• Title/Summary/Keyword: 안전블록

Search Result 570, Processing Time 0.023 seconds

Data Block based User Authentication for Outsourced Data (아웃소싱 데이터 보호를 위한 데이터 블록 기반의 상호 인증 프로토콜)

  • Hahn, Changhee;Kown, Hyunsoo;Kim, Daeyeong;Hur, Junbeom
    • Journal of KIISE
    • /
    • v.42 no.9
    • /
    • pp.1175-1184
    • /
    • 2015
  • Recently, there has been an explosive increase in the volume of multimedia data that is available as a result of the development of multimedia technologies. More and more data is becoming available on a variety of web sites, and it has become increasingly cost prohibitive to have a single data server store and process multimedia files locally. Therefore, many service providers have been likely to outsource data to cloud storage to reduce costs. Such behavior raises one serious concern: how can data users be authenticated in a secure and efficient way? The most widely used password-based authentication methods suffer from numerous disadvantages in terms of security. Multi-factor authentication protocols based on a variety of communication channels, such as SMS, biometric, or hardware tokens, may improve security but inevitably reduce usability. To this end, we present a data block-based authentication scheme that is secure and guarantees usability in such a manner where users do nothing more than enter a password. In addition, the proposed scheme can be effectively used to revoke user rights. To the best of our knowledge, our scheme is the first data block-based authentication scheme for outsourced data that is proven to be secure without degradation in usability. An experiment was conducted using the Amazon EC2 cloud service, and the results show that the proposed scheme guarantees a nearly constant time for user authentication.

Safety Analysis of Various Padding Techniques on Padding Oracle Attack (패딩 오라클 공격에 따른 다양한 패딩방법의 안전성 분석)

  • Kim, Kimoon;Park, Myungseo;Kim, Jongsung;Lee, Changhoon;Moon, Dukjae;Hong, Seokhee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.271-278
    • /
    • 2015
  • We use various types of cryptographic algorithms for the protection of personal and sensitive informations in the application environments, such as an internet banking and an electronic commerce. However, recent researches were introduced that if we implement modes of operation, padding method and other cryptographic implementations in a wrong way, then the critical information can be leaked even though the underlying cryptographic algorithms are secure. Among these attacking techniques, the padding oracle attack is representative. In this paper, we analyze the possibility of padding oracle attacks of 12 kinds of padding techniques that can be applied to the CBC operation mode of a block cipher. As a result, we discovered that 3 kinds were safe padding techniques and 9 kinds were unsafe padding techniques. We propose 5 considerations when designing a safe padding techniques to have a resistance to the padding oracle attack through the analysis of three kinds of safe padding techniques.

Analysis of the Segmental Reinforced Retaining Wall Behavior by Field Monitoring (현장계측을 통한 블럭식 보강토 옹벽의 거동분석)

  • Shin, Eun Chul;Lee, Chang-Seup
    • Journal of the Korean Geosynthetics Society
    • /
    • v.3 no.1
    • /
    • pp.3-15
    • /
    • 2004
  • Geogrid reinforced soil structures with segmental block facing have been increased since 1990's, because of the convenience of installation and the flexible appearance. In this paper, the behavior of the segmental reinforced retaining wall was analysed with the results of field monitoring. The height and length of reinforced wall are 12m and 25m, respectively. The field measurement equipments are horizontal and vertical earth pressure cells, settlement plate, strain gauge, inclinometer, and displacement pin. Based on the field monitoring, the horizontal earth pressure was approximately 0.3times higher than that of the theoretical method and the maximum tensile strength of reinforcement was 26.2kN/m. The displacement of facing wall was 23mm at the point of 7.1m height of the wall and toward the wall facing. The results of the study indicate that the segmental reinforced retaining wall is in a stable condition because of good compaction & reinforcement effects, and long period of construction time. Finally, the computer program of SRWall is very useful tool to design the segmental reinforced retaining wall.

  • PDF

On the Design of Lifting Lugs Based on the Ultimate Strength (최종강도에 기초한 리프팅 러그의 설계)

  • Lee, Joo-Sung
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.29 no.1
    • /
    • pp.29-36
    • /
    • 2016
  • Lifting lugs are frequently used to transport and to turn over blocks of ship and offshore structures in a shipyard. As the shipbuilding technology has been developed, blocks has become bigger and bigger, and block management technology takes a more important role in shipbuilding to enhance the productivity. For the sake of economy as well as safety in design of lug structure, needed is a more rational design procedure based on the ultimate strength derived through the rigorous non-linear structural analysis considering both the material and geometric non-linearity. This study is aimed at deriving the optimum design of T type lug structure which is frequently used in a shipyard. The optimum thickness of lug's main body is to be determined based on the results of non-linear strength analysis. As far as the present results for T type lugs having various capacity are concerned, it can be said that the present optimum design result can guarantee both safety and economy. From the fact that any regular trend cannot be found in weight reduction to the capacity of lugs, it seems to be necessary to review the current design procedure of lug structure. The present design procedure can be extensively used in design of various types of lug structures used in shipyard.

MILP-Aided Division Property and Integral Attack on Lightweight Block Cipher PIPO (경량 블록 암호 PIPO의 MILP-Aided 디비전 프로퍼티 분석 및 인테그랄 공격)

  • Kim, Jeseong;Kim, Seonggyeom;Kim, Sunyeop;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.875-888
    • /
    • 2021
  • In this paper, we search integral distinguishers of lightweight block cipher PIPO and propose a key recovery attack on 8-round PIPO-64/128 with the obtained 6-round distinguishers. The lightweight block cipher PIPO proposed in ICISC 2020 is designed to provide the efficient implementation of high-order masking for side-channel attack resistance. In the proposal, various attacks such as differential and linear cryptanalyses were applied to show the sufficient security strength. However, the designers leave integral attack to be conducted and only show that it is unlikely for PIPO to have integral distinguishers longer than 5-round PIPO without further analysis on Division Property. In this paper, we search integral distinguishers of PIPO using a MILP-aided Division Property search method. Our search can show that there exist 6-round integral distinguishers, which is different from what the designers insist. We also consider linear operation on input and output of distinguisher, respectively, and manage to obtain totally 136 6-round integral distinguishers. Finally, we present an 8-round PIPO-64/128 key recovery attack with time complexity 2124.5849 and memory complexity of 293 with four 6-round integral distinguishers among the entire obtained distinguishers.

Designing a Blockchain-based Smart Contract for Seafarer Wage Payment (블록체인 기반 선원 임금지불을 위한 스마트 컨트랙트 설계)

  • Yoo, Sang-Lok;Kim, Kwang-Il;Ahn, Jang-Young
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.7
    • /
    • pp.1038-1043
    • /
    • 2021
  • Guaranteed seafarer wage payment is essential to ensure a stable supply of seafarers. However, disputes over non-payment of wages to seafarers often occur. In this study, an automatic wage payment system was designed using a blockchain-based smart contract to resolve the problem of seafarers' wage arrears. The designed system consists of an information register, a matching processing unit, a review rating management unit, and wage remittance before deploying smart contracts. The matching process was designed to send an automatic notification to seafarers and shipowners if the sum of the weight of the four variables, namely wages, ship type/fishery, position, and license, exceeded a pre-defined threshold. In addition, a review rating management system, based on a combination of mean and median, was presented to serve as a medium to mutually fulfill the normal working conditions. The smart contract automatically fulfills the labor contract between the parties without an intermediary. This system will naturally resolve problems such as fraudulent advance payment to seafarers, embezzlement by unregistered employment agencies, overdue wages, and forgery of seafarers' books. If this system design is commercialized and institutionally activated, it is expected that stable wages will be guaranteed to seafarers, and in turn, the difficulties in human resources supply will be solved. We plan to test it in a local environment for further developing this system.

Analysis of Spatial Crime Pattern and Place Occurrence Characteristics for Building a Safe City (안전도시 조성을 위한 범죄의 공간적 분포와 도시의 장소별 발생특성 분석)

  • Heo, Sun-Young;Moon, Tae-Heon
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.15 no.4
    • /
    • pp.78-89
    • /
    • 2012
  • The purpose of this study is to examine the possibility of crime prevention in consideration of urban physical environment by analyzing the spatial distribution characteristics and pattern using actual crime occurrence data of the case city. The crime data was rebuilt by transforming them into geographic information system to analyze the spatial aspect of crime occurrence. The findings are as follows: a change from 2008 to 2011 is indicated with similar trend. But the local movements of crime hot spots are found. Moreover crimes were happening along the roads in linear pattern rather than inside of blocks in commercial area. This indicates the importance of environmental improvement of roads and open spaces. In addition it was found that the crime occurrence in a dangerous district can be reduced and prevented through the physical environment design and urban planning. The findings will contribute to promoting fundamental crime prevention as the physical environmental improvement in a city and to building a safe community as its result.

Development Trends of North America to Enhance the Flight Safety of Helicopter (헬기 운항안전 향상을 위한 북미지역의 개발 동향)

  • Oh, Kyung-Ryoon;Choi, Seok;Park, Joong-Yong
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.798-803
    • /
    • 2013
  • In this paper, the activities of North America to enhance the flight safety of helicopter were introduced. In North America, by 2009, 49% of worldwide civil helicopters are in operation. The development trends of North America to enhance the flight safety of helicopter are expected to have a significant impact to the other helicopter operating areas. The analysis of the case of Gulf of Mexico where large fleet of Helicopter in operations, FAA's NextGen program, and the Canadian plan to comply with the ICAO's Aviation System Block Upgrades plan shows the direction of helicopter avionic development for enhancing the flight safety of helicopter.

Evaluation of Chloride Attack Resistibility of Heavyweight Concrete Using Copper Slag and Magnetite as Aggregate (동슬래그 및 자철석을 골재로 사용한 중량 콘크리트의 회파블록 적용을 위한 염해저항성 평가)

  • Moon, Hoon;Kim, Ji-Hyun;Lee, Jae-Yong;Chung, Chul-Woo
    • Journal of the Korea Institute of Building Construction
    • /
    • v.17 no.6
    • /
    • pp.483-492
    • /
    • 2017
  • Recently, the coastal area has become the popular place for infrastructure development. To provide a beautiful scenary of costal area to nearby facilities without any hinderance, and also to protect those facilities from the sea water overflow, it is necessary to develop a new type of wave dissipating block, which is a turning wave block. It is noticeable that the top of the turning wave block is flat and thus can provide spaces for various purposes. However, the unit weight of the block decreases due to the presence of pipeline that is installed for turning the direction of the waves. In order to mitigate such problem, a heavyweight concrete needs to be used to increase the resistance against tidal waves. The copper slag and magnetite were used as a source of fine and coarse aggregate, respectively. The 28 day compressive strength of concrete incorporating ordinary and heavyweight aggregate did not show significant differences. It should be noted that the chloride ion penetration resistance was evaluated using NT-BUILD 492 rather than ASTM C 1202 method because concrete incorporating magnetite as a coarse aggregate showed excessive current flow by ASTM C 1202 method. According to the results from NT Build 492 method, which uses the penetration depth of chlorine ions to obtain chloride ion diffusivity, the heavyweight concrete incorporating the copper slag and the magnetite showed the best resistance against the chloride ion penetration. Therefore, it is reasonable to say that heavyweight concrete made with copper slag and magnetite can be used for production of turning wave block.

Log Management System of Web Server Based on Blockchain in Cloud Environment (클라우드 환경에서 블록체인 기반의 웹서버 로그 관리 시스템)

  • Son, Yong-Bum;Kim, Young-Hak
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.7
    • /
    • pp.143-148
    • /
    • 2020
  • Recently, web services have been expanded to various areas with the evolution of cloud environment. Whenever a user accesses a web service, the user's log information is stored in the web server. This log information is used as data to analyze the user's web service tendencies and is also used as important data to track the user's system access when a security problem in the system occurs. Currently, most web servers manage user log information in a centralized manner. When user log information is managed in a centralized manner, it is simple in the side of operation, but has a disadvantage of being very vulnerable to external malicious attacks. In the case of centralized management, user log information stored in the web server can be arbitrarily manipulated by external attacks, and in severe cases, the manipulated information can be leaked. In this case, it not only decreases the trust of the web service, but also makes it difficult to trace the source and cause of the attack on the web server. In order to solve these problems, this paper proposes a new method of managing user log information in a cloud environment by applying blockchain technology as an alternative to the existing centralized log management method. The proposed method can manage log information safely from external attacks because user log information is distributed and stored in blockchain on a private network with cloud environment.