• Title/Summary/Keyword: 공개 키

Search Result 1,162, Processing Time 0.026 seconds

Immersion Testing of Navigation Device Memory for Ship Track Extraction of Sunken Fishing Vessel (침몰 선박 항해장비의 항적추출 가능성 확인을 위한 침수시험)

  • Byung-Gil Lee;Byeong-Chel Choi;Ki-Jung Jo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.06a
    • /
    • pp.214-217
    • /
    • 2022
  • In the maritime digital forensic part, it is very important and difficult process that analysis of data and information with vessel navigation system's binary log data for situation awareness of maritime accident. In recent years, analysis of vessel's navigation system's trajectory information is an essential element of maritime accident investigation. So, we made an experiment about corruption with various memory device in navigation system. The analysis of corruption test in seawater give us important information about the valid pulling time of sunken ship for acquirement useful trajectory information.

  • PDF

Analysis on Decryption Failure Probability of TiGER (TiGER의 복호화 실패율 분석)

  • Seungwoo Lee;Jonghyun Kim;Jong Hwan Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.157-166
    • /
    • 2024
  • Probability of decryption failure of a public key cryptography based on LWE(learning with errors) is determined by its architecture and parameter settings. Since large decryption failure probability leads to attacks[1] on scheme as well as degradation of performance, TiGER[2], a Ring-LWE(R)-based KEM proposed for the first round of KpqC, tried to reduce the decryption failure probability by using error correction code Xef and D2 encoding method. However, D'Anvers et al. has shown that the commonly assumed independence of each bit error is not established since in the case of an encryption scheme based on Ring-LWE(R) using an error correction code, there is error dependency which is not negligible[3]. In this paper, since TiGER does not consider the error dependency, we calcualte the decryption failure probability of TiGER by considering the error dependency. In addition, we found that the bit error probability is incorrectly calculated in TiGER, so we present the correct calculation.

The State Hermitage Museum·Northwest University for Nationalities·Shanghai Chinese Classics Publishing House Kuche Art Relics Collected in Russia Shanghai Chinese Classics Publishing House, 2018 (아라사국립애이미탑십박물관(俄羅斯國立艾爾米塔什博物館)·서북민족대학(西北民族大學)·상해고적출판사(上海古籍出版社) 편(編) 『아장구자예술품(俄藏龜玆藝術品)』, 상해고적출판사(上海古籍出版社), 2018 (『러시아 소장 쿠차 예술품』))

  • Min, Byung-Hoon
    • MISULJARYO - National Museum of Korea Art Journal
    • /
    • v.98
    • /
    • pp.226-241
    • /
    • 2020
  • Located on the right side of the third floor of the State Hermitage Museum in St. Petersburg, the "Art of Central Asia" exhibition boasts the world's finest collection of artworks and artifacts from the Silk Road. Every item in the collection has been classified by region, and many of them were collected in the early twentieth century through archaeological surveys led by Russia's Pyotr Kozlov, Mikhail Berezovsky, and Sergey Oldenburg. Some of these artifacts have been presented around the world through special exhibitions held in Germany, France, the United Kingdom, the Netherlands, Korea, Japan, and elsewhere. The fruits of Russia's Silk Road expeditions were also on full display in the 2008 exhibition The Caves of One Thousand Buddhas - Russian Expeditions on the Silk Route on the Occasion of 190 Years of the Asiatic Museum, held at the Hermitage Museum. Published in 2018 by the Shanghai Chinese Classics Publishing House in collaboration with the Hermitage Museum, Kuche Art Relics Collected in Russia introduces the Hermitage's collection of artifacts from the Kuche (or Kucha) region. While the book focuses exclusively on artifacts excavated from the Kuche area, it also includes valuable on-site photos and sketches from the Russian expeditions, thus helping to enhance readers' overall understanding of the characteristics of Kuche art within the Buddhist art of Central Asia. The book was compiled by Dr. Kira Samosyuk, senior curator of the Oriental Department of the Hermitage Museum, who also wrote the main article and the artifact descriptions. Dr. Samosyuk is an internationally renowned scholar of Central Asian Buddhist art, with a particular expertise in the art of Khara-Khoto and Xi-yu. In her article "The Art of the Kuche Buddhist Temples," Dr. Samosyuk provides an overview of Russia's Silk Road expeditions, before introducing the historical development of Kuche in the Buddhist era and the aspects of Buddhism transmitted to Kuche. She describes the murals and clay sculptures in the Buddhist grottoes, giving important details on their themes and issues with estimating their dates, and also explains how the temples operated as places of worship. In conclusion, Dr. Samosyuk argues that the Kuche region, while continuously engaging with various peoples in China and the nomadic world, developed its own independent Buddhist culture incorporating elements of Gandara, Hellenistic, Persian, and Chinese art and culture. Finally, she states that the culture of the Kuche region had a profound influence not only on the Tarim Basin, but also on the Buddhist grottoes of Dunhuang and the central region of China. A considerable portion of Dr. Samosyuk's article addresses efforts to estimate the date of the grottoes in the Kuche region. After citing various scholars' views on the dates of the murals, she argues that the Kizil grottoes likely began prior to the fifth century, which is at least 100 years earlier than most current estimates. This conclusion is reached by comparing the iconography of the armor depicted in the murals with related materials excavated from the surrounding area (such as items of Sogdian art). However, efforts to date the Buddhist grottoes of Kuche must take many factors into consideration, such as the geological characteristics of the caves, the themes and styles of the Buddhist paintings, the types of pigments used, and the clothing, hairstyles, and ornamentation of the depicted figures. Moreover, such interdisciplinary data must be studied within the context of Kuche's relations with nearby cultures. Scientific methods such as radiocarbon dating could also be applied for supplementary materials. The preface of Kuche Art Relics Collected in Russia reveals that the catalog is the first volume covering the Hermitage Museum's collection of Kuche art, and that the next volume in the series will cover a large collection of mural fragments that were taken from Berlin during World War II. For many years, the whereabouts of these mural fragments were unknown to both the public and academia, but after restoration, the fragments were recently re-introduced to the public as part of the museum's permanent exhibition. We look forward to the next publication that focuses on these mural fragments, and also to future catalogs introducing the artifacts of Turpan and Khotan. Currently, fragments of the murals from the Kuche grottoes are scattered among various countries, including Russia, Germany, and Korea. With the publication of this catalog, it seems like an opportune time to publish a comprehensive catalog on the murals of the Kuche region, which represent a compelling mixture of East-West culture that reflects the overall characteristics of the region. A catalog that includes both the remaining murals of the Kizil grottoes and the fragments from different parts of the world could greatly enhance our understanding of the murals' original state. Such a book would hopefully include a more detailed and interdisciplinary discussion of the artifacts and murals, including scientific analyses of the pigments and other materials from the perspective of conservation science. With the ongoing rapid development in western China, the grotto murals are facing a serious crisis related to climate change and overcrowding in the oasis city of Xinjiang. To overcome this challenge, the cultural communities of China and other countries that possess advanced technology for conservation and restoration must begin working together to protect and restore the murals of the Silk Road grottoes. Moreover, centers for conservation science should be established to foster human resources and collect information. Compiling the data of Russian expeditions related to the grottoes of Kuche (among the results of Western archaeological surveys of the Silk Road in the early twentieth century), Kuche Art Relics Collected in Russia represents an important contribution to research on Kuche's Buddhist art and the Silk Road, which will only be enhanced by a future volume introducing the mural fragments from Germany. As the new authoritative source for academic research on the artworks and artifacts of the Kuche region, the book also lays the groundwork for new directions for future studies on the Silk Road. Finally, the book is also quite significant for employing a new editing system that improves its academic clarity and convenience. In conclusion, Dr. Kira Samosyuk, who planned the publication, deserves tremendous praise for taking the research of Silk Road art to new heights.

A Study on Time Conviction Based on PKI for Suitable IMT-2000 Service (IMT-2000 서비스에 적합한 PKI 기반 시점확인 서비스에 관한 연구)

  • 이덕규;이임영
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.2
    • /
    • pp.211-222
    • /
    • 2004
  • By development of wireless mobile communication, many users increased. But, in case of 1st generation or 2nd generation, transfer communication service was not satisfying high speed wireless internet Communication consumer's request such as other multimedia service because serviced based on voice and text basically. Can get through service such as data and transfer multimedia service that is not service of voice putting first in wireless hereafter. Problems by much development of service are happening, because a transmit is exposed, problem point that wireless network is much unlawful stealing use and tapping etc. As is different from this, problem can happen in service side. Can take next time for these example. By user that is not right can happen. Need method to keep away purpose that is enemy of third party in contract between both men as well as problem for document or accounting information which the third user that is enemy of third party is shared. By solution about problems, certification of contents for document and visual point confirmation must it. Applied service or certification of contents service that is rapidly point of time that is using in wire to solve problem that refer in front in this treatise in IMT-2000 to develop hereafter. Way to propose proposed efficient way using individual in IMT-2000 just as it is.

  • PDF

Design of a Real-Time Certificate Status Validation Mechanism Using Identity Information Hash Value of Signer (서명자의 신원정보 해쉬값을 이용한 실시간 인증서 상태 검증 메커니즘의 설계)

  • Kim Hyun-Chul;Kim Jung-Jae;Lee Jong-Hee;Oh Hae-Seok;Jun Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.147-154
    • /
    • 2006
  • The certificate status validation mechanism is a critical component of a public key infrastructure based on certificate system. The most generally mechanisms used these days are the use of the certificate revocation list and the real-time certificate status protocol. But the certificate revocation list can not give the real-time certificate status because the certificate is being delivered periodically, and the real-time certificate status protocol method will generate a concentrated load to the server because the protocol in the central server will be accessed whenever a certification is necessary. It will also take a long time to validate the certificate because each trade has to send mass information through the network. This paper will present that real-time validation is guaranteed as the real-time certificate status protocol method and the traffic congestion in the network Is reduced in a way that the certification would be requested using the user information hash value and would be validated using the user information kept in the certification authorities and the service providers. Based on the this study, we suggest a real-time certificate status validation mechanism which can reduce the certificate status validation time using the signed user information hash value. And we confirm speed of certificate status verification faster than existing CRL(Certificate Revocation List) and OCSP(Online Certificate Status Protocol) method by test.

The government role in digital era innovation: the case of electronic authentication policy in Korea (디지털 혁신시대의 정부역할: 한국의 전자 인증정책 사례)

  • Son, Wonbae;Park, Mun-su
    • International Commerce and Information Review
    • /
    • v.19 no.4
    • /
    • pp.29-50
    • /
    • 2017
  • In emerging technologies, innovation processes are dynamic in that the government needs to regularly review its policies to resonate with rapid technological advancements, changing public needs, and evolving global trends. In the 1990s, the Internet grew at an explosive rate, but many applications were constrained due to security concerns. Public Key Infrastructure (PKI) seemed to be the fundamental technology to address these concerns by providing security functions. As of 2017, PKI is still one of the best technologies for electronic authentication in an open network, but it is used only in limited areas: for user authentications in closed networks and for server authentications within network security infrastructure like SSL/TLS. The difference between expectation and reality of PKI usage is due to the evolution of the Internet along with the global adoption of new authentication policies under the Internet governance in the early 2000s. The new Internet governance based on the cooperation between multi-stakeholders is changing the way in which a government should act with regard to its technological policies. This paper analyzes different PKI policy approaches in the United States and Korea from the perspective of path-dependence theory. Their different policy results show evidence of the rise of the Internet governance, and may have important implications for policy-makers in the current global Internet society.

  • PDF

A Security Model Analysis Adopt to Authentication State Information in IPTV Environment (IPTV 환경에서 가입자의 인증 상태정보를 이용한 인증보안 모델 설계)

  • Jeong, Yoon-Su;Jung, Yoon-Sung;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.421-430
    • /
    • 2010
  • Now a days, as a communications network is being broadband, IPTV(Internet Protocol Television) service which provides various two-way TV service is increasing. But as the data which is transmitted between IPTV set-top box and smart card is almost transmitted to set-top box, the illegal user who gets legal authority by approaching to the context of contents illegally using McComac Hack Attack is not prevented perfectly. In this paper, set-top box access security model is proposed which is for the protection from McComac Hack Attack that tries to get permission for access of IPTV service illegally making data line which is connected from smart card to set-top box by using same kind of other set-top box which illegal user uses. The proposed model reports the result of test which tests the user who wants to get permission illegally by registration the information of a condition of smart card which is usable in set-top box in certification server so that it prevents illegal user. Specially, the proposed model strengthen the security about set-top box by adapting public key which is used for establishing neighbor link and inter-certification process though secret value and random number which is created by Pseudo random function.

Difference of Privacy Paradox on Open and Closed SNS (개방형 및 폐쇄형 SNS에서 프라이버시 역설의 차이)

  • Shin, Il-Soon
    • Informatization Policy
    • /
    • v.27 no.1
    • /
    • pp.72-91
    • /
    • 2020
  • In this study, we classified SNS into open and closed types, and empirically examined in which SNS activity the privacy paradox holds. The idea comes from the argument that privacy paradox may be observed differently in the open SNS, which is more vulnerable to the leakage of personal information due to public profiles, and the closed SNS, which is relatively less vulnerable by limiting the range of acquaintances, The results of the empirical analysis are as follows. First, in case of SNS usage, the privacy paradox holds in the overall SNS activities, but different conclusions are drawn according to open and closed SNS. In particular, it is found that as privacy concerns increase, individuals respond in a reasonable and desirable way to reduce SNS activity in the open SNS, which is more susceptible to infringement. Second, in the case of SNS activity intensity, (i) heavy users are more seriously aware of the probability of privacy infringement than light users, so there is a reasonable response to reducing the intensive margin with increasing privacy concerns, and (ii) this tendency is more clearly observed in open SNS, which is more vulnerable to privacy infringement. Accordingly, insisting that the privacy paradox is empirically established by observing only the overall SNS activities without distinguishing them into open and closed SNS may be interpreted as a "Fallacy of Composition."

A Study on a Secure Internet Service Provider Model Using Smart Secure-Pad (스마트 보안패드를 이용한 안전한 인터넷 서비스 제공 모델에 관한 연구)

  • Lee, Jae-Sik;Kim, Hyung-Joo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1428-1438
    • /
    • 2013
  • Services take place in Internet environment, a formation of the trust relationship between user and service provider for services. Different authentication schemes such as using Certificate of Public Key Infrastructure authentication and using ID/PW for a simple user authentication have been proposed for trust relationship. In addition, in the case of electronic financial transactions, transaction integrity and non-repudiation features are provided. These services are provided in Internet environment, use various measures to ensure service safety. However, it was difficult to prevent attacks using existing security technology because of emergence of MITB attack that manipulate the memory area of the Web browser and social engineering attacks such as phishing/pharming, requires application of new security technologies became. In this paper, we propose a concept of smart secure-pad, and utilize it safely formed a trust relationship between user and service provider, a model has been proposed to ensure safety of data transmission. Proposed model's security evaluation results show security against to MITB attack and phishing/pharming that can't be prevent attack using existing security technology. In addition, service provider can easily apply the model in safe environment can provide Internet service using provided representative services applying the proposed model.

Improvement of Performance for Online Certificate Status Validation (실시간 인증서 상태검증의 성능개선)

  • Jung, Jai-Dong;Oh, Hae-Seok
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.433-440
    • /
    • 2003
  • According as the real economic activities are carried out in the cyber world and the identity problem of a trade counterpart emerges, digital signature has been diffused. Due to the weakness for real-time validation using the validation method of digital signature, Certificate Revocation List, On-line Certificate Status Protocol was introduced. In this case, every transaction workload requested to verify digital signature is concentrated of a validation server node. Currently this method has been utilized on domestic financial transactions, but sooner or later the limitation will be revealed. In this paper, the validation method will be introduced which not only it can guarantee real-time validation but also the requesting node of certificate validation can maintain real-time certificate status information. This method makes the revocation management node update the certificate status information in real-time to the validation node while revoking certificate. The characteristic of this method is that the revocation management node should memorize the validation nodes which a certificate holder uses. If a certificate holder connects a validation node for the first time, the validation node should request its certificate status information to the above revocation management node and the revocation management node memorizes the validation node at the time. After that, the revocation management node inform the revocation information in real-time to all the validation node registered when a request of revocation happens. The benefits of this method are the fact that we can reduce the validation time because the certificate validation can be completed at the validation node and that we can avoid the concentration of requesting certificate status information to a revocation node.