• Title/Summary/Keyword: 이중 해시

Search Result 13, Processing Time 0.029 seconds

Hash Based Equality Analysis of Video Files with Steganography of Identifier Information

  • Lee, Wan Yeon;Choi, Yun-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.17-25
    • /
    • 2022
  • Hash functions are widely used for fast equality analysis of video files because of their fixed small output sizes regardless of their input sizes. However, the hash function has the possibility of a hash collision in which different inputs derive the same output value, so there is a problem that different video files may be mistaken for the same file. In this paper, we propose an equality analysis scheme in which different video files always derive different output values using identifier information and double hash. The scheme first extracts the identifier information of an original video file, and attaches it into the end of the original file with a steganography method. Next the scheme calculates two hash output values of the original file and the extended file with attached identifier information. Finally the scheme utilizes the identifier information, the hash output value of the original file, and the hash output value of the extended file for the equality analysis of video files. For evaluation, we implement the proposed scheme into a practical software tool and show that the proposed scheme performs well the equality analysis of video files without hash collision problem and increases the resistance against the malicious hash collision attack.

Design of Authentication Mechinism for Command Message based on Double Hash Chains (이중 해시체인 기반의 명령어 메시지 인증 메커니즘 설계)

  • Park Wang Seok;Park Chang Seop
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.51-57
    • /
    • 2024
  • Although industrial control systems (ICSs) recently keep evolving with the introduction of Industrial IoT converging information technology (IT) and operational technology (OT), it also leads to a variety of threats and vulnerabilities, which was not experienced in the past ICS with no connection to the external network. Since various control command messages are sent to field devices of the ICS for the purpose of monitoring and controlling the operational processes, it is required to guarantee the message integrity as well as control center authentication. In case of the conventional message integrity codes and signature schemes based on symmetric keys and public keys, respectively, they are not suitable considering the asymmetry between the control center and field devices. Especially, compromised node attacks can be mounted against the symmetric-key-based schemes. In this paper, we propose message authentication scheme based on double hash chains constructed from cryptographic hash function without introducing other primitives, and then propose extension scheme using Merkle tree for multiple uses of the double hash chains. It is shown that the proposed scheme is much more efficient in computational complexity than other conventional schemes.

Privacy Amplification of Quantum Key Distribution Systems Using Dual Universal Hush Function (듀얼 유니버셜 해쉬 함수를 이용한 양자 키 분배 시스템의 보안성 증폭)

  • Lee, Sun Yui;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.1
    • /
    • pp.38-42
    • /
    • 2017
  • This paper introduces the concept of a dual hash function to amplify security in a quantum key distribution system. We show the use of the relationship between quantum error correction and security to provide security amplification. Also, in terms of security amplification, the approach shows that phase error correction offers better security. We describe the process of enhancing security using the universal hash function using the BB84 protocol, which is a typical example of QKD. Finally, the deterministic universal hash function induces the security to be evaluated in the quantum Pauli channel without depending on the length of the message.

The Improved-Scheme of Two Factor Authentication using SMS (SMS를 이용하는 개선된 이중 인증 기법)

  • Ji, Seon-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.6
    • /
    • pp.25-30
    • /
    • 2012
  • Passwords are a common method of identifying and authenticating a user who wishes to log on to a secure system. Password-based authentication techniques, however, do not provide strong security and recognized as being an poor form of protection. It is not all the responsibility of the user to control password and to protect its confidentiality. In this paper, confirm an appropriate response time and I propose a new and improved method of implementing two factor authentication using SMS via receiving apparatus(mobile and email).

An Improved Probe Selection Algorithm for Large Genomes (대규모 염색체들을 위한 개선된 Probe 선택 알고리즘)

  • Kwon, Young-Dae;Park, Kyoung-Wook;Lim, Hyeong-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1045-1048
    • /
    • 2005
  • 유전자 칩의 정확성은 각 유전자들의 식별자로 활용되는 probe들에 의해 결정된다. 일반적으로 칩을 구성하는 probe들은 반응 오류를 예측하기 위해 이중구조와 녹는점과 같은 요소들을 고려한다. 또한 다른 유전자들과의 교차반응을 최소화하기 위해 각 probe들의 specificity도 고려되어야 한다. probe가 specificity를 보장하는지 검증하는 것은 전체 유전자들을 탐색해야 하므로 대규모 인간염색체에 대해서는 많은 시간이 소요된다. 본 논문에서는 specificity를 만족하는 probe들을 선택하는 효율적인 알고리즘을 제시한다. 제시한 알고리즘은 해시 테이블을 활용하여 probe가 specificity를 만족하지 못하게 하는 유전자 시퀀스들만을 탐색하여 비교한다. 제시한 알고리즘이 기존 알고리즘보다 효율적임을 실험결과를 통해 보인다.

  • PDF

An Efficient Algorithm for Determining Probe Specificity in DNA Chips (유전자 칩에서 Probe Specificity를 판별하기 위한 효율적인 알고리즘)

  • Kwon Young-Dae;Park Kyoung-Wook;Lim Hyeong-Seok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.913-915
    • /
    • 2005
  • 유전자 칩의 정확성은 각 유전자들의 식별자로 활용되는 probe들에 의해 결정된다. 칩에 삽입되는 probe들은 반응오류를 피하기 위해 이중구조, 녹는점, 그리고 CG구조와 같은 요소들을 고려한다. 또한 다른 유전자들과의 교차반응을 최소화하기 위해 specificity를 고려한다. probe의 specificity 검증은 전체 유전자들에 대해 탐색해야 하므로 대규모 염색체에 대해서는 많은 계산이 요구된다. 본 논문에서는 specificity 검증을 위한 효율적인 알고리즘을 제시한다. 제시한 알고리즘은 해시테이블을 활용하여 probe가 specificity를 만족하지 못하게 하는 유전자 시퀀스들만을 탐색하여 비교한다. 제시한 알고리즘이 기존 알고리즘보다 효율적임을 실험결과를 통해 보인다.

  • PDF

Effects of Message Polarity and Type on Word of Mouth through SNS (Social Network Service) (메시지 방향성과 유형이 SNS 구전에 미치는 영향)

  • Lee, Ju-Yang;Jang, Phil-Sik
    • Journal of Digital Convergence
    • /
    • v.11 no.6
    • /
    • pp.129-135
    • /
    • 2013
  • With the increasing use of the SNS, WOM(Word of Mouth) has become an even more powerful and useful resource for consumers and marketers. In this paper, we investigated the effects of message polarity (positive, neutral, negative) and type (factual, evaluative) on WOM through SNS (twitter). A total of 13.4 million twitter messages were collected and 1.0 million retweeted messages were analyzed. The results showed that message orientation, type, URL and hashtag have a significant (<0.01) effect on retweet counts and the interaction between message orientation and other factors were observed. It also observed that message type, URL and hashtag have significant (0.05) relationships with retweet speed.

Biometric Information and OTP based on Authentication Mechanism using Blockchain (블록체인을 이용한 생체정보와 OTP 기반의 안전한 인증 기법)

  • Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.3
    • /
    • pp.85-90
    • /
    • 2018
  • Blockchain technology provides distributed trust structure; with this, we can implement a system that cannot be forged and make Smart Contract possible. With blockchain technology emerging as next generation security technology, there have been studies on authentication and security services that ensure integrity. Although Internet-based services have been going with user authentication with password, the information can be stolen through a client and a network and the server is exposed to hacking. For the reason, we suggest blockchain technology and OTP based authentication mechanism to ensure integrity. In particular, the Two-Factor Authentication is able to ensure secure authentication by combining OTP authentication and biometric authentication without using password. As the suggested authentication applies multiple hash functions and generates transactions to be placed in blocks in order for biometric information not to be identified, it is protected from server attacks by being separate from the server.

Heat Transfer Analysis and BOG Estimation of Membrane-Type LNG Cargo during Laden Voyage (멤브레인형 LNG선 Cargo의 만선항해시 열전달 해석 및 BOG 평가)

  • Heo, Jin-Uk;Lee, Young-Ju;Cho, Jin-Rae;Ha, Mun-Keun;Lee, Joong-Nam
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.27 no.3
    • /
    • pp.393-400
    • /
    • 2003
  • Excessive generation of BOG during the LNG transportation not only causes the severe financial loss but also leads to the unexpected disaster. Therefore, the carrier cargo insulating interior LNG should be carefully designed based upon an accurate heat transfer analysis. However. it is not simple to analyze heat transfer of LNG cargo, because it is in a complex insulation structure and LNG carrier experiences a complicated heat transfer according to various kinds of voyage conditions. In this paper, we carried out the transient finite element heat transfer analysis for a cargo of Mark-111 membrane-type LNG carrier during laden voyage, and we compared heat transfer rates between considering natural convection and considering conduction. For this goal, we developed a PCL program incorporating with a commercial MSC/NASTRAN FEM code.

A Study on the Operation Status and Improvements of the Libraries' Instagram (도서관의 인스타그램(Instagram) 운영 현황과 개선방안에 관한 연구)

  • Kim, Young-ju;Kim, Hee-sook;Jung, Jin-il;Kwon, Sun-young;Jeong, Yoo Kyung
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.2
    • /
    • pp.401-428
    • /
    • 2021
  • Recently, libraries are trying to communicate with users using various social media. Among them, Instagram is the most used SNS by users recently. Therefore, in this study, in order to effectively operate the library Instagram, we looked at how Instagram in the library is operated, what posts and contents people are interested in, and how the library can utilize it. By analyzing the Instagram operation status of Instagram, we tried to suggest improvement plans and activation plans. For this purpose, theoretical background research on SNS and Instagram, analysis of prior research, and related data were collected and analyzed. Next, for 82 domestic library accounts opened on Instagram, the library type, region, and Instagram account number of posts, 'followers', 'follows', images, etc. were collected, and the Text, hashtags, upload date, number of 'likes' and comments were analyzed. As a result of the study, it was found that increasing followers, uploading user-customized posts, formalizing account profiles, using library-specific hashtags, and communication with users are necessary to activate library Instagram.