• Title/Summary/Keyword: 서명체계

Search Result 118, Processing Time 0.033 seconds

NIST PQC 공모전 동향 분석 및 표준화 대상 & Round 4 알고리즘 소개

  • Dong Cheon Kim;Young Beom Kim;Seong Chung Seo
    • Review of KIISC
    • /
    • v.33 no.2
    • /
    • pp.39-48
    • /
    • 2023
  • 소인수 분해 및 이산대수 문제의 난제를 기반으로 설계된 기존의 공개키 암호 및 전자서명 체계가 1994년 제안된 Shor 알고리즘으로부터 안전성에 대한 위협을 받게 되자, NIST에서는 양자컴퓨팅 환경으로부터 보안성이 유지되는암호를 선정하기 위해 양자내성암호 공모전을 개최하였다. 총 3 Round를 통해 PQC 표준화 대상 알고리즘을 채택하였으며, 추가로 채택된 양자내성암호의 기반에 대한 다양성을 두기 위해 Round 4를 진행하였다. 따라서 본 논문에서는 표준화 대상으로 선정된 알고리즘(Selected Algorithms 2022)과 현재 Round 4를 진행하고 있는 알고리즘의 기반이 되는 배경지식과 구조를 설명하고, 알고리즘별 주요 사양을 통해 각각의 장단점을 살펴볼 것이다. 나아가 현재 양자내성연구단을 통해 우리나라에서 제안된 KpqC에 대해서도 간단히 소개할 것이다.

Prediction of the price of quantum-resistant cryptocurrency using recurrent neural network (순환 신경망을 활용한 양자 내성 암호화폐 가격 예측)

  • Kim, Hyun-Ji;Lim, Se-Jin;Kang, Yea-Jun;Kim, Won-Woong;Seo, Hwa-Jeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.592-595
    • /
    • 2021
  • 양자 알고리즘인 그루버나 쇼어 알고리즘에 의해 현존하는 암호 체계들이 무너질 수 있으며, 블록체인 네트워크를 기반으로 타원곡선 암호 및 타원곡선 전자서명을 사용하는 암호화폐의 안전성 또한 위협받고 있다. 따라서 암호화폐에도 양자 컴퓨터에 대한 대응책이 필요하다. 본 논문에서는 시계열 예측에 적합한 순환형 신경망을 활용하여 양자 저항성을 가지는 암호화폐들의 가격을 예측하고 분석한다. 데이터가 부족하였으나 학습 결과 0.005 이하의 손실을 달성하였으며, 최근 15일의 데이터를 통해 예측한 결과, 모두 소폭 상승할 것으로 나타났다. 향후에는 더 많은 데이터를 통해 더 정확한 예측이 가능한 신경망을 설계하고 다양한 양자 관련 이슈들을 참고하여 분석을 수행하고자 한다.

KpqC 암호 알고리즘의 효율성 관점에서의 분석

  • Hyeok-Dong Kwon;Min-Joo Sim;Gyeong-Ju Song;Min-Woo Lee;Hwa-Jeong Seo
    • Review of KIISC
    • /
    • v.33 no.3
    • /
    • pp.73-83
    • /
    • 2023
  • 미국 국립표준기술연구소에서는 양자 컴퓨터가 가져올 현대 암호 체계 붕괴에 대비하여 양자내성암호 표준화 공모전을 개최하였고, 공개키 암호화 알고리즘 1종, 전자서명 알고리즘 3종을 표준으로 선정하였다. 이어서 국내에서도 국내 표준양자내성암호 도입을 위한 시도가 시작되었다. KpqC 공모전은 국산 양자내성암호 알고리즘 표준화를 선정하기 위한 공모전으로, 현재 Round 1을 진행 중에 있다. 본 고에서는 KpqC 암호 알고리즘들의 암호 구현 효율성 관점에서 비교 분석한다. 이와 더불어 NIST에서 선정한 표준 알고리즘들과 실제 활용 사례를 확인해 보며 추후 표준화가 될 KpqC 암호 알고리즘들의 운영 방안에 대해 알아보도록 한다.

A Design of Authentication Method for Secure Communication based on Wearable Device (웨어러블 디바이스 기반의 안전한 통신을 위한 인증기법 설계)

  • Park, Jung-Oh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.41-46
    • /
    • 2016
  • Recently, many domestic and foreign corporates are concentrating in investment to wearable devices and users are provided with various service based on wearable devices 26% more than compared to last year. It is widely used in previous healthcare, smart work, smart home environment, and it is now introduced to get connection to fused service environment. However, as products of G company are commercialized, the security issue of personal information is causing dispute in society, and the danger of data management and security regarding telecommunication is increasing. Also, because the password system used in previous wireless environment is still in use, there are possible vulnerability considering the new and mutant security threat. This thesis conducted study about protocols that can exercise safe telecommunication in the basis of wearable devices. In the registration and certification process, the signature value is created based on the code value. The telecommunication method is designed to conduct safe telecommunication based on the signature value. As for the attack method occurring in the wearable device environment, the safety was analyzed and conducted performance evaluation of previous password system and proposal system, and verified about 14% of efficiency.

The Consideration about an Electronic Medical Record Security Standardization (전자의무기록 보안표준화에 대한 고찰)

  • Park, Doo-Hee;Song, Jae-Young;Lee, Nam-Yong
    • Journal of Information Management
    • /
    • v.36 no.1
    • /
    • pp.125-154
    • /
    • 2005
  • Due to the development of Internet and the collection and usage of the individual information, the infringements of the personal data have been increased rapidly. Regarding the personal data protection in the medical industry, it is clearly described in 'Act on Promotion of Information and Communication Network Utilization and information Protection, etc.'. the law is ratified on the basis of the service provider, therefore, it has its own limitation to be applied to medical industry. Therefore, this paper is to set the security standard and to discuss the range of legal application and considerations on its basis for the domestic medical institution at the electronic medical record system. We exemplify specific applicable content of the electronic signature in the electronic medical record also, present a security assessment item in electronic medical system and set the criteria for the security standard in the medical industry.

Design of Military Information System User Authentication System Using FIDO 2.0-based Web Browser Secure Storage (FIDO 2.0 기반의 웹 브라우저 안전 저장소를 이용하는 군 정보체계 사용자 인증 시스템 설계 및 구현)

  • Park, Jaeyeon;Lee, Jaeyoung;Lee, Hyoungseok;Kang, Jiwon;Kwon, Hyukjin;Shin, Dongil;Shin, Dongkyoo
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.43-53
    • /
    • 2019
  • Recently, a number of military intranet infiltrations suspected of North Korea have been discovered. There was a problem that a vulnerability could occur due to the modification of user authentication data that can access existing military information systems. In this paper, we applied mutual verification technique and API (Application Programming Interface) forgery / forgery blocking and obfuscation to solve the authentication weakness in web browsers that comply with FIDO (Fast IDentity Online) standard. In addition, user convenience is improved by implementing No-Plugin that does not require separate program installation. Performance tests show that most browsers perform about 0.1ms based on the RSA key generation rate. In addition, it proved that it can be used for commercialization by showing performance of less than 0.1 second even in the digital signature verification speed of the server. The service is expected to be useful for improving military information system security as an alternative to browser authentication by building a web secure storage.

Study on the Electronic Contract (전자계약에 관한 연구)

  • Kim, Jae-Nam;Park, Jong-Ryeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.6
    • /
    • pp.129-138
    • /
    • 2014
  • The Electronic contract means creation sign management and storage of contract by online without limitations of the time and space through the electronic signature and encode which based on the Certificate instead of the past that treatment the contract such as creation sign management and storage of contract by face-to-face. Recently, the remarkable development of information and communication technology with supplying the high-speed Internet services. Accordingly, the transaction contract made by these also, the steady legal effect occurred by two or more parties by legal action which is the electronic agreement of expression. and it makes agreement improving corporate productivity and it can control the whole process such as contract documents and the actual buying store provision. Like this it has many benefits so, it suddenly rising as the new axis of economic activity area, it is a reality. In this change of era, with the establishment of electronic contracts, there are many problems are occurred to the expression of parties which is core of the contract on civil code so, the systematic legal composition is required. Thus, in this study will propose the reasonable improvements about the issue of electronic contract through the consideration.

A Development of Work Breakdown Structure and Link to Standard Estimation System for 3D Printing Building (건축물 3D 프린팅 공종분류체계 도출 및 표준품셈 연계방안 제시)

  • Ju, Ki-Beom;Seo, Myoung-Bae;Park, Hyung-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.702-708
    • /
    • 2018
  • 3D printing technology is attracting increasing attention as a key technology of the fourth industrial revolution that can change the production paradigm of existing industries. The introduction of construction 3D printing technology has been slower than other industries because of the characteristics of the construction field. On the other hand construction automation using 3D printing is required to reduce the production population, as well as improve productivity and safety. In this study, a construction 3D printing work breakdown structure and link method to a standard estimation system were developed as a preliminary preparation for introducing 3D printing to construction. Based on expert consultation on construction and 3D printing, a hypothetical scenario was developed based on existing construction 3D printing technology. According to the scenario, 16 kinds of works required for 3D printing construction work were derived. The existing work breakdown structure and standard estimation system were analyzed, and the 3D printing work was linked. 3D printing works that were the same as the existing breakdown structure were found, and non-existent works were added to the similar breakdown structure. These results are expected to be helpful for future 3D printing construction management and cost estimation. The actual standard estimation system through 3D printing work will need to be calculated.

Web Services based XML Security Model for Secure Information Exchange in Electronic Commerce (전자상거래에서 안전한 정보 교환을 위한 웹 서비스 기반의 XML 보안 모델)

  • Cho, Kwang-Moon
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.5
    • /
    • pp.93-99
    • /
    • 2004
  • The most important technology in the electronic commerce based on Internet is to guarantee the security of trading information exchange. Many technologies are proposed as a standard to support this security problem. One of them is an XML (eXtensible Markup Language). This is used in various applications as the document standard for electronic commerce system. The XML security has become very important topic. In this paper an XML security model for web services based electronic commerce system to guarantee the secure exchange of trading information. To accomplish the security of XML, the differences of XML signature, XML encryption and XML key management scheme respect to the conventional system should be provided. The new architecture is proposed based on unique characteristics of XML. Especially the method to integrate the process management system need to the electronic commerce is proposed.

  • PDF

Construction Business Informatization Overview and Development Direction (Construction CALS) (건설CALS 기반의 건설정보화 현황 및 향후 발전방향)

  • Seo, Myoung-Bae;Kim, Jin-Uk;Kim, Nam-Gon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.23-24
    • /
    • 2012
  • 국내의 건설산업은 '11년 기준 580억불 수주를 달성하는 등 비약적인 양적성장을 이루어왔다. 하지만 이러한 외형적인 성장에도 불구하고 고부가가치 창출을 위한 질적성장의 발전속도는 매우 더딘 상황이다. 이에 국토해양부에서는 건설사업 전 단계에 발생하는 각종 건설정보들을 체계적으로 관리하고 건설사업비 진행의 효율성을 높이기 위해 건설정보화사업(건설CALS)을 추진중에 있다. CALS는 제조업의 모든 상품, 즉 주요장비 또는 다양한 상품 등을 획득하기 위한 설계, 생산과정, 또는 보급, 조달 및 이를 운영하는 운용지원과정을 연결시키고, 이들 과정에서 사용되는 각종 정보를 표준이라는 공통 창구를 통해 디지털화하여 컴퓨터상으로 정보를 통합하여 자동화시키는 개념이다. 이는 컴퓨터 네트워크를 이용해 상호 교환이 이루어지는 자동화되고 통합된 환경으로 변환시키는 정부와 기업간의 경영전략이라고 볼 수 있다. 이에 국내에서 진행중인 건설CALS사업현황을 고찰하고 급변하는 건설정보화 환경에 맞춰 능동적으로 대응하여 건설CALS가 건설산업의 신성장동력이 될수 있는 향후 발전방향을 도출하고자 한다.