• Title/Summary/Keyword: 확산 취약성

Search Result 191, Processing Time 0.029 seconds

A Countermeasure Resistant to Fault Attacks on CRT-RSA using Fault Infective Method (오류 확산 기법을 이용한 CRT-RSA 오류 주입 공격 대응 방안)

  • Ha, Jae-Cheol;Park, Jea-Hoon;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.75-84
    • /
    • 2008
  • Recently, the straightforward CRT-RSA was shown to be broken by fault attacks through many experimental results. In this paper, we analyze the fault attacks against CRT-RSA and their countermeasures, and then propose a new fault infective method resistant to the various fault attacks on CRT-RSA. In our CRT-RSA algorithm, if an error is injected in exponentiation with modulo p or q, then the error is spreaded by fault infective computation in CRT recombination operation. Our countermeasure doesn't have extra error detection procedure based on decision tests and doesn't use public parameter such as e. Also, the computational cost is effective compared to the previous secure countermeasures.

A Simple Seismic Vulnerability Sorting Method for Electric Power Utility Tunnels (전력구의 간편 지진취약도 선별법)

  • Kang, Choonghyun;Huh, Jungwon;Park, Inn-Joon;Hwang, Kyeong Min;Jang, Jung Bum
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.22 no.5
    • /
    • pp.110-118
    • /
    • 2018
  • Due to recent earthquakes, there is a growing awareness that Korea is not a safe zone for earthquakes any more. Therefore, the review of various aspects of the seismic safety of the infrastructures are being carried out. Because of the characteristics of the underground structure buried in the ground, the electric power utility tunnels must be considered not only for the inertia and load capacity of the structure itself but also the characteristics of the surrounding soils. An extensive and accurate numerical analysis is inevitably required in order to consider the interaction with the ground, but it is difficult to apply the soil-structure interaction analyses, which generally requires high cost and extensive time, to all electric power utility tunnel structures. In this study, the major design variables including soil characteristics are considered as independent variables, and the seismic safety factor, which is the result of the numerical analysis, is considered as a dependent variable. Thus, a method is proposed to select vulnerable electric power utility tunnels with low seismic safety factor while excluding costly and time-consuming numerical analyses through the direct correlation analysis between independent and dependent variables. Equations of boundary limits were derived based on the distribution of the seismic safety factor and the cover depth and rebar amounts with high correlation relationship. Consequently, a very efficient and simple approach is proposed to select vulnerable electric power utility tunnels without intensive numerical analyses. Among the 108 electric power utility tunnels that were investigated in this paper, 30% were screened as fragile structures, and it is confirmed that the screening method is valid by checking the safety factors of the fragile structure. The approach is relatively very simple to use and easy to expand, and can be conveniently applied to additional data to be obtained in the future.

The Relationship between Individuals' Collectivistic Orientation and Social Distancing during the COVID-19 Crisis in Korea: The Mediating Role of Subjective Norm (코로나19 대유행 시기에 집단주의 성향과 사회적 거리두기 행동 간의 관계: 사회적 거리두기에 관한 주관적 규범의 매개효과)

  • Han, Jimin;Choi, Hoon-Seok
    • Korean Journal of Culture and Social Issue
    • /
    • v.27 no.3
    • /
    • pp.217-236
    • /
    • 2021
  • The present study examined the mediating role of the subjective norm about social distancing in the relationship between individuals' collectivistic orientation and their social distancing behavior during the early COVID-19 crisis in Korea. A total of 445 South Korean adults residing in Korea participated in a survey during which level 2 to 2.5 prevention policies were being enforced. Results indicated, as expected, that collectivism positively predicted the perceptions of subjective norm that supports social distancing, which in turn predicted positively individuals' participation in social distancing as prescribed by the central government. This result emerged regardless of the individuals' perception of personal vulnerability to COVID-19. We discuss implications of these findings and directions for future research regarding the link between individualism-collectivism and the behavioral immune system, along with the role of social distancing in effectively curbing the spread of corona virus during the pandemic.

Secure Authentication Protocol in Hadoop Distributed File System based on Hash Chain (해쉬 체인 기반의 안전한 하둡 분산 파일 시스템 인증 프로토콜)

  • Jeong, So Won;Kim, Kee Sung;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.831-847
    • /
    • 2013
  • The various types of data are being created in large quantities resulting from the spread of social media and the mobile popularization. Many companies want to obtain valuable business information through the analysis of these large data. As a result, it is a trend to integrate the big data technologies into the company work. Especially, Hadoop is regarded as the most representative big data technology due to its terabytes of storage capacity, inexpensive construction cost, and fast data processing speed. However, the authentication token system of Hadoop Distributed File System(HDFS) for the user authentication is currently vulnerable to the replay attack and the datanode hacking attack. This can cause that the company secrets or the personal information of customers on HDFS are exposed. In this paper, we analyze the possible security threats to HDFS when tokens or datanodes are exposed to the attackers. Finally, we propose the secure authentication protocol in HDFS based on hash chain.

A Study on Authentication Management and Communication Method using AKI Based Verification System in Smart Home Environment (스마트 홈 환경에서 AKI기반 검증 시스템을 활용한 인증관리 및 통신 기법에 관한 연구)

  • Jin, Byung Wook;Park, Jung Oh;Jun, Moon Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.25-31
    • /
    • 2016
  • With the development of IOT technology and the expansion of ICT services recently, a variety of home network services have been advanced based on wired and wireless high speed telecommunication. Domestic and global companies have been studying on the innovative technology for the users using IOT based technology and the environment for the smart home services has been gradually developed. The users live their lives with more convenience due to the expansions and developments of smart phones. However, the threatening on the security of the smart home network had occurred by various attacks with the connection to the smart environment telecommunication, lack of applications on low powered and light weight telecommunication, and the problems of security guideline. In addition, the solutions are required for the new and variant attacking cases such as data forgery and alteration of the device for disguising approach with ill will. In this article, the safe communication protocol was designed using certification management technique based on AKI which supplemented the weakness of PKI, the existing certification system in the smart environment. Utilizing the signature technique based on ECDSA, the efficiency on the communication performance was improved, and the security and the safety were analyzed on the security threat under the smart home environment.

Cryptanalysis of Two Block Ciphers based on Cellular Automata (셀룰러 오토마타 기반 블록 암호에 대한 안전성 분석)

  • Ryu, Han-Seong;Lee, Je-Sang;Lee, Chang-Hoon;Hong, Seok-Hie
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.8
    • /
    • pp.1111-1120
    • /
    • 2008
  • Cellular automata(CA) is often applied to design cryptosystems because it has good diffusion and local interaction effects. Recently, a 128-bit CA-based block cipher, called CAB1, and a 64-bit reversible CA-based block cipher, called CAB2, were proposed in KMMS'02 and CEC'04, respectively. In this paper, we introduce cryptanalytic results on CAB1 and CAB2. Firstly, we propose a differential attack on CAB1, which requires $2^{31.41}$ chosen plaintexts with about $2^{13.41}$ encryptions. Secondly, we show that CAB2 has a security of 184 bits using the statistical weakness. Note that the designers of CAB2 insist that it has a security of 224 bits. These are the first known cryptanalytic results on them.

  • PDF

A Study on Fire Risk of Apartment House with Pilotis Structure - Focused on the Fire case of Uijeongbu-si Urban Livig Homes - (필로티 구조의 공동주택 화재 위험성 연구 - 의정부 대봉그린 도시형아파트 화재 사례를 중심으로 -)

  • Choi, Seung-Bok;Choi, Don-Mook
    • Fire Science and Engineering
    • /
    • v.30 no.3
    • /
    • pp.48-54
    • /
    • 2016
  • Pilotis are support columns that lift a building above the ground. Thus, they can elevate the lowest floor to the secondfloor level and, in Korea, are used to leav a parking area below multifamily housing. However, if there is a fire in the piloti area, the cars and main entrance door are wrapped in flames. Due to the inflammability of the materials, the combustion of the cars and insulation at the ceiling of the pilotis, having a high heat release rate, can quickly destroy the front entrance of the building and spread heat, flames and a poisonous gas to the stairs and elevator pit. Therefore, the fire can quickly spread to the whole building, putting the lives of the residents in danger. This study was an in-depth accidental case study of the "Uijeongbu Fire Accident" that killed 5 residents and injured 139 others. The study identified the relationships between the fire at the piloti structure of multifamily housing and the vulnerability of this structure and its inherent weaknesses.

An Experimental Study on Fire Spreading External Wall of Buildings Using Dry Construction Method (건식공법을 이용한 건축물의 외벽 화재 확산의 실험적 연구)

  • Park, Jung-Woo;Cho, Nam-Wook
    • Fire Science and Engineering
    • /
    • v.32 no.4
    • /
    • pp.75-85
    • /
    • 2018
  • The Grenpell tower fire in England in June of 2016 is a representative example of damage caused by a vertical fire spreading through external insulation. Organic insulation materials, which are widely used in external insulation, have the disadvantage that they have good insulation performance but are vulnerable to fire. Aluminum composite panels are used as exterior wall finishing materials, and plastics used in aluminum are regarded as the cause of vertical fire spread. Due to the steel frame used to secure the aluminum composite panel to the outer wall, a cavity is formed between the outer wall and outer wall finish. When a fire occurs on the outer wall, the flammable outer wall as well as the flame generated from the heat-insulating material spreads vertically through the cavity, resulting in damage to people and property. In Korea, material unit performance tests are carried out by the Ministry of Land, Infrastructure and Transport notice 2015 - 744. However, in the UK, the BS 8414 test is used to measure the vertical fire spreading time on the outer wall in real scale fire tests. In this study, the risk of external wall fire was evaluated in an actual fire by conducting a real scale wall fire test (BS 8414), which was carried out in Europe, using aluminum composite panels of semi-noncombustible materials suitable for current domestic standards. The purpose of this study was to confirm the limitations of material unit evaluation of finishing materials and to confirm the necessity of introducing a system to prevent the spread of outer wall fire through an actual scale fire test.

The Specification and Verification of Security Protocols on E-commerce System Using AVISPA (AVISPA를 이용한 전자상거래 시스템의 보안 프로토콜 명세 및 검증)

  • Jeong, Yeon-Oh;Kim, Joo-Bae;Kim, Hyun-Seok;Choi, Jin-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06d
    • /
    • pp.32-36
    • /
    • 2008
  • 최근 인터넷을 이용한 전자상거래(e-commerce)가 확산되면서 많은 편의를 제공하고 있다. 하지만, 인터넷을 통한 거래는 개인정보의 유출이나 주문 및 지불 정보의 유출 등의 취약점들에 대한 보안상의 요구를 만족하면서도 사용자들이 접근하기 쉽고 사용하기 편리해야 한다는 점에서 이중적인 어려움을 가지고 있다. 본 논문에서는 현재 전자상거래에서 사용되고 있는 보안 프로토콜들의 문제점들을 분석하고 이를 보완한 새로운 보안 프로토콜을 제안한다. 그리고 제안된 프로토콜을 정형검증 툴인 AVISPA를 이용하여 명세 및 검증함으로써 안전성을 검증한다.

  • PDF

DDoS Attack Detection using SNMPGET (SNMPGET을 이용한 DDoS 공격 탐지)

  • 박한상;유대성;오창석
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.278-282
    • /
    • 2004
  • Recently traffic flooding attack has happened faster and faster owing to expansion of the worm attack and development of the method of traffic flooding attack. The method in the past time is problematic in detecting the recent traffic flooding attacks, which are running quickly. Therefore, this paper aims to establish the algorithm which reduces the time of detection to traffic flooding attack in collecting and analyzing traffics.

  • PDF