• Title/Summary/Keyword: 안전블록

Search Result 570, Processing Time 0.023 seconds

Estimation Method of Key Block Size on a Large Scale Rock Slope by Simulation of 3-D Rock Joint System (3차원 절리계 모사를 통한 대규모 암반비탈면 파괴블록크기 추정방법)

  • Kim, Dong-Hee;Jung, Hyuk-Il;Kim, Seok-Ki;Lee, Woo-Jin;Ryu, Dong-Woo
    • Journal of the Korean Geotechnical Society
    • /
    • v.23 no.10
    • /
    • pp.97-107
    • /
    • 2007
  • Accurate evaluation of the slope stability by assuming failure block as the entire slope is considered to be apposite for the small scale slope, whereas it is not the case for the large scale slope. Hence, appropriate estimation of a failure block size is required since the safety factor and the joint strength parameters are the function of the failure block size. In this paper, the size of failure block was investigated by generating 3-dimensional rock joint system based on statistical data of joints obtained from research slope, such as joint orientation, spacing and 3-dimensional joint intensity. The result indicates that 33 potential failure blocks exist in research slope, as large as 1.4 meters at least and 38.7 meters at most, and average block height is 15.2 meters. In addition, the data obtained from 3 dimensional joint system were directly applicable to the probability analysis and 2 and 3 dimensional discontinuity analysis.

A Blockchain System for History Management of Agrifood (농식품의 이력관리를 위한 블록체인 시스템)

  • Lee, Gi-Sung;Lee, Jong-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.159-165
    • /
    • 2020
  • The demand for food safety has emerged as a major social issue due to changes in diet patterns and consumers' perceptions, along with the advancements in society and the development of the food industry. Consumers are demanding more information about the food they consume, and are sensitive to food scandals. With such interest in food safety, blockchain technology is attracting attention as a means of effectively responding to poor food management resulting in food fraud or unsafe distribution. By ensuring the accuracy of, and trust in, traceability in the food supply chain, it is possible to build trust between traders and to ensure safe food distribution. This paper proposes a next-generation agri-food distribution system that can provide and manage (for suppliers, consumers, and distribution officials) a variety of agri-food information, such as the history, distribution, safety, quality, and freshness of food. Information on product status and distribution status in all processes, including production, processing, distribution, sales, and consumption, can be monitored and controlled in real time (anytime, anywhere), and users can check the safety level of each type of food in real time through an app.

Secure Steganography Using a Block Cipher (블록 암호를 이용한 안전한 심층 암호)

  • 유정재;김종현;박종혁;양우일;이상진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.1-15
    • /
    • 2003
  • ${Cachin}^{[1]}$ defined the security of steganography theoretically at first, then ${Katzenbeisser}^{[2]}$ and ${Hopper}^{[3]}$ also discussed it on the different aspects. Unfortunately, because many steganographic systems couldnt overcome the statistical gap between a stego-cover and a pure cover, the secure steganography hasn' been evaluated yet. By the effectivel steganalysis algorithm, statistical test which was suggested by Westfel $d^{[4]}$, the attacker Wendy could select the stego-covers out of suspicious covers. Our newly developed algorithm which minimizes the changes of a pure cover by using the block cipher withstands a statistical test and has a similar embedding capacity in comparison with a simple LSB substitution steganography.

The Impact of Blockchain Technology on Banks' Conventional Trade Settlements (블록체인기술이 무역결제방식에 미치는 영향에 관한 연구)

  • Zhao, Xiao;Hwang, Ki-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.346-354
    • /
    • 2021
  • Since 2015, Blockchain has experienced rapid development throughout the world, institutions including Central Banks, Government Departments, Commercial Banks, IT Giants are all accelerating their exploration on Blockchain, and investment on Blockchain related R&D departments and start-up companies also shows explosive growth. This paper studies the impact of blockchain technology on banks' conventional trade settlement methods and describes blockchain technology in term of its concepts, advantages, and disadvantages. It also studies the application processes of blockchain technology combined with conventional trade settlement methods (remittance, collection, and L/C), and analyzes the positive and negative impacts of blockchain technology on the conventional trade settlement methods. In addition, this paper lists the blockchain application cases, analyzes the technology development status and existing problems, and puts forward suggestions and measures for the development of blockchain finance in China based on the case analysis and impact research.

A differential Uniformity of Permutations u$^{x}$ in GF(2$^{n}$ ) (갈로아체 멱승 순환 함수의 입출력 변환의 균등성)

  • 김희진;김종덕;손중제;임종인
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1997.11a
    • /
    • pp.189-195
    • /
    • 1997
  • S-box의 암호학적 성질이 블록 암호 알고리즘의 안정성을 좌우한다. 여기서 말하는 암호학적 성질이란 선형 공격법에 안전한 높은 비선형성과 입출력 변화공격법에 안전한 입출력 변환의 낮은 균등성을 말한다. 본 논문에서는 갈로아 체의 원시원을 밑으로 하는 멱승 순환 함수를 이용한 S-box의 입출력 변환의 균등성에 관하여 서술한다.

  • PDF

Random Ordering of Experimental Design According to the Nested Factor, Block Factor and Repetition Types (지분인자, 블록인자와 되풀이 유형에 따른 실험계획의 랜덤화 순서)

  • Choi, Sung-Woon
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2009.04a
    • /
    • pp.177-183
    • /
    • 2009
  • The research develops random ordering methodology of experimental design by the use of nested factor, block factor and repetition types. The spreadsheets developed are useful for quality practioner to acquire the experimental characteristics according to the random ordering.

  • PDF

Reliability Design of Breakwater Armor Blocks Considering Variability in Wave Direction (파향의 변동성을 고려한 방파제 소파블록의 신뢰성 설계)

  • 서경덕;권혁민;윤현덕
    • Proceedings of the Korean Society of Coastal and Ocean Engineers Conference
    • /
    • 2002.08a
    • /
    • pp.82-91
    • /
    • 2002
  • 방파제에 대한 신뢰성 설계 방법은 유럽과 일본을 중심으로1980년대 중반 이후로 발전되어 왔다. 유럽에서는 van der Meer(1988a)가 방파제 피복재의 설계에 확률론적인 방법을 도입하였고, Burcharth(1991)는 사석방파제에 대하여 부분안전계수(partial safety factor)를 이용한 신뢰성 설계 방법을 제시하였다 최근 Burcharth and Sørensen(1999)은 PIANC (Permanent International Association of Navigation Congress) Working Groups의 결과를 요약하여 사석방파제와 직립방파제에 대한 부분안전계수들을 확립하였다. (중략)

  • PDF

Construction of UOWHF based on Block Cipher (유니버설 일방향 해쉬 함수에 대한 블록 암호 기반 구성 방법)

  • 이원일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.101-111
    • /
    • 2004
  • Preneel, Govaerts, and Vandewalle considered the 64 basic ways to construct a collision resistant hash function from a block cipher. They regarded 12 of these 64 schemes as secure, though no proofs or formal claims were given. Black, Rogaway, and Shrimpton presented a more proof-centric look at the schemes from PGV. They proved that, in the black box model of block cipher, 12 of 64 compression functions are CRHFs and 20 of 64 extended hash functions are CRHFs. In this paper, we present 64 schemes of block-cipher-based universal one way hash functions using the main idea of PGV and analyze these schemes in the black box model. We will show that 30 of 64 compression function families UOWHF and 42 of 64 extended hash function families are UOWHF. One of the important results is that, in this black box model, we don't need the mask keys for the security of UOWHF in contrast with the results in general security model of UOWHF. Our results also support the assertion that building an efficient and secure UOWHF is easier than building an efficient and secure CRHF.

Recent Trends in Cryptanalysis Techniques for White-box Block Ciphers (화이트 박스 블록 암호에 대한 최신 암호분석 기술 동향 연구)

  • Chaerin Oh;Woosang Im;Hyunil Kim;Changho Seo
    • Smart Media Journal
    • /
    • v.12 no.9
    • /
    • pp.9-18
    • /
    • 2023
  • Black box cryptography is a cryptographic scheme based on a hardware encryption device, operating under the assumption that the device and the user can be trusted. However, with the increasing use of cryptographic algorithms on unreliable open platforms, the threats to black box cryptography systems have become even more significant. As a consequence, white box cryptography have been proposed to securely operate cryptographic algorithms on open platforms by hiding encryption keys during the encryption process, making it difficult for attackers to extract the keys. However, unlike traditional cryptography, white box-based encryption lacks established specifications, making challenging verify its structural security. To promote the safer utilization of white box cryptography, CHES organizes The WhibOx Contest periodically, which conducts safety analyses of various white box cryptographic techniques. Among these, the Differential Computation Analysis (DCA) attack proposed by Bos in 2016 is widely utilized in safety analyses and represents a powerful attack technique against robust white box block ciphers. Therefore, this paper analyzes the research trends in white box block ciphers and provides a summary of DCA attacks and relevant countermeasures. adhering to the format of a research paper.