• Title/Summary/Keyword: 요소 암호화

Search Result 180, Processing Time 0.032 seconds

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key (마이크로 모빌리티 환경에서 보안 그룹키를 이용한 안전한 멀티캐스트 프로토콜)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.573-586
    • /
    • 2008
  • The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.

Study on High-speed Cyber Penetration Attack Analysis Technology based on Static Feature Base Applicable to Endpoints (Endpoint에 적용 가능한 정적 feature 기반 고속의 사이버 침투공격 분석기술 연구)

  • Hwang, Jun-ho;Hwang, Seon-bin;Kim, Su-jeong;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.21-31
    • /
    • 2018
  • Cyber penetration attacks can not only damage cyber space but can attack entire infrastructure such as electricity, gas, water, and nuclear power, which can cause enormous damage to the lives of the people. Also, cyber space has already been defined as the fifth battlefield, and strategic responses are very important. Most of recent cyber attacks are caused by malicious code, and since the number is more than 1.6 million per day, automated analysis technology to cope with a large amount of malicious code is very important. However, it is difficult to deal with malicious code encryption, obfuscation and packing, and the dynamic analysis technique is not limited to the performance requirements of dynamic analysis but also to the virtual There is a limit in coping with environment avoiding technology. In this paper, we propose a machine learning based malicious code analysis technique which improve the weakness of the detection performance of existing analysis technology while maintaining the light and high-speed analysis performance applicable to commercial endpoints. The results of this study show that 99.13% accuracy, 99.26% precision and 99.09% recall analysis performance of 71,000 normal file and malicious code in commercial environment and analysis time in PC environment can be analyzed more than 5 per second, and it can be operated independently in the endpoint environment and it is considered that it works in complementary form in operation in conjunction with existing antivirus technology and static and dynamic analysis technology. It is also expected to be used as a core element of EDR technology and malware variant analysis.

The study of Defense Artificial Intelligence and Block-chain Convergence (국방분야 인공지능과 블록체인 융합방안 연구)

  • Kim, Seyong;Kwon, Hyukjin;Choi, Minwoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.81-90
    • /
    • 2020
  • The purpose of this study is to study how to apply block-chain technology to prevent data forgery and alteration in the defense sector of AI(Artificial intelligence). AI is a technology for predicting big data by clustering or classifying it by applying various machine learning methodologies, and military powers including the U.S. have reached the completion stage of technology. If data-based AI's data forgery and modulation occurs, the processing process of the data, even if it is perfect, could be the biggest enemy risk factor, and the falsification and modification of the data can be too easy in the form of hacking. Unexpected attacks could occur if data used by weaponized AI is hacked and manipulated by North Korea. Therefore, a technology that prevents data from being falsified and altered is essential for the use of AI. It is expected that data forgery prevention will solve the problem by applying block-chain, a technology that does not damage data, unless more than half of the connected computers agree, even if a single computer is hacked by a distributed storage of encrypted data as a function of seawater.

Effect of hnRNP-like protein THO4 on growth and mRNA export in fission yeast (분열효모에서 hnRNP-유사 단백질인 THO4가 생장 및 mRNA 방출에 미치는 영향)

  • Park, Jin Hee;Lee, Sojeong;Yoon, Jin Ho
    • Korean Journal of Microbiology
    • /
    • v.54 no.2
    • /
    • pp.91-97
    • /
    • 2018
  • The evolutionally conserved TREX complex member, Yra1/ALY, belongs to the REF (RNA and export factor binding proteins) family of hnRNP-like proteins, which has been implicated in multiple processes including transcription, nuclear RNA stability, and mRNA export. Fission yeast, Schizosaccharomyces pombe, genome encodes two members of REF proteins. In addition to Mlo3 known previously as an mRNA export factor, there is the other REF protein, Tho4, which is predicted as a component of THO complex. Here we showed that deletion of tho4 (SPBC106.12c) gene does not inhibit both growth and nuclear mRNA export. However, overexpression of tho4 displays growth retardation and slight accumulation of $poly(A)^+$ RNA in the nucleus. Neither ${\Delta}tho4$ ${\Delta}mlo3$ nor ${\Delta}tho4$ ${\Delta}mex67$ double mutants exhibit additive growth defect. Moreover, yeast two-hybrid and co-immunoprecipitation analysis did not show that the Tho4 protein interacted with any members of TREX complex and mRNA export factor Rae1. Contrary to expectation, these observations support that the S. pombe Tho4 is not a component of TREX complex, and not directly involved in bulk mRNA export from the nucleus.

Gene Structure and Function of fkhE, a Forkhead Gene in a Filamentous Fungus Aspergillus nidulans (Aspergillus nidulans forkhead 유전자 fkhE의 구조와 기능 분석)

  • Park, Mi-Hye;Kim, Hyoun-Young;Kim, Jong-Hwa;Han, Kap-Hoon
    • The Korean Journal of Mycology
    • /
    • v.38 no.2
    • /
    • pp.160-166
    • /
    • 2010
  • A homothallic filamentous fungus Aspergillus nidulans has been used as the a model organism for studying growth and development for eukaryotic system. Various studies about specific transcription factors have been performed for elucidating the molecular mechanisms of growth, asexual and sexual developmental processes. Among them, the fkhE gene (AN2025.3) is located in chromosome VII and contains an ORF encoding 718 amino acid polypeptide intervening with two short introns. The cDNA sequencing revealed that at least four types of alternative splicing events were occurred when the fkhE gene was transcribed. The putative FkhE polypeptide contains a conserved forkhead domain and a bipartite nuclear localization signal at it's N-terminus and C-terminus, respectively. Deletion of fkhE resulted in impaired conidiophore formation in a solid medium. However, the sexual developmental process or cleistothecia formation was normal. Furthermore, fkhE deletion mutant produced conidiophores and conidia under the submerged culture, indicating that the fkhE gene is involved in asexual developmental process similar to the fkhF gene.

A Guideline for Identifying Blockchain Applications in Organizations (기업에서 요구되는 블록체인 애플리케이션 탐색을 위한 가이드라인)

  • Namn, Su Hyeon
    • Management & Information Systems Review
    • /
    • v.38 no.1
    • /
    • pp.83-101
    • /
    • 2019
  • Blockchain is considered as an innovative technology along with Artificial Intelligence, Big Data, and Internet of Things. However, since the inception of the genesis of blockchain technology, the cryptocurrency Bitcoin, the technology is not utilized widely, not let alone disruptive applications. Most of the blockchain research deals with the cryptocurrency, general descriptions of the technology such as trend, outlook of the technology, explanation of component technology, and so on. There are no killer applications like Facebook or Google, of course. Reflecting on the slow adoption by businesses, we wanted know about the current status of the research on blockchain in Korea. The main purpose of this paper is to help business practitioners to identify the application of blockchain to enhance the competitiveness of their organization. To do that, we first use the framework by Iansiti et al (2017) and categorize the blockchain related articles published in Korea according to the framework. This is to provide a benchmark or cases of other organizations' adoption of blockchain technology. Second, based on the value proposition of blockchain applications, we suggest evolutionary paths for adopting them. Third, from the demand pull perspective of technology adoption for innovation, we propose applicable areas where blockchain applications can be introduced. Fourth, we use the value chain model to find out the appropriate domains of blockchain applications in the corporate value chains. And the five competitive forces models is adopted to find ways of lowering the power of forces by incorporating blockchain technology.

Identification and molecular characterization of the chitinase gene, EaChi, from the midgut of the earthworm, Eisenia andrei (붉은줄지렁이 (Eisenia andrei) 중장에서 발현되는 chitinase 유전자, EaChi의 동정 및 분자생물학적 특성에 관한 연구)

  • Tak, Eun Sik;Kim, Dae hwan;Lee, Myung Sik;Ahn, Chi Hyun;Park, Soon Cheol
    • Journal of the Korea Organic Resources Recycling Association
    • /
    • v.18 no.3
    • /
    • pp.31-37
    • /
    • 2010
  • Chitinases (EC 3.2.1.14) hydrolyze the ${\beta}$-1,4-linkages in chitin, the second most abundant polymer of N-acetyl-${\beta}$-D-glucosamine which is a structural component of protective biological matrices such as fungal cell walls and insect exoskeletons. The glycosyl hydrolases 18 family including chitinases is an ancient gene family widely expressed in archea, prokaryotes and eukaryotes. Since earthworms live in the soil with a lot of microbial activities and fungi are supposed to be a major component of the diet of earthworm, it has been reported that there would be appropriate immune system to protect themselves from microorganisms attacks. In this study, the novel chitinase, EaChi, from the midgut of earthworm, Eisenia andrei, were identified and characterized. To obtain full-length cDNA sequence of chitinase, RT-PCR and RACE-PCR analyses were carried out by using the previously identified EST sequence amongst cDNA library established from the midgut of E. andrei. EaChi, a partial chitinase gene, was composed of 927 nucleotides encoding 309 amino acids. By the multiple sequence alignments of amino acids with other different species, it was revealed that EaCHI is a member of glycosyl hydrolases 18 family, which has two highly conserved domains, substrate binding and catalytic domain.

Angiotensinogen gene M235T polymorphism as a predictor of cardiovascular risk in hypertensive adolescents (고혈압 청소년의 심혈관계 위험요소로서 Angiotensinogen M235T 유전자 다형)

  • Gil, Joo Hyun;Lee, Jung Ah;Park, Eun Young;Hong, Young Mi
    • Clinical and Experimental Pediatrics
    • /
    • v.52 no.1
    • /
    • pp.36-43
    • /
    • 2009
  • urpose : The renin-angiotensin system (RAS) has been demonstrated to play a major role in regulating blood pressure. Therefore, components of the RAS are likely candidate genes that may predispose an individual to essential hypertension and cardiovascular complications. Among them, the M235T polymorphism of the angiotensinogen gene has been speculated to be associated with elevated circulating angiotensinogen concentrations and essential hypertension. This study aimed to analyze the angiotensinogen M235T polymorphism in hypertensive adolescents and investigate its relationship with cardiovascular risks. Methods : Forty Korean hypertensive adolescents (aged 16-17, systolic $BP{\geq}140 mmHg$ and/or diastolic $BP{\geq}90 mmHg$) and fifty seven normal adolescents were included. Obesity index (OI), body mass index (BMI) were calculated. BP was measured by oscillometric methods in resting state. Polymerase chain reaction (PCR) technique was performed on DNA from the hypertensives subjects to analyze the M235T polymorphism. Serum homocysteine, insulin, renin, aldosterone and angiotensin converting enzyme (ACE) were tested according to each genotype. The carotid intima-media thickness (IMT) and carotid artery diameter, Pulse wave velocity (PWV) and ankle-brachial index (ABI) were measured according to each genotype. Results : Genotype frequencies of T/T, M/T and M/M were 62.5%, 35.0%, 2.5%, respectively in hypertensive adolescents. The results were not significantly different compared to control group. Serum insulin, renin levels, BMI and OI were significantly higher in thoses with the M/M genotype as compared to those with the T/T of M/T genotype. Conclusion : This study showed that the M235T polymorphism was not associated with essential hypertension or any cardiovascular risks. Further clinical research is required to ascertain the relationship between this polymorphism and cardiovascular complications in Korean hypertensive adolescents.

A Performance Comparison of the Mobile Agent Model with the Client-Server Model under Security Conditions (보안 서비스를 고려한 이동 에이전트 모델과 클라이언트-서버 모델의 성능 비교)

  • Han, Seung-Wan;Jeong, Ki-Moon;Park, Seung-Bae;Lim, Hyeong-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.286-298
    • /
    • 2002
  • The Remote Procedure Call(RPC) has been traditionally used for Inter Process Communication(IPC) among precesses in distributed computing environment. As distributed applications have been complicated more and more, the Mobile Agent paradigm for IPC is emerged. Because there are some paradigms for IPC, researches to evaluate and compare the performance of each paradigm are issued recently. But the performance models used in the previous research did not reflect real distributed computing environment correctly, because they did not consider the evacuation elements for providing security services. Since real distributed environment is open, it is very vulnerable to a variety of attacks. In order to execute applications securely in distributed computing environment, security services which protect applications and information against the attacks must be considered. In this paper, we evaluate and compare the performance of the Remote Procedure Call with that of the Mobile Agent in IPC paradigms. We examine security services to execute applications securely, and propose new performance models considering those services. We design performance models, which describe information retrieval system through N database services, using Petri Net. We compare the performance of two paradigms by assigning numerical values to parameters and measuring the execution time of two paradigms. In this paper, the comparison of two performance models with security services for secure communication shows the results that the execution time of the Remote Procedure Call performance model is sharply increased because of many communications with the high cryptography mechanism between hosts, and that the execution time of the Mobile Agent model is gradually increased because the Mobile Agent paradigm can reduce the quantity of the communications between hosts.

Development of Marker-free TaGlu-Ax1 Transgenic Rice Harboring a Wheat High-molecular-weight Glutenin Subunit (HMW-GS) Protein (벼에서 밀 고분자 글루테닌 단백질(TaGlu-Ax1) 발현을 통하여 쌀가루 가공적성 증진을 위한 마커프리(marker-free) 형질전환 벼의 개발)

  • Jeong, Namhee;Jeon, Seung-Ho;Kim, Dool-Yi;Lee, Choonseok;Ok, Hyun-Choong;Park, Ki-Do;Hong, Ha-Cheol;Lee, Seung-Sik;Moon, Jung-Kyung;Park, Soo-Kwon
    • Journal of Life Science
    • /
    • v.26 no.10
    • /
    • pp.1121-1129
    • /
    • 2016
  • High-molecular-weight glutenin subunits (HMW-GSs) are extremely important determinants of the functional properties of wheat dough. Transgenic rice plants containing a wheat TaGlu-Ax1 gene encoding a HMG-GS were produced from the Korean wheat cultivar ‘Jokyeong’ and used to enhance the bread-making quality of rice dough using the Agrobacterium-mediated co-transformation method. Two expression cassettes with separate DNA fragments containing only TaGlu-Ax1 and hygromycin phosphotransferase II (HPTII) resistance genes were introduced separately into the Agrobacterium tumefaciens EHA105 strain for co-infection. Rice calli were infected with each EHA105 strain harboring TaGlu-Ax1 or HPTII at a 3:1 ratio of TaGlu-Ax1 and HPTII. Among 210 hygromycin-resistant T0 plants, 20 transgenic lines harboring both the TaGlu-Ax1 and HPTII genes in the rice genome were obtained. The integration of the TaGlu-Ax1 gene into the rice genome was reconfirmed by Southern blot analysis. The transcripts and proteins of the wheat TaGlu-Ax1 were stably expressed in rice T1 seeds. Finally, the marker-free plants harboring only the TaGlu-Ax1 gene were successfully screened in the T1 generation. There were no morphological differences between the wild-type and marker-free transgenic plants. The quality of only one HMW-GS (TaGlu-Ax1) was unsuitable for bread making using transgenic rice dough. Greater numbers and combinations of HMW and LMW-GSs and gliadins of wheat are required to further improve the processing qualities of rice dough. TaGlu-Ax1 marker-free transgenic plants could provide good materials to make transgenic rice with improved bread-making qualities.