• Title/Summary/Keyword: 안전블록

Search Result 570, Processing Time 0.026 seconds

Design of DID-based Verification Protocol for Strengthening Copyright Holders' Sovereignty (저작권자의 주권 강화를 위한 DID 기반 검증 프로토콜 설계)

  • Kim, Ho-Yoon;Shin, Seung-Soo
    • Journal of Industrial Convergence
    • /
    • v.20 no.9
    • /
    • pp.47-58
    • /
    • 2022
  • Digital content is difficult to distinguish between the original and the replica due to its nature. For this reason, NFT technology using blockchain technology is attracting attention because it can guarantee the proof and scarcity of the original digital content. However, the NFT buyer does not own the copyright to the digital content, but the ownership. In particular, since the minting process of issuing NFTs is possible for anyone, there is a copyright threat to the copyright holder. In this study, we propose a verification protocol based on DID for the process of issuing and transacting NFTs for copyright protection of copyright holders' digital contents. As a research method, the problems of research cases related to digital contents were analyzed and the safety was comparatively analyzed. NFT issuance can only be issued by copyright holders whose identity has been verified through DID, and only users who have completed authentication can participate in the transaction to prevent indiscriminate theft and use of digital content and form a safe and transparent transaction market.

A Study on Stress Redistribution Mechanism for Tunneling in an Unconsolidated Ground with Inclined Layers (미고결 층상지반에서 터널굴착시 응력재분배 메커니즘에 관한 연구)

  • Park, Si Hyun;Ahn, Sang Ro
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.1C
    • /
    • pp.53-61
    • /
    • 2006
  • This study is aimed at to examine the stress redistribution mechanism for tunneling in an unconsolidated ground with inclined layers through model tests. To make the unconsolidated ground, two dimensional model ground is prepared with aluminum rods and blocks, which are frictional resistance free between testing apparatus walls and ground materials, by establishing the ground materials self-supporting. It is carried out to measure the ground deformation and the stress redistribution for model ground with tunneling by measuring apparatus respectively. For the ground deformation, surface settlements are measured to examine the deformation features during tunnel excavation. For the stress redistribution, the earth pressure acting on both the tunneling part and its surrounding parts is measured to examine their mutual relationship. Based on test results, precise examination is conducted on the stress redistribution mechanism in the unconsolidated ground with inclined layers during tunnel construction.

Distributed Identity Authentication System based on DID Technology (DID 기술에 기반 한 분산 신원 인증 시스템)

  • Chai Ting;Seung-Soon Shin;Sung-Hwa Han
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.17-22
    • /
    • 2023
  • Traditional authentication systems typically involve users entering their username and password into a centralized identity management system. To address the inconvenience of such authentication methods, a decentralized identity authentication system based on Distributed Identifiers(DID) is proposed, utilizing decentralized identity technology. The proposed system employs QR code scanning for login, enhancing security through the use of blockchain technology to ensure the uniqueness and safety of user identities during the login process. This system utilizes DIDs and integrates the InterPlanetary File System(IPFS) to securely manage organizational members' identity information while keeping it private. Using the distributed identity authentication system proposed in this study, it is possible to effectively manage the security and personal identity of organization members. To improve the usability of the system proposed in this study, research is needed to expand it into a solution.

Encryption of Specific Area in Digital Contents for Improving Speed of Cipher (암호화 속도 향상을 위한 디지털 콘텐츠의 특징 영역 암호화)

  • Cho, Sang-Il;Hong, Kwang-Jin;Jung, Kee-Chul
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.148-150
    • /
    • 2005
  • 디지털 영상 콘텐츠는 쉽고 빠르게 복제와 전송이 가능하기 때문에 다수의 사용자가 동일한 콘텐츠를 공유하는 것이 가능하다. 이러한 디지털 콘텐츠의 특징은 많은 디지털 영상 콘텐츠 제작자의 창작 의욕을 저하시키고 콘텐츠 산업 발달을 저해하는 원인이 되고 있다. 따라서 최근 디지털 콘텐츠의 보호를 위한 다양한 연구가 활발하게 이루어지고 있다. 그러나 기존의 가산 암호 방식은 암호의 비도면에서 영상 암호화에 사용된 암호키를 추정할 수 있다는 단점이 있으며 난수 정보가 해독될 우려가 있다. 또한 주사선내 신호 절환 방식은 원영상의 히스토그램 정보를 그대로 담고 있어 암호화된 영상의 히스토그램 정보로 원영상의 종류를 추정할 수 있는 단점이 있고 블록간의 상관 관계를 계산하여 해독할 수 있다는 단점이 있다. 본 논문에서는 디지털 영상 콘텐츠의 특정 영역을 추출하고 이 영역에 대한 암호화를 함으로써, 새로운 암호 알고리즘의 개발 없이 기존의 알고리즘을 이용하여 암호화 속도를 개선하고 안전성을 향상시킬 수 있다.

  • PDF

A design of ABC(Advanced Block Cipher) Algorithm (ABC(Advanced Block Cipher) 알고리즘 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee;Yun, Dong-Sic
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.2
    • /
    • pp.64-69
    • /
    • 2010
  • This paper designs the ABC(Advanced Block Cipher) algorithm which is a 64byte block encryption algorithm, improves the performance of encryption process time, and makes an key exchange using EC-DH. The ABC algorithm reduces basic memory occupation rates using the original data position exchange method which is a data swap key without S-Box, IP-Box and etc. Also, it prepares the exposure of symmetric key using the unfixed encryption(decryption) key excepting the fixed encryption(decryption) key. Therefore, the proposed ABC algorithm in this paper is a proper encryption algorithm in lower memory environment and mobile banking.

  • PDF

The Analysis of Cipher Padding Problem for Message Recovery Security Function of Honey Encryption (허니암호의 메시지 복구보안 기능을 위한 암호패딩 문제점 분석)

  • Ji, Changhwan;Yoon, Jiwon
    • Journal of KIISE
    • /
    • v.44 no.6
    • /
    • pp.637-642
    • /
    • 2017
  • Honey Encryption (HE) is a technique to overcome the weakness of a brute-force attack of the existing password-based encryption (PBE). By outputting a plausible plaintext even if the wrong key is entered, it provides message recovery security which an attacker can tolerate even if the attacker tries a brute-force attack against a small entropy secret key. However, application of a cipher that requires encryption padding to the HE present a bigger problem than the conventional PBE method. In this paper, we apply a typical block cipher (AES-128) and a stream cipher (A5 / 1) to verify the problem of padding through the analysis of the sentence frequency and we propose a safe operation method of the HE.

The cryptographic module design requirements of Flight Termination System for secure cryptogram delivery (안전한 보안명령 전달을 위한 비행종단시스템용 암호화 장치 설계 요구사항)

  • Hwang, Soosul;Kim, Myunghwan;Jung, Haeseung;Oh, Changyul;Ma, Keunsu
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.3
    • /
    • pp.114-120
    • /
    • 2015
  • In this paper, we show the design requirements of the cryptographic module and its security algorithm designed to prevent the exposure of the command signal applied to Flight Termination System. The cryptographic module consists of two separate devices that are Command Insertion Device and Command Generation Device. The cryptographic module designed to meet the 3 principles(Confidentiality, Integrity and Availability) for the information security. AES-256 block encryption algorithm and SHA-256 Hash function were applied to the encrypted symmetric key encryption method. The proposed cryptographic module is expected to contribute to the security and reliability of the Flight Termination System for Space Launch Vehicle.

A Study on AES Extension for Large-Scale Data (대형 자료를 위한 AES 확장에 관한 연구)

  • Oh, Ju-Young;Kouh, Hoon-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.6
    • /
    • pp.63-68
    • /
    • 2009
  • In the whole information technology area, the protection of information from hacking or tapping becomes a very serious issue. Therefore, the more effective, convenient and secure methods are required to make the safe operation. Encryption algorithms are known to be computationally intensive. They consume a significant amount of computing resources such as CPU time and memory. In this paper we propose the scalable encryption scheme with four criteria, the compression of plaintext, variable size of block, selectable round and software optimization. We have tested our scheme by c++. Experimental results show that our scheme achieves the faster execution speed of encryption/decryption.

  • PDF

Automatic Charge Equalization Circuit Based on Regulated Voltage source for Lithium-ion Batteries (정류된 전압원을 이용한 리튬 이온 배터리용 자동 전하 균일 회로)

  • Kim, Moon-Young;Kim, Chol-Ho;Kim, Jun-Ho;Cho, Shin-Young;Moon, Gun-Woo
    • Proceedings of the KIPE Conference
    • /
    • 2010.07a
    • /
    • pp.224-225
    • /
    • 2010
  • 직렬로 연결된 리튬 이온 배터리의 안전성을 보장하고 배터리 수명을 늘리기 위해서 셀 전하 균일 회로가 필요하다. 하지만 기존의 전하 균일 회로의 경우 셀 전압을 알아내기 위한 셀 전압 센싱모듈이 필요하게 되고 이는 가격이나 부피적인 측면에서 불리하게 되며, 만약 셀 전압 센싱 모듈을 제거 할 경우 전하 균일 성능이 크게 떨어지게 된다. 본 논문에서는 배터리 팩의 평균전압과 동일한 크기를 가지는 정류된 전압원을 이용한 자동 전하 균일 회로를 제안한다. 제안하는 자동 전하 균일 회로는 양방향 DC/DC 컨버터와 주기적이고 반복적으로 셀 선택을 하는 스위칭 블록을 이용하여 셀 전압 센싱모듈 없이도 우수한 전하 균일을 가능하도록 한다. 그리고 제안된 회로의 동작원리를 설명하고, 8셀 배터리 모듈을 이용한 실험을 통하여 회로의 동작을 검증하였다.

  • PDF

A Study on the Development of Composite Brake System through Analysis of advanced Braking Performance Factors (제동성능 고급화 인자 분석을 통한 복합재 제동시스템 개발에 관한 연구)

  • Shim, J.H.;Shin, U.H.;Lee, J.H.;Hwang, S.R.;Yim, W.S.;Kim, B.C.;Lim, D.W.;Hyun, E.J.;Lee, J.M.;Kim, H.K.
    • Journal of Auto-vehicle Safety Association
    • /
    • v.12 no.1
    • /
    • pp.26-32
    • /
    • 2020
  • The luxury car market has been steadily growing for the last 10 years and it might keep expanding in the future. Furthermore, it is expected to be a very competitive market because luxury cars are considred to reflect the technology level of motor companies. For this reason, it is very important for motor companies to improve performances of luxury vehicles. However, it takes years for the companies to increase the technology level for the high performances. In this paper, we aim to analyze the technologies for high quality brake perfomances through investigation of two luxury vehicle models and develop a new high performance brake system. First, we found out a variety of effective factors for the high performances. Second, we conducted the brake performance analysis to figure out the relationship between brake effort and brake feeling. Finally, we develped the new brake system using carbon ceramic composite materials to satisfy the high quality brake performances.