• Title/Summary/Keyword: 안전규칙

Search Result 562, Processing Time 0.027 seconds

Experimental Design of S box and G function strong with attacks in SEED-type cipher (SEED 형식 암호에서 공격에 강한 S 박스와 G 함수의 실험적 설계)

  • 박창수;송홍복;조경연
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.1
    • /
    • pp.123-136
    • /
    • 2004
  • In this paper, complexity and regularity of polynomial multiplication over $GF({2^n})$ are defined by using Hamming weight of rows and columns of the matrix ever GF(2) which represents polynomial multiplication. It is shown experimentally that in order to construct the block cipher robust against differential cryptanalysis, polynomial multiplication of substitution layer and the permutation layer should have high complexity and high regularity. With result of the experiment, a way of constituting S box and G function is suggested in the block cipher whose structure is similar to SEED, which is KOREA standard of 128-bit block cipher. S box can be formed with a nonlinear function and an affine transform. Nonlinear function must be strong with differential attack and linear attack, and it consists of an inverse number over $GF({2^8})$ which has neither a fixed pout, whose input and output are the same except 0 and 1, nor an opposite fixed number, whose output is one`s complement of the input. Affine transform can be constituted so that the input/output correlation can be the lowest and there can be no fixed point or opposite fixed point. G function undergoes linear transform with 4 S-box outputs using the matrix of 4${\times}$4 over $GF({2^8})$. The components in the matrix of linear transformation have high complexity and high regularity. Furthermore, G function can be constituted so that MDS(Maximum Distance Separable) code can be formed, SAC(Strict Avalanche Criterion) can be met, and there can be no weak input where a fixed point an opposite fixed point, and output can be two`s complement of input. The primitive polynomials of nonlinear function affine transform and linear transformation are different each other. The S box and G function suggested in this paper can be used as a constituent of the block cipher with high security, in that they are strong with differential attack and linear attack with no weak input and they are excellent at diffusion.

User Authentication Method using Vibration Cue on Smartphone (진동 큐를 이용한 스마트폰 사용자 인증 방식)

  • Lee, Jong-Hyeok;Choi, Ok-Kyung;Kim, Kang-Seok;Yeh, Hong-Jin
    • The KIPS Transactions:PartC
    • /
    • v.19C no.3
    • /
    • pp.167-172
    • /
    • 2012
  • Mobile phone devices and memory card can be robbed and lost due to the carelessness that might be caused to leak personal information, and also company's confidential information can be disclosed. Therefore, the importance of user authentication to protect personal information is increasing exponentially. However, there are the limitations that criminals could easily obtain and abuse information about individuals, because the input method of personal identification number or the input method of password might not be safe for Shoulder Surfing Attack(SSA). Although various biometric identification methods were suggested to obstruct the SSA, it is the fact that they also have some faults due to the inconvenience to use in mobile environments. In this study, more complemented service for the user authentication was proposed by applying Keystroke method in the mobile environments to make up for the faults of existing biometric identification method. Lastly, the effectiveness and validity of this study were confirmed through experimental evaluations.

A Study on Development of CPTED Evaluation Indicators and Assessment of Types in Neighboring Park - Focused on Neighborhood Parks in Busan - (근린공원 CPTED 적용을 위한 평가지표 개발 및 유형별 평가에 관한 연구 - 부산광역시 근린공원을 대상으로 -)

  • Sohn, Jee Hyun;Kim, Jong Gu;Kim, Yu Jun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.35 no.1
    • /
    • pp.237-254
    • /
    • 2015
  • Neighborhood Parks are important facilities for urban residents, which provide recreation and vitality to users. But it can degenerate into crime-ridden area in the absence of control system. Recently, Crime Prevention Through Environmental Design is confirmed to be effective for safety enhancement, Ministry of Land, Infrastructure and Transport promulgates enforcement regulation about urban parks and greens. In the enforcement regulation, consideration of CPTED in park design is mandatory. However, there is no systematic guideline for the application and continuous maintenance control. So we develop evaluation indicators of neighborhood park about CPTED, and verify the weighted value of the evaluation indicator through survey targeting related field experts. Then, we evaluate safety of neighborhood parks in Busan using developed evaluation indicators, by three types of CPTED application level. On the physical design elements Busan Citizen Park which applied CPTED method from the design phase received the remarkably hightest score, whereas, on the social elements score was investigated differently in accordance with characteristics of each park.

A Design of Advanced Channel Creation in e-Passport (전자여권의 향상된 채널생성 기법 설계)

  • Lee, Gi-Sung;Jeon, Sang-Yeob;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.10
    • /
    • pp.4814-4821
    • /
    • 2012
  • An e-passport is equipped with bio information by adding the non-attachable IC chip with a smart function. In order to solve such a problem, the user's privacy is protected by using the BAC, PA, AA and EAC mechanisms. However, the password key used in the BAC mechanism is made of the combination of the MRZ values. As a result, it is possible to decode the password by using the indiscriminate attacking program after finding out the combined rules of MRZ. This thesis suggests the mechanism with an improved level of efficiency through the time-stamp values by using the information of images and fingerprints and checking the forge or falsification of the e-passport when establishing a safe channel between the chip of the e-passport and the decoding system.

Problems and Solutions for Securing Fire Resistance Performance in Fire Protection doors (방화문 내화성능 확보에 대한 제도적 문제점 및 해결방안)

  • Kim, Juseong;Kim, Siwon;Cho, Youngduk;Kim, Jaejun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.21 no.2
    • /
    • pp.22-29
    • /
    • 2020
  • Among many fire-related laws and standards such as fire protection, fire doors are important facilities that play a role in preventing the spread of fire and smoke in the event of fire, thereby minimizing human casualties. Accordingly, the standards for performance required by applicable laws and regulations and related enforcement rules and notices have been continuously raised and the corresponding performance must be secured. However, due to the shortcomings of the relevant laws and systems, the test results of the fire doors confirmed that there was a risk of passing products. In this study, the criteria for fire-related performance were analyzed, and the performance required by other laws, in addition to simple fire protection, was identified, the criteria were organized, and the complex performance required was clearly.

Model-Prediction-based Collision-Avoidance Algorithm for Excavators Using the RLS Estimation of Rotational Inertia (회전관성의 순환최소자승 추정을 이용한 모델 예견 기반 굴삭기의 충돌회피 알고리즘 개발)

  • Oh, Kwang Seok;Seo, Jaho;Lee, Geun Ho
    • Journal of Drive and Control
    • /
    • v.13 no.4
    • /
    • pp.59-67
    • /
    • 2016
  • This paper proposes a model-prediction-based collision-avoidance algorithm for excavators for which the recursive-least-squares (RLS) estimation of the excavator's rotational inertia is used. To estimate the rotational inertia of the excavator, the RLS estimation with multiple forgetting and two updating rules for the nominal parameter and the forgetting factors was conducted based on the excavator-swing dynamics. The average value of the estimated rotational inertia that is for the minimizing effects of the estimation error was computed using the recursive-average method with forgetting. Based on the swing dynamics, the computed average of the rotational inertia, the damping coefficient for braking, and the excavator's braking angle were predicted, and the predicted braking angle was compared with the detected-object angle for a safety evaluation. The safety level defined in this study consists of the three levels safe, warning, and emergency braking. The analytical rotational-inertia-based performance evaluation of the designed estimation algorithm was conducted using a typical working scenario. The results of the safety evaluation show that the predictive safety-evaluation algorithm of the proposed model can evaluate the safety level of the excavator during its operation.

Distributed Data Management based on t-(v,k,1) Combinatorial Design (t-(v,k,1) 조합 디자인 기반의 데이터 분산 관리 방식)

  • Song, You-Jin;Park, Kwang-Yong;Kang, Yeon-Jung
    • The KIPS Transactions:PartC
    • /
    • v.17C no.5
    • /
    • pp.399-406
    • /
    • 2010
  • Many problems are arisen due to the weakness in the security and invasion to privacy by malicious attacker or internal users while various data services are available in ubiquitous network environment. The matter of controlling security for various contents and large capacity of data has appeared as an important issue to solve this problem. The allocation methods of Ito, Saito and Nishizeki based on traditional polynomial require all shares to restore the secret information shared. On the contrary, the secret information can be restored if the shares beyond the threshold value is collected. In addition, it has the effect of distributed DBMS operation which distributes and restores the data, especially the flexibility in realization by using parameters t,v,k in combinatorial design which has regularity in DB server and share selection. This paper discuss the construction of new share allocation method and data distribution/storage management with the application of matrix structure of t-(v,k,1) design for allocating share when using secret sharing in management scheme to solve the matter of allocating share.

A Study of Fire Shunt Guidance Based on Wireless Sensor Networks (무선 센서 네트워크 기반의 화재 대피 유도 연구)

  • Kim, Yong-Woo;Kim, Do-Hyeon;Kwak, Ho-Young;Park, Hee-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.11
    • /
    • pp.1547-1554
    • /
    • 2008
  • This paper proposes a fire shunt guidance system model based on rule, it presents suitable shunt route in real-time according to collected fire information of the building inside using wireless sensor networks. So, this system model is composed of the sensor alert module, the behavior suggestion module, and the emergency device control module. The sensor alert module uses rule-base algorithm that monitored the information to collect periodically in wireless sensor networks. And, the behavior suggestion module proposed a suitable behavior, this module supports to judge the fire area with danger sensor list. Additional, the emergency device control module controls a related emergency device according to the suggested behavior and to present on a control screen. We experiment the fire shunt guidance system based on Internet Web for operation verification of the proposed system. Consequently, this study supports people safety with the behavior suggestion according to the context information when an emergency situation happens.

  • PDF

Reliable methods at low temperatures for LED navigation light of ships (LED 선박용 항해등의 저온에서의 신뢰성 방안)

  • Yang, Byongmoon;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.1
    • /
    • pp.83-87
    • /
    • 2015
  • LED navigation light installed on the ship performs a important role to ensure safety and prevent collisions with other ships. LED navigation light is mainly used in the night and within the limited visibility by smoke, rainfall. In particular, LED navigation light installed with a clear understanding. LED navigation light is consist of LED module, a control board, a converter, a Fresnel lens, such as enclosure. Russian Society of LED navigation light (RMRS) of the ship to be delivered by drying at Daewoo Shipbuilding & Marine Engineering requires guaranteed reliable products at below $-52^{\circ}C$. conventional LED navigation light has to ensure quality at $-25{\sim}40^{\circ}C$. So, LED navigation light should ensure a problems of random failure or long time operation. In this paper, we present the current status and future plans of reliability so far.

Security Technique using SSH Tunneling for CCTV Remote Access (SSH 터널링을 이용한 CCTV 원격접속 보안기법)

  • HWANG, GIJIN;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.148-154
    • /
    • 2016
  • Video security has recently emerged as an important issue owing to CCTV video image spill accidents over the Internet. KISA recommends the use of encryption protocols for remote access through its guidelines for CCTV personal video information protection. But still, many products do not adhere to the guidelines, and those products are easily exposed to security threats, such as hacking. To solve these security vulnerabilities, this paper proposes a CCTV system that connects from remote locations, and is implemented by using secure shell (SSH) tunneling techniques. The system enhances security by transmitting encrypted data by using SSH. By using the tunneling technique, it also solves the problem of not being able to access a CCTV recorder located inside a firewall. For evaluation of the system, this paper compares various CCTV remote access schemes and security. Experimental results on the effectiveness of the system show it is possible to obtain remote access without a significant difference in transmission quality and time. Applying the method proposed in this paper, you can configure a system secure from the threats of hacking.