• Title/Summary/Keyword: 보안 메커니즘

Search Result 633, Processing Time 0.033 seconds

Double S-box Stream Cipher using Two S-boxes (두개의 S박스를 활용한 이중 S박스 스트림 암호알고리즘)

  • Park, Mi-Og;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1129-1132
    • /
    • 2004
  • 이동통신기술의 지속적인 발전은 많은 사용자들에게 시간과 장소에 구애받지 않고 어디서든지 통신 서비스를 받을 수 있도록 제공해주고 있다. 하지만 이동통신기술의 개방성은 항상 심각한 보안 위협에 노출되어 있으며, 보안 안전성이 높은 통신채널 확보를 위해서는 암호화가 반드시 필요하다. 이동통신망의 보안을 위해서 사용하는 가장 일반적인 방법 중의 하나는 스트림 암호알고리즘이다. 본 논문에서는 전송되는 데이터를 보다 안전하게 암호화하기 위해 DES에서 사용하는 S박스중 실험을 통해 랜덤성이 좋은 두 개의 S박스를 조사하고, 비트가 0이면 통과하고 1이면 통과하지 않는 메커니즘을 제안한다. 실험을 통해 제안모델이 기존모델보다 향상된 랜덤성과 상관특성을 나타냄을 증명하며, 비트가 0인 경우에만 S박스를 사용하는 메커니즘과 0과 1의 모든 비트에 S박스를 통과시킨 모델을 비교하여 제안 메커니즘의 효율성을 증명한다.

  • PDF

Why Security Awareness Education is not Effective? (정보보안 인식 교육의 효과에 대한 연구)

  • Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.27-37
    • /
    • 2014
  • While organizations are making a considerable effort to leverage formal and informal control mechanisms (e.g., policies, procedures, organizational culture) to improve security, their impact and effectiveness is under scrutiny as employees seldom comply with information security procedures. The best way to ensure the viability of a security policy is to make sure users understand it and accept necessary precautions. From an organization's perspective, a lack of security knowledge and awareness on the part of employees is a major problem. However, previous studies suggest that effect of security awareness education is inconsistent. Thus, this study is to find the answer why security awareness education is not effective. Conclusions and implications are discussed.

Security-Enhanced Key Establishment Scheme for Key Infection (Key Infection의 보안성 향상을 위한 개선된 키 설정 방법)

  • Hwang Young-Sik;Han Seung-Wan;Nam Taek-Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.24-31
    • /
    • 2006
  • Traditional security mechanisms do not work well in the sensor network area due to the sensor's resource constraints. Therefore security issues are challenging problems on realization of the sensor network. Among them, the key establishment is one of the most important and challenging security primitives which establish initial associations between two nodes for secure communications. Recently, R. Anderson et al. proposed one of the promising key establishment schemes for commodity sensor network called Key Infection. However, key infection has an intrinsic vulnerability that there are some areas where adversaries can eavesdrop on the transferred key information at initial key establishment time. Therefore, in this paper, we propose a security-enhanced key establishment scheme for key infection by suggesting a mechanism which effectively reduces the vulnerable areas. The proposed security mechanism uses other neighbor nodes' additional key information to establish pair-wise key at the initial key establishment time. By using the additional key information, we can establish security-enhanced key establishment, since the vulnerable area is decreased than the key infection's. We also evaluate our scheme by comparing it with key infection using logical and mathematical analysis.

Security Mechanism of Agent for Effective Agro-Foods Mobile Commerce (농산물 모바일 상거래를 위한 효과적인 에이전트 보안 메커니즘)

  • Jung Chang-Ryul;Song Jin-Kook;Koh Jin-Gwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.9
    • /
    • pp.1573-1581
    • /
    • 2006
  • To utilize actively the agent which is one of the elements of revitalization of Agro-Foods Mobile I-commerce, an essential prerequisite is agent security. IF using partial PKI(Public Key Infrastructure)-based confirmation mechanism providing security for the agent, the size of agent is becoming larger, the result of the transmission speed is slow, and the confirmation speed is tardy as well because of performing calculation of public keys such as RSA and needing linkage with the CA for the valid examination of certificates. This paper suggests a mechanism that can cross certification and data encryption of each host in the side of improving the problems of key distribution on agent by shaping key chain relationship. This mechanism can guarantee the problem of ky distribution by using agent cipher key(ACK) module and generating random number to fit mobile surroundings and to keep the secret of the agent. Suggested mechanism is a thing that takes into consideration security and efficiency to secure agent for the revitalization of M-Commerce, and is a code skill to make the agent solid and is a safe mechanism minimizing the problems of memory overflow.

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments (스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2024
  • Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.

e-Passport Integrated Authentication Mechanisms with Improved Efficiency (효율성이 강화된 전자여권 통합 인증 메커니즘)

  • Lee, Dong-Bum;Go, Woong;Kwak, Jin
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.53-63
    • /
    • 2009
  • e-Passport system is new type of emigration and immigration control system and it is a research to introduce the e-Passport Authentication Protocol with Improved Efficiency is lively proceeded over the entire world. The e-Passport's chip has a biometric information and personal identification information, Radio Frequency Identification(RFID) technology is used for communication with the Inspection System(IS). However, the feature of the RFID system may bring about various security threats such as eavesdropping, data forgeries, data alternation, cloning, biometric data-leakage. Therefore, in this paper, we analyse the e-Passport system's authentication protocol to protect vulnerability and proposed e-Passport system's authentication protocol reduce computation. Also, we compared their efficiency.

  • PDF

A Design and Analysis of PKCS #11 supporting the KCDSA mechanism (KCDSA 메커니즘을 제공하는 PKCS #11 설계 및 분석)

  • 김명희;김은환;전문석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.141-151
    • /
    • 2004
  • According to the improvemnent of electronic commerce, the requirements of security devices are becoming increasingly pervasive. The security API must design easily and securely to support a compatibility feature between security devices. It is chosen the PKCS #11 interface by RSA Labs that shows the compatibility and extensibility standards of many application product and implementation, and supported KCDSA mechanism which is a korean digital signature standard. And the PKCS #11 security API defines new key management function which provides more secure key management ability. We suggest the object attributes and templates of KCDSA private and public key object, generate and verify digital signature using KCDSA mechanism. The PKCS #11 supporting KCDSA mechanism is designed, implemented using C-Language, tested a performance, and analyzed the security and compatibiltiy feature.

A Privacy Management Mechanism for Location Based Application (위치 정보 기반 어플리케이션을 위한 사용자 위치 정보 관리 메커니즘)

  • Jang, Yo-Cheol;Choi, Chang-Yeol;Kim, Sung-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1683-1686
    • /
    • 2005
  • 사용자 위치 정보를 보호하기 위해서는 암호화 작업이 필수적이며, 최근 위치 정보 기반 어플리케이션에 적용하기 위한 방안이 커다란 논점으로 자리잡고 있다. 그러나 데이터 암호화 작업은 일정한 시간을 소요하는 작업이므로, 이에 따른 시스템 운용에 있어서 속도와 보안 사이의 균형 문제가 야기 된다. 따라서 본 논문에서는 성능 측면에서 대립되는 속도와 보안 관련 문제를 통제할 수 있는 사용자 위치 정보 관리 메커니즘을 설계하였다. 이를 위해, 그 동안 연구되었던 각종 암호화 알고리즘에 대한 성능 분석과 함께 위치 정보에 대한 분류 작업을 수행하였으며, 해당 연구 결과를 토대로 하여 사용자 위치 정보 관리 메커니즘을 설계하였다. 따라서 본 메커니즘은 다변화하는 주변 환경에 적응적으로 대처하여 시스템의 성능을 항상 최적화할 수 있도록 한다.

  • PDF

A Evaluation for Mutual Authentication Protocol In RFID/USN (RFID/USN 환경에서 상호 인증 메커니즘 검증.평가)

  • Kim, Chan-Il;Kim, Min-Kyoung;Shin, Hwa-Jong;Yi, Wan-S.
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.889-892
    • /
    • 2005
  • 유비쿼터스 환경의 센서 네트워크의 보안요소를 살펴보면 센서의 위치, 저전력에 적합한 암호 프리미티브, 초경량의 상호 인증 메커니즘 등이 있다. 그 중 기존의 RFID/USN 환경에서의 식별 및 인증 메커니즘 기법을 살펴보고 RFID/USN 환경에 적합한 상호 인증 메커니즘의 공통된 보안기능요구사항을 본 논문에서는 도출/제시한다. 그리고 RFID/USN 환경에서의 상호인증 기법을 한국정보보호진흥원에서 개발한 평가결과 자동생성도구를 이용하여 실제 검증 평가한다.

  • PDF

A Study on the BU(Binding Updates) Authentication Methods In Mobile IPv6 (Mobile IPv6 BU(Binding Updates)인증 방안에 관한 연구)

  • 임강규;남길현
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.60-65
    • /
    • 2003
  • 본 논문에서는 Mobile IPv6 환경에서 보안성이 있는 인증 메커니즘을 제안한다. Internet draft에서 제안하고 있는 RR 방식의 BU 인증 메커니즘은 MN-CN, HA-CN간 두 경로 모두에 공격자가 접근하지 못한다는 전제로 인해 BU 인증을 위한 공유키 생성시 취약성을 내포하여 만약 공격자가 두 경로 모두에 접근 가능할 경우 노드간 통신하는 전 단계에 걸쳐 수동적, 능동적 공격에 노출되게 된다. 제안한 BU 인증 메커니즘은 최초 안전한 BU 인증을 위한 공유키를 생성 후 차후 이어지는 BU 인증은 이러한 안전성을 바탕으로 신속한 인증이 이루어지는 2단계의 인증 메커니즘을 제안함으로써 공유키의 노출을 최소화하여 보다 높은 수준의 보안을 제공하였다.

  • PDF