• Title/Summary/Keyword: 안전블록

Search Result 570, Processing Time 0.031 seconds

Stream Cipher using Double S-boxes (이중 S박스를 이용한 스트림 암호 알고리즘)

  • 박미옥;최연희;강정호;전문석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10b
    • /
    • pp.229-231
    • /
    • 2003
  • 본 고에서는 지속적으로 증가하는 이동통신 사용자들에게 이동통신의 편리성뿐만 아니라 안전한 통신을 제공하기 위해 기존의 스트림 암호알고리즘의 비도 향상을 위한 메커니즘을 제안한다. 본 논문에서는 이동통신상의 데이터를 보다 안전하게 암호화하기 위한 메커니즘으로서 블록암호 알고리즘에서 주로 사용하는 S 박스를 이중으로 사용하는 메커니즘과 이중으로 사용되는 S 박스를 위한 행ㆍ열 메커니즘을 제안한다. 본 고에서 사용하는 S 박스는 DES의 S 박스의 일부를 사용하며, 사용되는 S 박스는 스트림 암호 알고리즘의 모든 비트에 대해 통과되는 것이 아니라 0인 경우에만 제안하는 이중 S 박스를 통과하는 방법을 사용한다. 제안한 모델은 4장의 실험에서 기존모델과 비교ㆍ분석하여 제안한 모델의 효율성을 증명한다.

  • PDF

Application of Block Design for an Efficient Conference Key Distribution System (효율적인 회의용 키분배 시스템을 위한 Block Design의 응용)

  • Lee, Tae-Hun;Jeong, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.3
    • /
    • pp.271-276
    • /
    • 2001
  • 회의용 키분배 시스템은 회의용 키를 생성하여 키를 회의에 참석하고 있는 사람에게만 전달하여 서로간에 안전하게 통신하도록 한다. 본 논문에서는 Block Design의 한 분류인 symmetric balanced incomplete block design(SBIBD)를 적용한 효율적인 회의용 키분배시스템을 제안한다. 회의용 키를 생성하고 개인식별 정보를 근거로 하여 인증을 수행하는 통신 프로토콜이 설계된다. 제안된 프로토콜은 회의용 키를 생성하는 메시지의 복잡도를 최소화시키는데, SBIBD의 특별한 분류에서는 참석자의 수 v에 따라 메시지 복잡도는 O(v√v)가 된다. 보안시스템의 구현에서 중요한 요소인 프로토콜의 안전성은 factoring과 discrete logarithm을 계산할 정도로 난해하여 충분히 보장됨을 증명할 수 있다.

  • PDF

A Study on Automatic Printer Management System based on Ethereum Smart Contract (이더리움 스마트 컨트랙트 기반 자동 프린터 관리 시스템)

  • Kim, Ga Hyeon;Kim, Dae Han;Choi, Kwang Hoon;Kim, Kangseok;Kim, Jai-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.85-86
    • /
    • 2018
  • 본 연구에서는 프린터에 블록체인을 사용하여 정보의 신뢰성을 기반으로 안전하고 편리하게 소모품을 주문할 수 있는 시스템을 구축하는 것을 목표로 한다. 스마트 컨트랙트를 활용하여 기존의 거래 시의 불편함을 감소시키고 주문뿐만 아니라 결제까지 안전하게 이루어지도록 한다.

A Implementation of Blockchain based Manufacturing Supply Chain Tracking System (블록체인 기반 제조 공급망 추적 시스템 구현)

  • Lee, Jae-Ho;Nam, Ho-Ki
    • Journal of the Korea Safety Management & Science
    • /
    • v.19 no.4
    • /
    • pp.183-188
    • /
    • 2017
  • Block Chain is a technology that records and shares distributed ledgers without a central authority, providing a decentralized platform for transparent transactions in the business and enhancing transparency and traceability in all transactions to ensure trust in the transaction. Despite initial doubts about this technology, it is committed to adopting, adapting and improving the technology in a wide range of industries, including finance, government, security, logistics, food, medical, legal, and real estate. This study examines this technology, its applicability and potential benefits to the manufacturing supply chain. A tracking system of manufacturing supply chain to visualize transparency and traceability is implemented, and the conditions for adopting the technology in the manufacturing supply chain and the issues to be addressed are discussed.

An analysis on the security of the 3GPP MAC algorithm (3GPP MAC 알고리즘 안전성 분석)

  • 홍도원;신상욱;강주성;이옥연
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.2
    • /
    • pp.59-65
    • /
    • 2001
  • 3GPP proposed a variant CBC-MAC based on the block cipher KASUMI to provide the data integrity over a radio access link. We have studied deeply the Knudsen and Mitchell\`s attack. In this paper we proposed a definite performing algorithm of the Knudsen and Mitchell\`s alack and compute the success probability and complexity of that algorithm. Moreover We also analyze a security of 3GPP-MAC comparing with the original CBC-MAC.

Transportation Application Services For The Blind (시각장애인을 위한 교통시설 앱 서비스)

  • Park, Sang-cheon;Lee, Seung-hyeon;Lee, Seung-gi;Kang, Eun-seo;Hong, Chae-rin;Kim, Byeong-wan;Lee, Byong-kwon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.523-525
    • /
    • 2022
  • 본 논문에서는 시각장애인을 위한 교통시설 앱 서비스를 제안한다. 이 서비스는 시각장애인이 편리하게 사용하고 안전하게 교통수단을 이용할 수 있는 음성지원 경로 알림이 탑재되어 있는 내비게이션 앱이다. 스마트 디바이스 기기만 있으면 쉽게 설치가 가능하며, 이를 통해 시각장애인에게 경로 이탈에 대한 두려움을 줄이고 음성지원 경로 알림 서비스를 제공해 안전하게 교통수단을 이용할 수 있다. 50개국 이상 언어지원 블록체인을 이용한 구조 A-GPS, T MAP, 음성을 사용 본 논문에서는 시뮬레이션을 통하여 문제점 해소와 더 나아가 시각장애인의 독립적인 이동 문화 형성을 제공한다.

  • PDF

Relationship between Traffic Accidents of Elderly Pedestrians and Barrier-Free Facilities in the Case of Cheongju (고령보행자의 교통사고와 이동편의시설과의 관계 (청주시를 사례로))

  • Park, Byeong-Ho;Yang, Jeong-Mo;In, Byeong-Cheol
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.2
    • /
    • pp.189-197
    • /
    • 2009
  • The purpose of this study is to analyze the relationships between the traffic accidents of elderly pedestrians and barrier-free facilities in the case of Cheongju. First, many accidents of elderly pedestrians were determined to occur in the road and during crossing. Second, the correlation analysis shows that the paving conditions, guiding blocks and embossed blocks have impacts on elderly safety. Finally, the logistic regression model, which is statistically significant (chi-square =0.000, Nagelkerke =0.198), was developed, and includes the paving conditions, bollards, audible signals and remaining time signs as the independent variables. The variables, with the exception of the existence of bollards, are all analyzed to have positive impacts to elderly safety.

Side Channel Attacks on HIGHT and Its Countermeasures (HIGHT에 대한 부채널 분석 및 대응 방법)

  • Kim, Tae-Jong;Won, Yoo-Seung;Park, Jin-Hak;An, Hyun-Jin;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.457-465
    • /
    • 2015
  • Internet of Things(IoT) technologies should be able to communication with various embedded platforms. We will need to select an appropriate cryptographic algorithm in various embedded environments because we should consider security elements in IoT communications. Therefore the lightweight block cryptographic algorithm is essential for secure communication between these kinds of embedded platforms. However, the lightweight block cryptographic algorithm has a vulnerability which can be leaked in side channel analysis. Thus we also have to consider side channel countermeasure. In this paper, we will propose the scenario of side channel analysis and confirm the vulnerability for HIGHT algorithm which is composed of ARX structure. Additionally, we will suggest countermeasure for HIGHT against side channel analysis. Finally, we will explain how much the effectiveness can be provided through comparison between countermeasure for AES and HIGHT.

DPA-Resistant Logic Gates and Secure Designs of SEED and SHA-1 (차분 전력분석 공격에 안전한 논리 게이트 및 SEED 블록 암호 알고리즘과 SHA-1 해쉬 함수에의 응용)

  • Baek, Yoo-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.17-25
    • /
    • 2008
  • The differential power attack (DPA)[8] is a very powerful side-channel attack tool against various cryptosystems and the masking method[10] is known to be one of its algorithmic countermeasures. But it is non-trivial to apply the masking method to non-linear functions, especially, to arithmetic adders. This paper proposes simple and efficient masking methods applicable to arithmetic adders. For this purpose, we use the fact that every combinational logic circuit (including the adders) can be decomposed into basic logic gates (AND, OR, NAND, NOR, XOR, XNOR, NOT) and try to devise efficient masking circuits for these basic gates. The resulting circuits are then applied to the arithmetic adders to get their masking algorithm. As applications, we applied the proposed masking methods to SEED and SHA-1 in hardware.

An Implementation of the Security Service on Internet Mail System (인터넷 메일 시스템에서의 정보보호 서비스 구현)

  • 강명희;신효영;유황빈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.2
    • /
    • pp.107-122
    • /
    • 1997
  • Most of the currently used electronic mail system has the threat of security such as illegal leak of message, forgery, uncertain identity, denial of sending and receiving, and so forth. The security for this system is not satisfied yet, thus we explore these problems. In this thesis, we implement the security services for internet mail system which cover the weakness for traditional mail system. This system provides not only security services which PEM and PGP provides (i.e message confidentiality, message integrity, originator authentication, non-repudiation of origin), but also message replay prevention. and non-denial of recipient using certification of contents. In addition, this system increases security of the digital signature by signing with signature block formatting on the creation of it. And it increases security of the digital enveloping by encrypting with encryption block formatting of message encryption key.