• Title/Summary/Keyword: 기밀성 실험

Search Result 81, Processing Time 0.025 seconds

Key Management Scheme for Providing the Confidentiality in Mobile Multicast (이동 멀티캐스트에서 기밀성을 제공하기 위한 키관리 방법)

  • Roh Jong-Hyuk;Jin Seung-Hun;Lee Kyoon-Ha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.97-104
    • /
    • 2006
  • For successfully deploying many multicast service in the mobile environment, security infrastructures must be developed that manage the keys needed to provide access control to content. In this paper, we propose two methods for designing the key management scheme for the mobile multicast environment. The proposed schemes match the key management tree to the mobile multicast environment for localizing the delivery of he rekeying messages, reducing the communication costs, and solving the handoff problem in wireless region.

A Study on Safe Authentication Method for Security Communication in RFID Environment (RFID 환경에서 보안 통신을 위한 안전한 인증 방안에 관한 연구)

  • Ko, Hoon;Kim, Bae-Hyun;Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.59-65
    • /
    • 2005
  • Ubiquitous computing environment has a lot of different things as for applying existing security technical. It needs authentication method which is different kinks of confidence level or which satisfies for privacy of user's position. Using range localizes appoint workstation or it uses assumption which is satify environment of client in Kerberos authentication method which is representation of existing authentication method but it needs new security mechanism because it is difficult to offer the condition in ubiquitous computing environment. This paper want to prove the result which is authentication method for user authentication and offering security which are using wireless certificate from experiment in ubiquitous environment. Then I propose method which is offering security and authentication in ubiquitous environment.

  • PDF

Analysis of the Edge Sealing Strength for Vacuum Glass Panel Using Design of Experiment (실험계획법을 이용한 진공유리 패널 모서리 용융 접합 강도실험 분석)

  • Kim, Seung-Jong;Jeon, Euy-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.4
    • /
    • pp.1819-1824
    • /
    • 2014
  • The vacuum-glazing panel is a panel that keeps two glasses completely sealed in a vacuum condition. It is the high function insulation material of having the wall level minimizing the heat loss by the conduction and convection heat transmission coefficient. The edge sealing is a very important process of vacuum glass on the strength, thickness and air tightness. In this study, by using the hydrogen mixture gas torch, two sheets of glass was sealing in the furnace. The thickness and strength of the glass according to the process parameters is measurement and analysis, and predicting the edge sealing strength of glass by using taguchi method of experiment. We verified the validity of the experiment by checking the error rate through additional experiment.

A Study about Wiretapping Attack and Security of VoIP Service (VoIP 서비스의 도청 공격과 보안에 관한 연구)

  • Park Dea-Woo;Yoon Seok-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.155-164
    • /
    • 2006
  • VoIP technology is Eight New Services among Ubiquitous-IT839 strategies. This paper tested wiretapping or VoIP service in connected a soft phone and LAN and WAN sections, Internet telephones and a device. IP PBX, a banner operator network to have been connected to VoIP Internet network. As a result of having experimented on wiretapping of VoIP networks, Vulnerability was found. and a wiretapping by attacks of a hacker was succeeded in a terminal and proxy and attachment points of a VoIP network like a hub to follow a CVE list. Currently applied a security plan of an each wiretapping section in viewpoints of 6 security function of Access Control. Confidentiality, Authentication. Availability, Integrity. Non-repudiation in VoIP networks named to 070. Prevented wiretapping of contents by the results, the AES encryption that executed wiretapping experiment about a packet after application of a security plan. Prevented wiretapping, and kept security and audit log. and were able to accomplish VoIP information protection to network monitoring and audit log by an access interception and qualification and message hash functions and use of an incoming refusal.

  • PDF

A Study on Efficient Certificate Status Validation System of Reduction Signature Basis (축약 서명 기반의 효율적인 인증서 상태 검증 시스템에 관한 연구)

  • 김현철;이광형;백주호;오해석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.829-831
    • /
    • 2003
  • 개방형 네트워크인 인터넷에서의 오든 정보 교환은 항상 정보의 노출 및 정보의 위조 및 변조 등의 위협요소를 배후에 내포하고 있다. 이러한 인터넷에서의 중요 정보 보호를 위해서는 모든 정보 교환에 있어서 정보의 탈법노출을 방지하기 위한 기밀성, 정보의 위조 및 변조 여부를 판단하는 무결성. 정보의 송신자와 수신자 사이렌 송수신 사실을 부인하지 못 하도록 하는 부인방지, 전송된 정보의 송신자라 수신자를 확실하게 증명해주는 인증 등의 기능들이 제공되어야한다. PKI 기반의 인증서 상태 검증 시스템은 위와 같은 4가지의 기능을 제공해 준다. 하지만 실시간으로 인증서의 대한 상태 정보를 제공하지 못 한다는 단점과 인증서 상태 검증을 위해 많은 정보를 전송해야 하기 때문에 네트웍 과부하에 문제가 발생한다. 그로 인해 인증서 상태 검증에 소요되는 처리 속도가 느리다는 단점이 있다. 본 논문에서는 기존 방식의 문제점인 인증서 상태 정보의 실시간성 반영 문제 및 인증서 상태 겅증 시간의 향상을 위한 인증서 자체의 Serial과 UserDN만을 이용한 축약 서명 기반의 효율적인 인증서 상태 검증 시스템을 제안하고, 실제 실험을 통하여 기존의 시스템과 제안하는 시스템의 인증서 상태 검증 속도를 비교해 보고자 한다.

  • PDF

Ensuring Integrity of Multimedia Data Using AES-CCM (무결성 보장을 위한 AES-CCM 기반의 멀티미디어 데이터 보호)

  • Lee, Eun-Ji;Kim, Hakjae;Lee, Sung-Ju;Chung, Yongwha
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1507-1510
    • /
    • 2009
  • 대용량의 MPEG 비디오 스트림을 보호하고 암호화의 연산량을 줄이기 위한 방법으로 몇 가지 부분 암호화 기법이 보고되었다. 그러나, 멀티미디어 데이터의 무결성을 보장하기 위해서는 암호화 표준으로 이용되고 있는 HMAC 등의 메시지 인증 기법을 추가적으로 적용할 필요가 있다. 본 논문에서는 현재 암호화 표준으로 이용되고 있는 CCM을 이용하여 멀티미디어 데이터의 무결성을 보장하는 시스템을 제안한다. 또한, 제안한 시스템은 인코딩 및 디코딩의 실시간 요구사항을 만족하기 위하여 부분 암호화 기법으로 이용되는 SECMPEG 보안레벨 3와 호환이 이루어지도록 CCM을 MPEG의 계층적 구조를 고려하여 적용한다. 실험 결과를 통하여 제안 방법은 멀티미디어 데이터의 기밀성 및 무결성을 보장하면서 실시간 처리 성능을 제공함을 확인하였다.

ACPF 핫셀의 일체형 원격조종기 해체

  • Kim, Gi-Ho;Kim, Seong-Hyeon;Jeong, Yun-Mok;Park, Byeong-Seok;Lee, Jong-Gwang
    • Proceedings of the Korean Radioactive Waste Society Conference
    • /
    • 2016.10a
    • /
    • pp.147-148
    • /
    • 2016
  • ACPF 핫셀에 기 설치된 일체형 원격조종기의 해체 작업은 모두 완료 되었으며, 셀 내 부압 유지를 위해 월튜브 전면부는 기밀되었다. 금년 말까지 핫셀 원격조종기를 모두 분리형으로 대체하여 전해환 공정 실험의 원격작업에 활용할 계획이다.

  • PDF

An Study on the Analysis of Design Criteria for S-Box Based on Deep Learning (딥러닝 기반 S-Box 설계정보 분석 방법 연구)

  • Kim, Dong-hoon;Kim, Seonggyeom;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.337-347
    • /
    • 2020
  • In CRYPTO 2019, Gohr presents that Deep-learning can be used for cryptanalysis. In this paper, we verify whether Deep-learning can identify the structures of S-box. To this end, we conducted two experiments. First, we use DDT and LAT of S-boxes as the learning data, whose structure is one of mainly used S-box structures including Feistel, MISTY, SPN, and multiplicative inverse. Surprisingly, our Deep-learning algorithms can identify not only the structures but also the number of used rounds. The second application verifies the pseudo-randomness of and structures by increasing the nuber of rounds in each structure. Our Deep-learning algorithms outperform the theoretical distinguisher in terms of the number of rounds. In general, the design rationale of ciphers used for high level of confidentiality, such as for military purposes, tends to be concealed in order to interfere cryptanalysis. The methods presented in this paper show that Deep-learning can be utilized as a tool for analyzing such undisclosed design rationale.

Mutual Authentication Protocol based on the Random Divided Session for the Security of Medical Information in Home-Health (홈헬스 환경에서 생체정보전송의 안전성을 고려한 랜덤유효세션기반의 상호인증 프로토콜)

  • Lim, Heon-Cheol;Park, Tae-Hyun;Kwon, Gu-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.10
    • /
    • pp.79-88
    • /
    • 2012
  • In this paper, we design a mutual authentication protocol which divided sessions from an authenticated session are updated periodically. And in order to minimize the traffic overhead for session authentication, we also introduce dynamic session management according to sampling rate of medical sensor type. And randomize the divided session time. This model has the effect of blocking the integrity and confidentiality intrusion of rogue gateway. Moreover, efficiency is provided through medical data to be transmitted have different sampling rate. In order to evaluate this model, it was embodied and experimented in TinyOS 2.1 environment. The result, we got an overall validity from three types of experiment.

Analysis of Performance and IKEv2 Authentication Exchange model in Mobile IPv6 Network (MIPv6망에서 IKEv2 인증 교환 모텔 및 성능 분석)

  • Ryu, Dong-Ju;Kim, Gwang-Hyun;Kim, Dong-Kook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1085-1091
    • /
    • 2006
  • For an experiment in this paper, designed test bed to secure confidentiality of data and safe transmission that Mobile node exchanges in Mobile network. And, For IPsec use that support basically in MIPv6, modeling and experimented IKEv2 protocol that is used for reliable authentication key management and distribution between End Point. When Mobile node handoff in Mobile network, analyzed effect that authentication key re-exchange and limited bandwidth that happen often get in key exchange. And studied about Performance and latency about authentication setting and exchange process that use multi interface. To conclusion, when Mobile node transmits using IPSec, re-authentication of key confirmed that re-setting by limit of bandwidth that existent Mobile network has can be impossible. According to other result, proposed MN's multi interface is expected to minimise key exchange latency by hand-off when transmit IPSec.