• Title/Summary/Keyword: 위조방지

Search Result 106, Processing Time 0.026 seconds

A Study on the Blockchain 2.0 Ethereum Platform Analysis for DApp Development (DApp 개발을 위한 블록체인 2.0 이더리움 플랫폼 분석 연구)

  • Kim, Soon-Gohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.718-723
    • /
    • 2018
  • In a positive Internet of Medical Things (IoMT) environment, by combining the latest computer network technology with IoT technology, remote health care such as health care and monitoring is improved through the provision of quality medical information services. In this paper, we identified and compared the platforms applied with blockchain and presented the results of developing the product distribution de-centralized DApp. In the process, we developed a distribution platform that can use blockchain technology to identify product fraud, manage data, manage customers' information, prevent forgery, track transaction history, and facilitate product transactions.

Security analysis of a threshold proxy signature scheme using a self-certified public key (자체인증 공개키를 사용하는 threshold 대리서명 기법의 안전성 분석)

  • Park, Je-Hong;Kang, Bo-Gyeong;Hahn, Sang-Geun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.3
    • /
    • pp.109-114
    • /
    • 2005
  • On the research for constructing secure group-oriented proxy signature schemes, there are several proposals of threshold proxy signature schemes which combine the notions of proxy signature with threshold signature. Recently, Hsu and Wu proposed a threshold proxy signature scheme which uses a self-certified public key based on discrete logarithm problem. In this paper, we show that this scheme is vulnerable to original signer's forgery attack. So our attack provides the evidence that this scheme does not satisfy nonrepudiation property.

A Dynamic ID Allocation Protocol for High-Performance RFID Tag (고기능 RFID 태그를 위한 동적 ID 할당 프로토콜)

  • Park Jin-Sung;Choi Myung-Ryul
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.49-58
    • /
    • 2005
  • In this paper, we have proposed a secure dynamic ID allocation protocol using mutual authentication on the RFID tag. Currently, there are many security protocols focused on the low-price RFID tag. The conventional low-price tags have limitation of computing power and rewritability of memory. The proposed secure dynamic ID allocation protocol targets to the high-performance RFID tags which have more powerful performance than conventional low-price tag by allocating dynamic ID to RFID using mutual authentication based on symmetric encryption algorithm. This protocol can be used as a partial solution for ID tracing and forgery.

Security Analysis of Two Certificateless Signature Schemes (두 인증서 없는 서명 기법들에 관한 안전성 분석)

  • Lee, Ju-Hee;Shim, Kyung-Ah;Lee, Hyang-Sook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.17-22
    • /
    • 2009
  • Certificateless cryptography eliminates the need of certificacates in the public key crytosystems and solves the inherent key escrow problem in identity-based cryptosystems. This paper demonstrates that two certificateless signature schemes proposed by Guo et al. and Wang et al. respectively are insecure against key replacement attacks by a type I adversary. We show that the adversary who can replace a signer's public key can forge signatures under the replaced public key. We then make a suggestion to prevent the attacks.

A Study on The Sensor Network Classification with Security (보안을 고려한 센서 네트워크 분류기준에 관한 연구)

  • Lim, Hui-Bin;Park, Sang-Jin;Kim, Mi-Joo;Shin, Yong-Tae;Choe, Jong-Won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.599-600
    • /
    • 2009
  • 현재 센서 네트워크의 보안 기술 연구는 센서 네트워크 내의 정보전달 및 처리과정에서의 정보 보호 및 중요 센서 노드의 보호를 위한 정보인증, 노드인증, 보안 라우팅, 키 관리, 도처, 위조 방지 등에 중점을 두고 진행되고 있다. 그러나 대부분의 연구는 USN 응용 서비스 유형에 종속되는 단점을 가진다. 즉, 특정 서비스에만 유용한 보안 기술 연구가 대부분이라 하겠다. 따라서, 특정 USN 응용 서비스에 국한되지 않는 다양한 USN 응용 서비스를 지원할 수 있는 정보보호 기술이 개발이 이루어져야 하며, 이를 위해서는 다양한 USN 응용 서비스를 지원할 수 있도록 보안을 고려한 센서 네트워크의 구성에 대한 연구가 선행되어야 한다. 이에 본 논문에서는 현재 개발된 다양한 USN 응용 서비스를 분석하여 공통적인 센서 네트워크의 구성 요소를 도출하였으며, 이를 토대로 보안을 고려한 센서 네트워크 분류기준을 제시하였다.

Electronic Approval System Using C.Boyd Sequential Multisignature (C. Boyd 의 순차 다중서명 방식을 적용한 전자 결재 시스템)

  • Choi, Jae-Young;Park, Seon-U;Jeon, Ung-Ryeol;Won, Dongho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.854-857
    • /
    • 2011
  • 전자 결재 시스템은 오프라인 문서 결재보다 효율적인 문서 관리가 가능 하고 예산 낭비를 방지할 수 있으며, 작업 능률을 극대화 할 수 있다는 장점 때문에 현재 많은 기업에서 도입하여 사용하고 있다. 하지만 상용화되어 있는 전자 결재 시스템에서 사용되는 이미지 서명은 복제 및 위조가 가능하다는 위협이 존재한다. 이러한 문제를 해결하기 위해서 단순 서명 방식을 적용한 전자 결재 시스템이 제안되었다. 하지만 단순 서명 방식을 이용한 전자 결제 시스템은 단 한 명의 결재자만을 고려한 시스템으로 실제 기업에는 다양한 직책의 결재자가 존재하기 때문에 적용하기가 어렵다. 이에 본 논문에서는 C.Boyd 의 순차 다중서명 방식을 사용하여 다수의 결제자가 서명할 수 있는 전자 결제 시스템을 제안한다.

Design of a Contactless Access Security System using Palm Creases and Palm Vein Pattern Matching (손금과 정맥혈관 패턴매칭을 이용한 비접촉 출입 보안시스템 설계)

  • Ki-Jung Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.327-334
    • /
    • 2024
  • In this paper, we developed a system with a near-infrared LED light source with a wavelength of 950nm to acquire palm vein images and a white LED light source to acquire palm creases based on Raspberry Pi. In addition, we implemented a unique pattern-extractable image processing technology that can prevent counterfeiting and enhance security of mixed creases and palmprints through image pre-processing (Gray scaling, Histogram Equalization, Blurring, Thresholding, Thinning) for the acquired vein and palm images, and secured a source technology that can be used in a security-enhanced system.

Recent Information on the Plagiarism Prevention (표절 방지에 관한 최근 정보)

  • Lee, Sung-Ho
    • Development and Reproduction
    • /
    • v.15 no.1
    • /
    • pp.71-76
    • /
    • 2011
  • Due to its role in maintaining the health of scientific societies, research ethics (or integrity) is notably receiving attention by academia, governments and even individuals who are not engaged in scientific researches. In this paper, I will introduce some valuable papers dealt with plagiarism as a representative research misconduct. In general, researcher's results that will soon be published must meet the crucial scientific criteria: originality, accuracy, reproducibility, precision and research ethics. The definition of plagiarism is "appropriation of another person's ideas, processes, results, or words without giving appropriate credit." Compared to fabrication and falcification, plagiarism is often considered as a minor misconduct. With intentionality, however, plagiarism can be corresponding to 'theft of intellectual product'. The context of plagiarism is not restricted to the stage of publication. It can be extended to prior stages of proposing (i.e. preparing the research proposal) and performing (executing the research), and reviewing (writing the review papers). Duplicate publication is regarded as a self-plagiarism in broad interpretation of plagiarism. To avoid dangers of plagiarism, earnest efforts from all members of scientific community are needed. First of all, researchers should keep 'transparency' and 'integrity' in their scientific works. Editorial board members and reviewers should keep fairness and well-deserved qualification. Government and research foundations must be willing to provide sufficient financial and policy support to the scientific societies; Up-graded editorial services, making good use of plagiarism detection tools, and thorough instruction on how to write a honest scientific paper will contribute to building up a healthy basis for scientific communities.

Effect of Vapor Pressure Deficit on the Evapotranspiration Rate and Graft-taking of Grafted Seedling Population under Artificial Lighting (인공광하에서 접목묘 개체군의 증발산속도와 활착에 미치는 포차의 영향)

  • Yong Hyeon Kim;Chul Soo Kim;Ji Won Lee;Sang Gyu Lee
    • Journal of Bio-Environment Control
    • /
    • v.10 no.4
    • /
    • pp.232-236
    • /
    • 2001
  • Four air temperature levels of 23, 25, 27 and 29$^{\circ}C$, three humidity levels of 85, 90 and 95% R.H. at photosynthetic photon flux (PPF) of 50 $\mu$mol.m$^{-2}$ .s$^{-1}$ were provided to investigate the effect of vapor pressure deficit on the evapotranspiration rate (EVTR) and graft-taking of watermelon grafted seed-increase. Thus EVTR of grafted seedlings increased with increasing air temperature at high humidity of 95%R.H. At relatively low humidity of 85% R.H., grafted seedlings showed a high EVTR and some wilting of scions was observed at this condition. This result would be ascribed to the low supply of water to vascular bundles according to the insufficient joining of scions and rootstocks. Differences in EVTR between 90% R.H. and 95% R.H. were not observed. Grafted seedlings showed high graft-taking at high relative humidity. Relative humidity had highly influenced to the graft-taking as compared to the air temperature. Graft-taking increased with decreasing vapor pressure deficit. Graft-taking greater than 90% was found at vapor pressure deficit less than 0.4kPa which could be obtained at humidity higher than 90% R.H. Therefore it is required to control the humidity higher than 90% R.H. for suppressing EVTR of grafted seedlings and preventing some wilting of scoins and thus enhancing the graft-taking of grafted seedlings.

  • PDF

Performance Improvement of Power Attacks with Truncated Differential Cryptanalysis (부정차분을 이용한 전력분석 공격의 효율 향상*)

  • Kang, Tae-Sun;Kim, Hee-Seok;Kim, Tae-Hyun;Kim, Jong-Sung;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.43-51
    • /
    • 2009
  • In 1998, Kocher et al. introduced Differential Power Attack on block ciphers. This attack allows to extract secret key used in cryptographic primitives even if these are executed inside tamper-resistant devices such as smart card. At FSE 2003 and 2004, Akkar and Goubin presented several masking methods, randomizing the first few and last few($3{\sim}4$) rounds of the cipher with independent random masks at each round and thereby disabling power attacks on subsequent inner rounds, to protect iterated block ciphers such as DES against Differential Power Attack. Since then, Handschuh and Preneel have shown how to attack Akkar's masking method using Differential Cryptanalysis. This paper presents how to combine Truncated Differential Cryptanalysis and Power Attack to extract the secret key from intermediate unmasked values and shows how much more efficient our attacks are implemented than the Handschuh-Preneel method in term of reducing the number of required plaintexts, even if some errors of Hamming weights occur when they are measured.