) cards and the APs (Access Points) support WEP, a serious key recovery attack (aka FMS attack) was identified by Fluhrer et al. The FMS attack can basically be prevented by skipping IVs (Initial Values) used in the attack, but naive skip methods reveal information on the WEP key since most of them depend on the WEP key and the patterns of the skipped IV reveal it. In order to skip IVs safely, the skip patterns must be chosen carefully. In this paper, we review the attack conditions (6) and (7), whose success probability is the highest, 0.05, amongst all known conditions to guess one key-byte from one packet. Then we identify their safe skip patterns.

  • Key-Dependent Weak IVs and Weak Keys in WEP--How to Trace Conditions Back to Their Patterns--

    Kazukuni KOBARA  Hideki IMAI  

     
    PAPER-Information Security

      Vol:
    E89-A No:8
      Page(s):
    2198-2206

    The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over the air communication. While almost all of the WLAN (Wireless LAN) cards and the APs (Access Points) support WEP, a serious key recovery attack (aka FMS attack) was identified by Fluhrer et al. The attack was then extended and implemented as WEP cracking tools. The key recovery attacks can basically be prevented by skipping certain IVs (Initial Values) called weak IVs, but the problem is that there exist huge amount of key-dependent weak IVs and the patterns of them have not been fully identified yet. The difficult part is that a naive approach to identify the key-dependent weak IVs requires the exhaustive search of IVs and WEP keys, and hence is infeasible. On the other hand, it might be feasible to skip the key-dependent weak IVs for the currently set WEP key but this reveals information on the WEP key from the skipped patterns. To skip them safely, the patterns of the key-dependent weak IVs must be identified in the first place. In this paper, we analyze the famous condition for IVs and WEP keys to be weak in the FMS attack, i.e. 0≤S[1]≤t'

  • A Coordinator for Workflow Management Systems with Information Access Control

    Shih-Chien CHOU  Chien-Jung WU  

     
    PAPER-Application Information Security

      Vol:
    E88-D No:12
      Page(s):
    2786-2792

    This paper proposes a coordinator for workflow management systems (WFMSs). It is a basic module for developing WFMSs. It is also a coordinator to coordinate multiple WFMSs. The coordinator provides functions to facilitate executing workflows and to ensure secure access of workflow information. Facilitating workflow execution is well-known, but ensuring secure access of workflow information is identified as important only recently. Although many models ensure secure workflow information access, they fail to offer the features we need. We thus developed a new model for the control. This paper presents the coordinator its access control model.

  • Speckle Reduction for Ultrasonic Images Using Fuzzy Morphology

    Erwin AVIANTO  Masayasu ITO  

     
    PAPER-Image Processing, Image Pattern Recognition

      Vol:
    E84-D No:4
      Page(s):
    502-510

    To develop a smoothing method for speckle reduction is a significant problem, because of the complex ultrasonic characteristics and the obscurity of the tissue image. This paper presents a new method for speckle reduction from medical ultrasonic image by using fuzzy morphological speckle reduction algorithm (FMSR) that preserves resolvable details while removing speckle in order to cope with the ambiguous and obscure ultrasonic images. FMSR creates a cleaned image by recombining the processed residual images with a smoothed version of an original image. Performance of the proposed method has been tested on the phantom and tissue images. The results show that the method effectively reduces the speckle while preserving the resolvable details.

  • Optimal Cycle Time and Facility Utilization of Production Systems Including Repetitive Process with Set-up Time Modelled by Timed Marked Graphs

    Masaki AKAZA  Dong-Ik LEE  Sadatoshi KUMAGAI  

     
    PAPER

      Vol:
    E75-A No:10
      Page(s):
    1385-1393

    A job shop system typically seen in flexible manufacturing systems (FMS) is a system composed of a set of machines and a various kind of jobs processed with the machines. A production system of semiconductor fabrication is an example of job shop systems, which has main features of repetitive processes of one part and set-up times required for machines processing different types of parts. On the other hand, timed Petri nets are used for modelling and analyzing a wide variety of discrete event systems. There are many applications of timed Petri nets to the scheduling problems of job shop systems. The performance evaluation and steady state behaviors are studied by using the maximum cycle time of timed marked graphs. The aim of this paper is to propose a new model for production systems including repetitive processes and set-up time requirements which enables the quantitative analysis of real time system performance. In job shop systems such as a semiconductor fabrication system, it takes considerable amount of set-up time to prepare different types of chemical reactions and the model should take account of a set-up time for each machine. We focus upon the relationship between facility utilization factor and production cycle time in the steady state. In the proposed model, the minimum total set-up time can be attained. Quantitative relationship between utilization factor and production cycle time is derived by using the proposed model. A utilization factor of a system satisfying a given limit of the cycle time is evaluated, and the improvement of the utilization factor is considered. Conversely, we consider the improvement of the cycle time of a system satisfying a given limit of utilization factor.

  • Multilayer MMIC Using a 3 µmN-Layer Dielectric Film Structure

    Tsuneo TOKUMITSU  Takahiro HIRAOKA  Hiroyuki NAKAMOTO  Masayoshi AIKAWA  

     
    PAPER

      Vol:
    E75-C No:6
      Page(s):
    698-706

    Novel, very small-size multilayer MMIC's using miniature microstrip lines on a thin dielectric film, as well as the features of the multilayer structure, are presented. Very narrow-width thin-film transmission lines, meander-like configurations, line crossovers, and vertical connections, which are effective for significant chip-size reduction and flexible layout, are realized and utilized in a 2.5-3 µmN-layer dielectric film structure. 180-degree and 90-degree hybrids and umltiport Wilkinson dividers, which are implemented in small areas of 0.1 mm2 and 1.7 mm2, are presented. Furthermore, layout flexibility in the multilayer structure is demonstrated by implementing distributed amplifiers into the layers.

  • Miniaturized MMIC Mixers; Image Rejection and Balanced Mixers Using Multilayer Microstrip Lines and Line-Unified HEMT Modules

    Tsutomu TAKENAKA  Hiroyo OGAWA  

     
    PAPER

      Vol:
    E75-C No:6
      Page(s):
    689-697

    This paper proposes an MMIC image rejection mixer and an MMIC balanced mixer employing multilayer microstrip lines and high-electron-mobility-field-effect-transistor (HEMT)s with a LUFET configuration (line-unified HEMT module). The advantage of the mixers is remarkable chip size reduction by the combination of the two technologies. The multilayer microstrip line, in which one microstrip line is placed upon another, is used for stacking passive circuits, e.g. a 90 hybrid and distributed lines, to reduce the chip-area occupied by transmission lines, and to allow flexible line allocation. The line-unified HEMT module provides all functions required for in-phase/out-of-phase power divider/combiners in HEMT electrode and unified coplanar lines configuration. A 29-32 GHz image rejection mixer and a 3-27 GHz balanced mixer are realized in only 1.6 mm 1.0 mm and 1.8 mm 1.2 mm MMIC chip size, respectively.