• Title/Summary/Keyword: 인증체계

Search Result 822, Processing Time 0.023 seconds

The Research on Blockchain-based Secure loT Authentication (블록체인 기반 사물인터넷 인증 연구)

  • Hong, Sunghyuck;Park, Sanghee
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.57-62
    • /
    • 2017
  • With various sensors and communications capabilities, the Internet is growing larger as the internet can communicate with the Internet. Given the growing vulnerability of the internet market, the development of security and security is increasing, and the development of the internet is actively evolving and the development of the internet is actively being carried out. In particular, it is required to introduce lightweight and secure authentication schemes, especially those that are difficult to use due to the difficulty of using authentication schemes. Thus, the safety of the secure authentication system of the Internet is becoming very important. Therefore, in this thesis, we propose certification technologies on secure objects to ensure correct, safe communication in the context of the internet context.

보안적합성 검증 및 암호검증 문서 작성법

  • Kim, Jong-Kil;Na, Hac-Yun;Jeong, Ji-Hoon
    • Review of KIISC
    • /
    • v.17 no.6
    • /
    • pp.30-40
    • /
    • 2007
  • 최근의 국내 정보보호 인증체계는 암호검증제도의 시행과 CCRA 가입으로 큰 변화를 맞이하였다. 이런 변화는 국가기관의 정보보호제품 도입체계에도 많은 영향을 미치고 있다. 본 고에서는 정보보호제품 인증 체계 변화, 이 후의 개편된 보안적합성 검증제도에 대한 간략히 소개하고, 보안적합성 검증제도와 암호검증제도의 신청을 위한 제출 문서 작성법을 제시하여, 보안적합성 검증제도와 암호검증제도 신청 또는 연 도움을 주고자 한다.

A study of Effect of Information Security Management System [ISMS] Certification on Organization Performance (정보보호관리체계[ISMS] 인증이 조직성과에 미치는 영향에 관한 연구)

  • Bae, Young-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.9
    • /
    • pp.4224-4233
    • /
    • 2012
  • As Internet usage is rapidly spreading, tasks that were only possible offline are now available in cyber space but at the same time, new security threats such as hacking and viruses have also increased. For that reason, Comprehensive and methodical information security systems are therefore required in enterprises and organizations. Consequently, the Information Security Management System certification system has been in effect in Korea since July 2001. As of December 2012, 130 enterprises have been certified, and more than 120 ISO27001 certifications have been issued. As such, since the introduction of the ISMS certification system in Korea, the demand for the certification has been steadily increasing, and it is now recognized as an integral part of maintaining the competitiveness in an enterprise. However, the qualitative aspects of certification regarding the effectiveness of ISMS have been continuously questioned by actual customers. In order to clarify the situation and remove such doubts, this study will substantiate the fact that development and certification of ISMS positively affect the business performance of enterprises so that they will recognize the effect of obtaining ISMS certification and eventually prevent security accidents and improve their business performance by developing ISMS.

Authentication Protocol for Unmanned Combat Systems in Tactical Wireless Networks (전술 무선 네트워크에서 무인전투체계를 위한 인증 프로토콜)

  • Lee, Jong-Kwan;Lee, Minwoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.298-299
    • /
    • 2019
  • In this paper, we propose a stable mutual authentication protocol between unmanned combat systems in tactical wireless networks where long distance communications are not always guaranteed due to a poor channel condition. The proposed protocol generates an authentication code using hash collision of arbitrarily selected random data. The authentication requester encrypts and transmits it to the authenticator. They performs authentication by sharing the valid authentication code. We analyze the safety of the proposed method for various attack scenarios.

  • PDF

The Study on Perception of Adoption of Certification System for Smart Factory (스마트공장 표준 인증제도 도입에 관한 인식 조사)

  • Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.3
    • /
    • pp.153-158
    • /
    • 2017
  • The certification for Smart Factory supoort successful management of organization while providing strategic plans to the issue of manufacturing process. In Korea, these standards are prepared as the national standards since 2015, and also, there are actions being taken to adpot the certification for Smart Factory. However, to adopt such certification, it is required that the certification operation system needs to be organized, as well as that the society in general should understand about Smart Factory. Accordingly, it is even more required an review on the adoption of the system. This study has the purpose in surveying a variety of atakeholders' perception for the adoption of Smart Factory certification given the circumstance that the cetitification is implemented through literature review and in-depth interviews. This study will be provide significant implication to build a successful plan for the adoption of Smart Factory certification by reviewing perception of professional and problem, strategy of this certification.

A Key Management Scheme through Three Stages Authentication for Hierarchical Tactical Ad-hoc Networks (계층형 전술 Ad-hoc 네트워크에서 3단계 인증을 통한 키 관리 기법)

  • Seo, Dong-Seon;Lee, Soo-Jin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06c
    • /
    • pp.239-241
    • /
    • 2012
  • 우리 군은 미래전을 대비하기 위해 각종 전술 응용정보체계의 막힘없는 전송과 통신망간 연동 요구를 충족시키고 미래 전장을 주도할 통신체계 구축을 목표로 전술정보통신체계(TICN) 개발을 추진 중이다. Ad-hoc 네트워크 기술을 사용하는 전술정보통신체계의 부체계인 전투무선체계는 전장 환경에서 운영되는 특수성으로 인해 기존의 전통적인 플랫한 Ad-hoc 네트워크와는 차별화된 계층형 Ad-hoc 네트워크 구조를 가진다. 또한 Ad-hoc 네트워크를 운용하는 환경이 보안성이 극도로 요구되는 전장 환경임을 고려할 때 군 작전의 성공적인 목표 달성을 위한 보안대책은 반드시 필요하다. 특히 전장상황 하에서 유통될 각종 민감 정보들에 대한 기밀성, 무결성 등을 보장하기 위해 정당한 권한을 가진 노드들만이 네트워크에 참여할 수 있는 보안 매커니즘이 적용되어야 하며, 이를 위해선 효율적인 키 관리 기법을 적용해야 한다. 본 논문에서는 비밀키, 노드위치, 해시인증 등의 정보를 이용한 3단계 인증절차 적용으로 Ad-hoc 네트워크 참여 노드의 인증을 강화하고, 통신환경에 따라 3가지 비밀키를 구분 사용하여 계층형 Ad-hoc 네트워크 구조에서 기밀성 보장을 강화하기 위한 키 관리 기법을 제안한다.

A Study on Improvement Methods for Encrytion and Authentication in Batt le Field Management System(C4I) (전장관리체계(C4I)에서의 암호 및 인증방법 개선 방안에 관한연구)

  • Lee, Won Man;Koo, Woo Kwon;Park, Tae Hyeong;Lee, Dong Hoon
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.39-50
    • /
    • 2012
  • Battlefield management systems are operated by the Public Key Infrastructure (PKI) and cryptographic equipment is distributed through the personal delivery to the enemy has deodorizing prone to structure. In addition, Per person each battlefield management system (C4I) encryption key operate and authentication module to manage multiple encryption so, encryption key operating is restrictions. Analysis of the problems of this public key infrastructure(PKI), Identity-Based Cryptosystem(IBC) and Attribute-Based Cryptosystem(ABC) to compare construct the future of encrypt ion and authentication system were studied. Authentication method for the connection between the system that supports data encryption and secure data communication, storage, and communication scheme is proposed.

The necessity of Smart Factory's Standards and Certification System Based on Grounded theory (근거이론에 의한 스마트공장 표준 및 인증제도 도입 필요성)

  • Shin, Jong-Chang;Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.203-208
    • /
    • 2018
  • This study is concerned with the introduction and operation of smart factories. In order to accomplish the purpose of research, we made a standard system of smart factory and investigated the recognition system. This study was conducted as a grounded theory methodology among qualitative research methodologies. The results of the study are the necessity of a tool to appropriately evaluate the new manufacturing process management system and related management activities to achieve the successful introduction of smart factories and the management performance of the organization. In order to successfully implement the Smart Factory Certification System, it is necessary to establish a certification organization system, enact relevant laws and amendments, operate government-led pilot projects, train professional workers, and establish incentive policies.

A Study on activation and improvement of the Government PKI (정부의 행정전자서명인증체계(GPKI) 활성화 및 발전방안)

  • 추경균;김종배;류성열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.85-100
    • /
    • 2004
  • Study and analysis on the digital certification of the world today, and census on how digital signature is being used or considered for the government will be used to sum of what can be the difficulties and Problems in operating digital signature certifications for the government administrations at this research, and of course the answers to these problems will be provided too. This research suggests practical ideas on how to interoperate between Government PKI (GPKI: Administrational Digital Certification for the Government) and National PKI (NPKI: Digital Certification for General Public &Business), how to make use of Standard Security APIs, how to manage (e.g. issue, reissue, update, revoke) digital certificate, how to improve technical side of security and reliability, and how to improve political issues on public education for information security. Digital certification will become more popular and widely used in government administrations in the future. Therefore, census and research on demands md satisfactions of digital certification for public and government will be regularly performed. Of course, continuous maintenances and improvement in this field will be necessary to obtain firmer way of information security.

A Study on Sharing Web Application between Battlefield Management System based on PKI Authentication (PKI 인증기반 전장관리체계 웹 연동에 관한 연구)

  • Kim, Young-Sung;Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the military operations research society of Korea
    • /
    • v.36 no.1
    • /
    • pp.123-140
    • /
    • 2010
  • Interworking Web Application to share the resource between Battlefield Management Systems(BMS) is critical issues for accomplishment of information superior. However, authentication system of BMS differ from each other because of having the independent plan for system build. This problem causes inefficiency such as the information insufficiency owing to not share web application and the need of additional laptops. To solve the problem, in this paper, we propose the improved certificate acquisition and verification algorithm for the user of different BMS. By testing the proposed algorithm appling to the real field, we verify the performance of proposed method.