• Title/Summary/Keyword: 보안강도

Search Result 175, Processing Time 0.019 seconds

Analysis of Attacks and Security Level for Multivariate Quadratic Based Signature Scheme Rainbow (다변수 이차식 기반 서명 기법 Rainbow의 공격 기법 및 보안강도 분석)

  • Cho, Seong-Min;Kim, Jane;Seo, Seung-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.533-544
    • /
    • 2021
  • Using Shor algorithm, factoring and discrete logarithm problem can be solved effectively. The public key cryptography, such as RSA and ECC, based on factoring and discrete logarithm problem can be broken in polynomial time using Shor algorithm. NIST has been conducting a PQC(Post Quantum Cryptography) standardization process to select quantum-resistant public key cryptography. The multivariate quadratic based signature scheme, which is one of the PQC candidates, is suitable for IoT devices with limited resources due to its short signature and fast sign and verify process. We analyzes classic attacks and quantum attacks for Rainbow which is the only multivatiate quadratic based signature scheme to be finalized up to the round 3. Also we compute the attack complexity for the round 3 Rainbow parameters, and analyzes the security level of Rainbow, one of the PQC standardization candidates.

Quantum Cryptanalysis for DES Through Attack Cost Estimation of Grover's Algorithm (Grover 알고리즘 공격 비용 추정을 통한 DES에 대한 양자 암호 분석)

  • Jang, Kyung-bae;Kim, Hyun-Ji;Song, Gyeong-Ju;Sim, Min-Ju;Woo, Eum-Si;Seo, Hwa-Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1149-1156
    • /
    • 2021
  • The Grover algorithm, which accelerates the brute force attack, is applicable to key recovery of symmetric key cryptography, and NIST uses the Grover attack cost for symmetric key cryptography to estimate the post-quantum security strength. In this paper, we estimate the attack cost of Grover's algorithm by implementing DES as a quantum circuit. NIST estimates the post-quantum security strength based on the attack cost of AES for symmetric key cryptography using 128, 192, and 256-bit keys. The estimated attack cost for DES can be analyzed to see how resistant DES is to attacks from quantum computers. Currently, since there is no post-quantum security index for symmetric key ciphers using 64-bit keys, the Grover attack cost for DES using 64-bit keys estimated in this paper can be used as a standard. ProjectQ, a quantum programming tool, was used to analyze the suitability and attack cost of the quantum circuit implementation of the proposed DES.

A Study on Quantitative methodology to Assess Cyber Security Risks of EMS (스마트그리드 체제에 따른 EMS의 보안 평가를 위한 정량적 방법론에 관한 연구)

  • Woo, Pil Sung;Kim, Balho H.
    • Journal of Energy Engineering
    • /
    • v.24 no.1
    • /
    • pp.123-131
    • /
    • 2015
  • This paper aims to identify and clarify the cyber security risks and their interaction with the power system in Smart Grid. The EMS and other communication networks interact with the power system on a real time basis, so it is important to understand the interaction between two layers to protect the power system from potential cyber threats. In this study, the optimal power flow(OPF) and Power Flow Tracing are used to assess the interaction between the EMS and the power system. Through OPF and Power Flow Tracing based analysis, the physical and economic impacts from potential cyber threats are assessed, and thereby the quantitative risks are measured in a monetary unit.

Design of Security Framework for Next Generation IPTV Services (차세대 IPTV 서비스를 위한 보안 프레임워크 설계)

  • Lee, Seung-Min;Nah, Jae-Hoon;Seo, Dong-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.33-42
    • /
    • 2010
  • With the emergence of increasingly complex networks and diverse user terminals, demand for the next generation IPTV service is rapidly growing. It enables any content to seamlessly be reused on the diverse terminals as well as be broadcasted in real-time through the complex networks. In this paper, a novel security framework is proposed for the real-time and reusable IPTV services. The proposed framework is advantageous over the conventional content protection techniques in easily producing the scalable content with lightweight, perceptual, transcodable, and adjustable security features. It does not only ensure end-to-end security over the entire service range based on a single security mechanism, but also can control a level of security while dynamically transcoding the original content. This approach basically performs selective encryption during and after the compression using scalable video coding. The suitability of the proposed approach is demonstrated through experiments with a practical service scenario. Therefore, it is expected that security technology alone could practically contribute to creating new business opportunities for IPTV services.

Mg-Zn-Mn 합금계에 Sn첨가에 따른 시효특성 연구

  • Jang, Gyeong-Su;Han, Jeong-Hwan;Lee, Byeong-Deok;Baek, Ui-Hyeon
    • Proceedings of the Materials Research Society of Korea Conference
    • /
    • 2010.05a
    • /
    • pp.46.2-46.2
    • /
    • 2010
  • 최근 수송기기 및 전자부품산업에서의 성능향상 요구에 따라 경량고강도 비철금속재료의 수요가 증대되고 있다. 특히, 세계적으로 에너지 절약 및 환경 공해 규제가 대폭 강화됨에 따라 자동차, 항공기 등 수송기기의 소재경량화 소재로 낮은 밀도 기계적 가공성이 우수한 마그네슘 합금이 각광을 받고 있다. 그러나 Mg합금은 알루미늄 합금과는 달리 보호성 산화피막이 형성되지 않아 내식성 및 고온강도가 매우 취약하다. 이를 보안하기 위해서 본 연구에서는 마그네슘의 강도 개선을 위한 원소로써 고용강화 원소로 많이 쓰이는 Zn과 입자 미세화로 인한 항복강도를 증가시키는 Mn의 3원계 합금에 고온에서 안정한 Mg2Sn상이 형성되는 Sn을 첨가하여 시효처리에 따른 기계적 특성과 미세조직을 관찰하였다. 실험 이전에 Pandat Program에 의한 열역학적 분석을 바탕으로 Mg-Zn-Mn 및 Mg-Zn-Mn-Sn의 상태도 계산 및 MgZn와 Mg2Sn 석출분율을 예측하였다. 열역학 계산을 통해 도출된 석출온도를 통해 Mg-Zn-Mn 및 Mg-Zn-Mn-Sn 합금의 열처리에 따른 경도 및 미세구조를 관찰하였다. 또한, 기계적 특성을 평가하기 위해 상온 및 고온 인장시험을 실시하였고 XRD, SEM을 이용하여 석출상을 분석하였다.

  • PDF

A Review of Carbon-Reinforced Carbon Nanotube Fibers Composites (탄소강화 탄소나노튜브 섬유 복합소재 연구 동향)

  • Lee, Dongju;Ryu, Seongwoo;Ku, Bon-Cheol
    • Composites Research
    • /
    • v.32 no.3
    • /
    • pp.127-133
    • /
    • 2019
  • Although carbon nanotubes(CNTs) have outstanding theoretical mechanical and electrical properties, CNT fibers(CNTFs) have not yet reached that level. Particularly, tensile strength is only about 10% or less, so studies for making up for it are being actively conducted. As a way for improving mechanical strength, methods such as synthesizing long CNT, orientation, chemical cross-linking, hydrogen bonding and polymer infiltration are being studied. In this review paper, we report preparation methods for highly conductive and strong CNTF/Carbon composites through coating and infiltration followed by carbonization of carbon precursor polymers such as polyacrylonitrile (PAN) and polydopamine (PDA) on CNTFs.

A Convergence Study on the Structural Relationships among Emotional Labor and Work Performance of Information Security Professionals (정보보안 종사자의 감정노동과 업무성과 간의 구조적 관계에 대한 융합연구)

  • Lee, Hang;Kim, Joon-Hwan
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.1
    • /
    • pp.67-74
    • /
    • 2018
  • The purpose of this study was to analyze the structural relationship among emotional labor and work performance of information security professionals. To this end, we conducted a questionnaire survey on 176 security workers and analyzed the collected data using structural equation modeling (SEM). It was found that the frequency of emotional display was positively related to deep acting and surface acting. Also, the intensity and variety of emotional display was positively related to deep acting and surface acting. In addition, deep acting had a positive relationship with work performance and surface acting had an significantly positive relationship with work performance. The results of this study are meaningful to understand the influence of the emotional aspect of security workers on work performance. Therefore, the overall findings suggest that the training programs and education for the improvement of emotional labor capacity of deep acting are continuously required.

Inter-AP Security Transition Mechanism and Its FSM in WLAN AP Supporting Fast Roaming (이동 무선랜 접속장치의 접속점 보안 천이 메커니즘과 유한상태머신)

  • Chung ByungHo;Kang You Sung;Oh KyungHee;Kim SangHa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6C
    • /
    • pp.601-606
    • /
    • 2005
  • Recently with the high expectation of voice over WLAN service, to supped fast inter-AP security transition in WLAN AP is one of the most actively investigating issues. It is also very important to minimize inter-AP security transition latency, while maintaining constantly the secure association from old AP when a station transits to new AP. Hence, this paper first defines secure transition latency as a primary performance metric of AP system in WLAN supporting IEEE802.11i, 802.1x, and 802.11f, and then presents low latency inter-AP security transition mechanism and its security FSM whose objective is to minimize inter-AP transition latency. Experiment shows that the proposed scheme outperforms the legacy 802.1X AP up to $79\%$ with regard to the transition latency.

Secure Bootstrapping Methods of a Mobile Node on the Mobile IPv6 Network (IPv6기반 이동인터넷 환경에서 이동노드의 안전한 시동에 관한 방법)

  • Nah Jaehoon;Chung Kyoil;Han Chi-Moon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.3 s.303
    • /
    • pp.1-8
    • /
    • 2005
  • At IETF (Internet Engineering Task Force), recently RFC3775, RFC3776 documents about the mobile IPv6 were standardized by IETF (Internet Engineering Task Force). Those specifications propose that during the roaming, the mobile node sends securely the binding update to the home agent and the correspondent node after setting the security association between Mobile Node and Home Agent. But there is no secure bootstrapping method between a mobile node and a home agent at the two RFC documents. This paper proposed a method for the secure bootstrapping between a mobile node and a home agent. This makes the authentication, binding update, home agent assignment, security association distribution through the AAA-based secure channel between mobile node and home agent. And the proposed method was analyzed in the view of the procedure, round trip and security strength.

A Scheme of Improving Propagation Attack Protection and Generating Convergence Security Token using Moire (무아레를 이용한 융합 보안토큰생성과 전파공격 보호 기법)

  • Lee, Su-Yeon;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.2
    • /
    • pp.7-11
    • /
    • 2019
  • Due to diversification and popularization of devices that use rapid transmission, there are many security issues related to radio waves. As the disturbance and interference of the radio wave can cause a direct inconvenience to a life, it is a very important issue. In this paper, as a means to prevent radio disturbance and interference, the projected image of the reference grid and the deformed grid is obtained by measuring the projected $moir{\acute{e}}$ using the white light source, projecting grid and the light source, and a $moir{\acute{e}}$ pattern is generated with an image processing algorithm by applying a phase diagram algorithm, and generated $moir{\acute{e}}$ pattern phase diagram creates a three-dimensional shape. By making an encrypted token using this measured face shape, the transmission of the information through token ring is determined in order to transmit the horizontal transmission having the dynamic security characteristics which includes authentication strength and caller information, etc. And by confirming the uniqueness of the token and by sending and receiving the horizontal transmission using java serialization and deserialization function, a problem solving method is suggested.