Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2019.9.1.086

A Study on Countermeasures using Moire Recognition and Vulnerability of Cryptographic Transaction Protocol  

Kim, Jin-Woo (Division of Information Communication, Baek-seok University)
Lee, Keun-Ho (Division of Information Communication, Baek-seok University)
Yun, Sunghyun (Division of Information Communication, Baek-seok University)
Publication Information
Journal of Convergence for Information Technology / v.9, no.1, 2019 , pp. 86-91 More about this Journal
Abstract
Block chains began by recognizing the danger of centralized control of financial systems after the 2008 financial crisis. From the beginning of 2008, blockchain has been developing a lot of attention and technology, starting with a tremendous innovation called cryptographic destruction based on technology, a block chain called Bitcoin. However, the vulnerability has also been discovered over time and the damage has been repeated. But in the fourth industry of the 21st century, many advances and technologies based on them are expected to emerge. Therefore, this paper proposes new analytical transaction protocols for vulnerabilities in cryptographic currency transactions. The proposed transaction protocol is a way to authenticate once again at the end of the transaction and the transaction is concluded with this authentication. It presents countermeasures by adding security elements between users to the transaction process rather than internal security to transaction vulnerabilities.
Keywords
Encryption currency; trading protocol; moire; multiple fingerprint recognition; bitcoin;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Nakamoto. (2018, Apr). Bitcoin: A Peer-to-Peer Eletronic Cash System. https://bitcoin.org/bitcoin.pdf.
2 F. A Petitcolas, R. J. Anderson & M. G. Kuhn. (1999). Information Hidden ? A Survey. Proceedings of the IEEE, special issue on protection of multimedia content.
3 N. F. Johnson & S. Jajodia. (1998). Exploring steganography: Seeing the unseen. Computer, 31(2).   DOI
4 H. O. Kang & J. Y. Choi. (2003). Key Generation Method using the Moire Patterns for Security. KOREA INFORMATION SCIENCE SOCIETY, 766-768.
5 B. Schneier. (1996). Applied Cryptography. New York, USA : John wiley & Sons.
6 I. H. Kim, K. C. Yook & J. H. Jang. (1992). Measurement of Rotation Angle using Moire Interference Pattern of Two Circular Gratings. New Physics, 32, 674-678.
7 doopedia. https://terms.naver.com/entry.nhn?docId=1261281&cid=40942&categoryId=32235
8 S. G. Kang, H. J. Bae, S. H. Lim & Y. S. Lee. (2017). A Study on the Vulnerability and Countermeasures of Bitcoin. Proceedings of the Korean Society of Computer Information Conference, 25(2), 124-127.
9 Financial Security Institute. (2017). BlockChain Technology and Security Considerations.
10 S. J. Seong. (2017). Legal challenges for activating blockchain - negative regulation discussion. BUSINESS LAW REVIEW, 31(2), 325-352.   DOI
11 J. S. Kim. (2018). Service Status and Problem Analysis Based on Blockchain. The Society of Convergence Knowledge Transactions, 6(1), 135-140.   DOI
12 J. Y. Lee. (2017). Block Chain Technology Trends and Implications. Science and Technology Policy Institute, 1-21.
13 B. K. Min, Y. J. Sung & W. I. Park. (2018). Is sues and Policy Implications of Bitcoin and Block Chain. Gyeonggi Research Institute, 1-27.
14 Y. D. Hwan. (2003). A Study on Development of High-Speed 3D Shape Measuring System Using Moire Measurement Technology. Industrial Technology Development Project.
15 Y. S. Chung & J. S. Cha. (2018). The Security Risk and Countermeasures of Blockchain based Virtual Currency Trading. Korea Information Electron Communication Technology.
16 The Kyunghyang Shinmun. http://biz.khan.co.kr/khan_art_view.html?artid=201707031758001&%3Bcode=9 20100