• Title/Summary/Keyword: 디지털서명

Search Result 234, Processing Time 0.022 seconds

A Study on Area-Efficient Design of Unified MD5 and HAS-160 Hash Algorithms (MD5 및 HAS-160 해쉬 알고리즘을 통합한 면적 효율적인 설계에 관한 연구)

  • Sonh, Seung-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.1015-1022
    • /
    • 2012
  • This paper deals with hardware design which unifies MD5 and HAS-160 hash algorithms. Two algorithms get a message with arbitrary length and process message blocks divided into 512 bits each time and output a hash code with a fixed length. MD5 ouputs a hash code of 128 bits and HAS-160 a hash code of 160 bits. The unified hash core designed has 32% of slices overhead compared to HAS-160 core. However, there is only a fixed message buffer space used. The unified hash core which run a step in one clock cycle operates at 92MHz and has performance which digests a message in the speed of 724Mbps at MD5 and 581Mbps at HAS-160 hash mode. The unified hash core which is designed can be applicable to the areas such as E-commerce, data integrity and digital signature.

A Study on the Practical Methodology of Engineering Education through the Making of Smart Mirror (스마트 거울의 제작을 통해 이루어진 공학 교육 실천 방법론에 관한 연구)

  • Seo, Myeong-Deok;Kwon, Ji-Young;Chang, Eun-Young
    • Journal of Practical Engineering Education
    • /
    • v.10 no.1
    • /
    • pp.9-15
    • /
    • 2018
  • A digital signage is constructed using a speech recognition based API, and VRSM (Voice Recognition Smart Mirror) that obtains information such as weather, map, exercise information, schedule, and image by user's voice command so as to be different from other commercialized products is proposed. This course provides an effective method of engineering education through the process of being evaluated as the result of independent graduation certification system, and also it had been the opportunity to design and produce works for 3 semesters by 2 students one group in the majors. Through the comprehensive capstone design, it has experienced engineering approach and creative thinking opportunity. We have won the best academic prize by participating in the academic conferences of the institute about the interim result, and obtained the results of the prize contest in other academic conferences. The improvement in practical skills obtained through this process proved to be beneficial for self-confidence and job-seeking opportunities through actual employment.

Design and Implementation of Secure UART based on Digital Signature and Encryption (디지털 서명과 암호화 기반 보안 UART의 설계와 구현)

  • Kim, Ju Hyeon;Joo, Young Jin;Hur, Ara;Cho, Min Kyoung;Ryu, Yeon Seung;Lee, Gyu Ho;Jang, Woo Hyun;Yu, Jae Gwan
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.29-35
    • /
    • 2021
  • UART (Universal asynchronous receiver/transmitter) is a hardware device that converts data into serial format and transmits it, and is widely used for system diagnosis and debugging in most embedded systems. Hackers can access system memory or firmware by using the functions of UART, and can take over the system by acquiring administrator rights of the system. In this paper, we studied secure UART to protect against hacker attacks through UART. In the proposed scheme, only authorized users using the promised UART communication protocol are allowed to access UART and unauthorized access is not allowed. In addition, data is encrypted and transmitted to prevent protocol analysis through sniffing. The proposed UART technique was implemented in an embedded Linux system and performance evaluation was performed.

Strong Yoking-Proof Protocol using Light-Weighted MAC (경량화된 MAC을 이용한 강력한 Yoking-Proof 프로토콜)

  • Cho, Chang-Hyun;Lee, Jae-Sik;Kim, Jae-Woo;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.83-92
    • /
    • 2009
  • Ari Juels proposed Yoking-Proof protocol for authenticating multiple tags simultaneously using RFID system. Because common Yoking-Proof methods authenticate by using MAC (Message Authentication Code), it is difficult to apply them to inexpensive tags. It is also difficult to implement common hash functions such as MD5 in inexpensive tags. So, Ari Juels also proposed a lightweighted Yoking-Proof method with only 1 authentication. However, Minimalist MAC, which is a lightweighted MAC used in the proposed method is for single-use, and the proposed structure is vulnerable to replay attacks. Therefore, in this study, the minimalist MAC using Lamport's digital signature scheme was adopted, and a new type of Yoking-Proof protocol was proposed where it uses tags that are safe from replay attacks while being able to save multiple key values.

Integrity Guarantee System in IoT Virtual Environment Platform: Through Hyperedfger Indy and MQTT (IoT 가상환경 플랫폼에서의 무결성 보장 시스템:Hyperledger Indy와 MQTT를 통하여)

  • Yoosung Hong;Geun-Hyung Kim
    • Smart Media Journal
    • /
    • v.13 no.4
    • /
    • pp.76-85
    • /
    • 2024
  • In this paper, we propose a system that improves the data integrity of IoT(Internet of Things) devices in the virtual environment by combining Hyperledger Indy and MQTT(Message Queuing Telemetry Transport). The system complements the limitations of the centralized system by realizing a DPKI(Decentralized Public Key Infrastructure) structure that utilizes a distributed network in publish-subscribe(pub/sub) pattern communication. Digital signature technology was applied to ensure the data integrity of IoT devices and communication scenarios between the four core components of the client, IoT device, broker, and blockchain, as well as a topic structure using a decentralized identifier to ensure safety in the virtual environment. We present a systematic method for transparent data exchange. To prove the performance of the proposed system, this paper conducted experiments on four scenarios and evaluated communication performance in a virtual environment. The experimental results confirmed that the proposed system provides a reliable IoT data communication structure in a virtual environment.

Cooperation and Development Plan of Inter-Korean Logistics on through the Case between China and Taiwan (중국-대만 사례를 통해 본 남북한 물류협력 및 발전 방안)

  • Hong, Dong-Hee;Lee, Kyeung-Keun
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.79-87
    • /
    • 2012
  • On June 29th, 2010, a cross-straits "Economic and Cooperation Framework Agreement" (ECFA) is signed between China and Taiwan. This pact seems to be the greatest step forward on cooperation between the two sides, reflecting China-Taiwan thaw. As these countries are especially economically interdependent, great economic incomes and security benefits are expected for both sides after cooperation. this development of enlightened cooperation between China and Taiwan, gives many implications for Korea, the two divided countries. Recently, relation between north and south Korea is developing in an entirely different situation compared to the former Kim Dae-Jung or Roh Moo-hyun administrations. But exchange between north and south Korea has not been stopped, though reduced. This reflects the necessity of exchange of the north and the south, and this means that making preparation for the efficient conduct of exchange is needed. So in this study, we consider the China-Taiwan exchange and cooperation development carefully as a model for exchange and cooperation of the north and south Korea, and sought realizable ways to exchange and cooperate between the north and south Korea, which is also a win-win strategy for northeast Asia.

Nursing Jobs and Gender in our age of convergence: Research on Male Nurses (융복합시대의 간호직과 성: 남자간호사에 대한 연구)

  • Shin, Ja Hyun;Seo, Myoung Hee;Lee, Myung In
    • Journal of Digital Convergence
    • /
    • v.14 no.3
    • /
    • pp.287-297
    • /
    • 2016
  • This research paper is of a 'mixed method' research design: the quantitative analysis covering general data and the current condition of male nurses, the qualitative analysis being used on interview transcript data. The research subjects are 19 male nurses who work at a hospital and 29 female nurses who are doing Masters degrees in "J" province of the Republic of Korea. The data collection period was March 25 to April 1, 2015. The quantitative data was analyzed with SPSS WIN 19.0 software while the qualitative data was analyzed according to the 'contents analysis' method. The results show that the satisfaction of male participants in their profession is higher than average. The item 'growth as a professional' was rated highest as a satisfying aspect of working as a nurse. A difference was observed in the points of view of male and female participants, however, both male and female nurses have a positive view of male nurses which over comes traditional stereotypes. These results will be used to establish a positive image of nurses across genders.

Learning Strategies Influencing factors of the Students in the Department of Health Science (보건계열 대학생들의 학습전략 영향요인)

  • Moon, Inn Oh;Jeong, Ji-Na;Seo, Myoung Hee
    • Journal of Digital Convergence
    • /
    • v.17 no.5
    • /
    • pp.407-416
    • /
    • 2019
  • This study was to investigate the factors affecting the learning strategies of the students in the Department of Health Science. The data collection was conducted through a self-reporting questionnaire to 373 college students majoring in health and health care at two universities in J.do. and the collected data was analyzed using the SPSS/WIN 23.0 program. The study found that there were significant differences in learning strategies depending on Motive of application and major satisfaction level, and there were significant differences in academic stress with the grade, gender, Motive of application, major satisfaction, and academic self-efficiency, and self-directed learning depending on the grade, motive of application, and major satisfaction level. The results showed that the correlation between learning strategy and academic self-efficacy(r=.478, p<.001) and self-directed learning(r=645, p<.001), academic stress(r=-.193, p<.001). Self-directed learning(${\beta}=0.61$), major satisfaction (satisfaction) (${\beta}=0.31$), and major satisfaction (usually)(${\beta}=0.24$) affect the learning strategy, with 42.6% overall explanation. Based on the results of the study, the search for ways to improve major satisfaction levels and self-directed learning skills could have a positive impact on improving the learning strategy of college students in the health sector.

Study on Mobile OTP(One Time Password) Mechanism based PKI for Preventing Phishing Attacks and Improving Availability (피싱 방지 및 가용성 개선을 위한 PKI기반의 모바일 OTP(One Time Password) 메커니즘에 관한 연구)

  • Kim, Tha-Hyung;Lee, Jun-Ho;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.15-26
    • /
    • 2011
  • The development of IT technology and information communication networks activated to online financial transactions; the users were able to get a variety of financial services. However, unlike the positive effect that occurred on 7 July 2009 DDoS(Distribute Denial of Service) attacks, such as damaging to the user, which was caused negative effects. Authentication technology(OTP) is used to online financial transaction, which should be reviewed to safety with various points because the unpredictable attacks can bypass the authentication procedure such as phishing sites, which is occurred. Thus, this paper proposes mobile OTP(One Time Password) Mechanism, which is based on PKI to improve the safety of OTP authentication. The proposed Mechanism is operated based on PKI; the secret is transmitted safely through signatures and public key encryption of the user and the authentication server. The users do not input in the web site, but the generated OTP is directly transmitted to the authentication server. Therefore, it is improvement of the availability of the user and the resolved problem is exposed from the citibank phishing site(USA) in 2006.

The Economic Impact of the Establishment of the China-Japan-South Korea Free Trade Area and Impact on the Communication Industry -Base on GTAP Model Analysis- (한중일 자유무역지대 설립의 경제적 영향과 통신 산업에 대한 영향 -GTAP 모형 분석을 바탕으로-)

  • Zang, Zhen
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.85-92
    • /
    • 2022
  • In recent years, the world's free trade system has been severely damaged by a series of protectionist measures in the United States and anti-globalization practices such as Brexit. Against this background, RCEP, the world's largest trade agreement, was officially signed on November 15, 2021. The RCEP provided a good working basis for the establishment of a Korea, China, and Japan free trade zone. First, this paper describes the current status of Korea-China-Japan trade cooperation and the current status of the trilateral telecommunication industry. Second, this paper simulates the changes in the overall economy of China, Japan, and Korea when tariffs are reduced to 0%, 5%, and 10%, respectively, after the establishment of a free trade zone using the 8th edition GTAP database. Then, using the simulated data changes and using the 2019 data as a benchmark, we calculated the changes in the RCA index for the three countries' telecommunications industries for the three tax rates. In the end, it is concluded that the economies of the three countries will grow to different levels in many ways when the Korea, China, and Japan free trade zone is established. Japan's telecommunications industry will not be significantly affected, Korea will grow significantly with higher tax rates and China will grow significantly with lower tax rates.