• 제목/요약/키워드: C2 공격

Search Result 172, Processing Time 0.03 seconds

KpqC 공모전 1 라운드 격자 기반 PKE/KEM 알고리즘 분석

  • Joohee Lee
    • Review of KIISC
    • /
    • v.33 no.3
    • /
    • pp.39-47
    • /
    • 2023
  • 양자컴퓨팅 기술이 발전함에 따라, 양자컴퓨터를 이용한 공격에도 안전한 암호인 양자내성암호(Post-Quantum Cryptography, PQC) 기술의 중요성이 대두되고 있다. NIST에서는 2016년부터 시작된 표준화 공모 1,2,3 라운드를 통해 2022년 공개키 암호 및 Key-establishment, 전자서명 분야의 양자내성암호 표준을 선정한 바 있으며, 현재는 4 라운드와 전자서명 분야 추가 선정 공모를 진행 중이다. 이러한 배경에서 2022년 국내에서도 양자내성암호 알고리즘 표준화 공모인 KpqC 공모전 1라운드를 시작하였고, 공개키 암호 및 Key-establishment 7종, 전자서명 9종의 알고리즘이 표준 후보로 제출되었다. 본고에서는 KpqC 공모전 1 라운드 공개키 암호 및 Key-establishment 알고리즘 중 격자 기반 공개키 암호/KEM(Key Encapsulation Mechanism) 알고리즘 3종 NTRU+, SMAUG, TiGER에 대해 분석 및 소개한다. 각 알고리즘의 기반 문제, 설계 방식, 특징, 안전성 분석 방식 등을 분석하고, 구현성능을 비교 분석한다.

Profiling Program Behavior with X2 distance-based Multivariate Analysis for Intrusion Detection (침입탐지를 위한 X2 거리기반 다변량 분석기법을 이용한 프로그램 행위 프로파일링)

  • Kim, Chong-Il;Kim, Yong-Min;Seo, Jae-Hyeon;Noh, Bong-Nam
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.397-404
    • /
    • 2003
  • Intrusion detection techniques based on program behavior can detect potential intrusions against systems by analyzing system calls made by demon programs or root-privileged programs and building program profiles. But there is a drawback : large profiles must be built for each program. In this paper, we apply $X^2$ distance-based multivariate analysis to profiling program behavior and detecting abnormal behavior in order to reduce profiles. Experiment results show that profiles are relatively small and the detection rate is significant.

A study on the key management protocols for the Internet (인터넷 키 관리 프로토콜에 관한 연구)

  • Lee, Kye-Sang
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.133-140
    • /
    • 2003
  • IKE, which is the standard key management protocol for IPSEC, is said to have several known problems. To resolve the problems of the IKE, two protocol proposals are being discussed in the IETF. the IKE version 2 and Just Fast Keying protocols. They should satisfy several protocol design requirements such as the protocol simplicity, the endurability against DOS attacks, the degree of the PFS, the identity protection, the cryptographic negotiation, and the authentication methods. In this paper, we summarize the characteristics of these two protocols and try to analyze their implications according to the protocol design requirements.

Effects of aquatic drugs and immune response in color carp, Cyprinus carpio, to Aeromonas hydrophila (Aeromonas hydrophila에 대한 비단잉어의 면역반응과 수산약제의 영향)

  • Ji, Bo-Young;Park, Soo-Il
    • Journal of fish pathology
    • /
    • v.5 no.2
    • /
    • pp.77-85
    • /
    • 1992
  • This study was carried out in order to investigate the immunosuppressive factor and immune response of color carp. The protection and serum antibody production of juvenile color carp aganist Aeromonas hydrophila were investigated on the effect of temperature differences and injected several aquatic drugs, i.e. Hydrocortisone, Oxytetracycline, Chloramphenicol and Ascorbic acid. The fish were injected intraperitoneally with 1mg/fish of HKC and FKC at three different temperature conditions as $16^{\circ}C$, $24^{\circ}C$, and $32^{\circ}C$ respectively. There were induced better protection and serum antibody production in the fish which had been kept at $24^{\circ}C$ than in the fish which had been kept at $16^{\circ}C$ and $32^{\circ}C$. The FKC immunized fish were followed 24 hrs later with intraperitoneal injection of 40mg/kg body weight of Hydrocortisone, 60mg/kg body weight of Oxytetracycline. 60mg/kg body weight of Chloramphenicol and 30mg/kg body weight of Ascorbic acid, respectively. The control fish were injected PBS only. The fish given the above aquatic drugs reduced serum antibody production level and protection rate when compared to control fish. As the results, immune response of juvenile color carp immunized FKC at $24^{\circ}C$ was more effective than $16^{\circ}C$ or $32^{\circ}C$ and immune response of juvenile color carp injected several aquatic drugs which was seemed to be immunosuppressive factor.

  • PDF

Tactical Fire Direction Automation for Command and Control of Artilliary Battalion Unit (대대급 화력(포병 부대)의 지휘통제(C2)를 위한 전술적 사격지휘 자동화 절차)

  • Ahn, Myong-Hwan;Ji, Jae-Kyung;Cho, Hyun-Ho;Sin, Chul-Soo;Park, Young-Woo;Lee, Teuc-Soo;Kim, Tae-Yeong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11B
    • /
    • pp.1738-1747
    • /
    • 2010
  • This report shows the analysis and design of tactical decision automation procedure and the result of core algorithm. Expecially scheme of analysis and design includes result of tactical decision supporting procedure analysis for target engagement to fire in refer to AFATDS. Tactical decision automation procedure has three phases like target analysis, target priority, fire unit decision, fire method and attack method. Target analysis creates base information to decide priorities and attack methods through target activity, size and protection status. Target priority and fire unit decision judge target priority and fire unit with unit status and operation mission basis of target priority. Fire unit and Attack method decide fire style according to the kind of fire and ammunition for effective firing achievement. Finally, we show the effective tactical decision automation procedure through making the algorithm of priority and air control.

Integrity Guarantee Scheme of Mobile Agents through Authentication of Digital Signature with TTS (TTS기반에서 디지털 서명의 실행 인증을 통한 에이전트의 무결성 보장 기법)

  • Jung Chang-Ryul;Yoon Hong-Sang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6C
    • /
    • pp.651-657
    • /
    • 2006
  • This paper propose the technique for the execution authentication of digital signature with TTS(traceable trust server) to guarantee the safe execution of mobile agents. That is to say, it is focused on improving the processing speed of systems and the traffic of network which are problems in the existing studies. The digital signature is used to guarantee the efficient and safe execution and the integrity of mobile agents. The certificate of it is chained with synthesis function, cryptographic algorithm based on public key, and hash function. And white hosts can be protected against the threat of being used maliciously. Then, we prove the efficiency of system overhead and the traffic of network by the analysis. In case the certificate chain of a digital signature is used, the safe execution of mobile agents can be protected against attackers that wish to insert a newly created certificate after cutting off the chain after striking space key 2 times.

Nuclear-related Software analysis based on secure coding (시큐어 코딩 중심으로 본 원자력 관련 소프트웨어)

  • Jung, Da-Hye;Choi, Jin-Young;Lee, Song-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.243-250
    • /
    • 2013
  • We have entered into an era of smart software system where the many kinds of embedded software, especially SCADA and Automotive software not only require high reliability and safety but also high-security. Removing software weakness during the software development lifecycle is very important because hackers exploit weaknesses which are source of software vulnerabilities when attacking a system. Therefore the coding rule as like core functions of MISRA-C should expand their coding focus on security. In this paper, we used CERT-C secure coding rules for nuclear-related software being developed to demonstrate high-safety software, and proposed how to remove software weakness during development.

An Efficient Secrete Key Protection Technique of Scan-designed AES Core (스캔 설계된 AES 코아의 효과적인 비밀 키 보호 기술)

  • Song, Jae-Hoon;Jung, Tae-Jin;Jeong, Hye-Ran;Kim, Hwa-Young;Park, Sung-Ju
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.2
    • /
    • pp.77-86
    • /
    • 2010
  • This paper presents an efficient secure scan design technique which is based on a fake key and IEEE 1149.1 instruction to protect secret key from scan-based side channel attack for an Advanced Encryption Standard (AES) core embedded on an System-on-a-Chip (SoC). Our proposed secure scan design technique can be applied to crypto IP core which is optimized for applications without the IP core modification. The IEEE 1149.1 standard is kept, and low area, low power consumption, very robust secret-key protection and high fault coverage can be achieved compared to the existing methods.

Synthesis of 2-Cyanoimino-1,3-thiazoline (2-Cyanoimino-1,3-thiazoline 유도체의 합성)

  • Hahn, Hoh-Gyu;Nam, Kee-Dal;Park, Ik-Kyu;Mah, He-Duck
    • The Korean Journal of Pesticide Science
    • /
    • v.7 no.2
    • /
    • pp.155-158
    • /
    • 2003
  • 2-Imino-1,3-thiazolines 1 show selective antifungal activity against pyricularia oryzae by new mode of action. A synthesis of novel 2-cyano-l,3-thiazolines 2 in which cyano moiety is substituted in imino group at C-2 of 1 is described. The lone pair electrons of sulfur and nitrogen as well as strong electron withdrawing cyano substituent in 1,3-thiazoline scaffold would effect the biological activity of 2-imino-1,3-thiazoline series. Regiospecific nucleophilic attack of thiourea 4 for $\gamma$-chloro-$\beta$-ketoacetoacetanilide 3 followed by acid catalyzed dehydration gave 2.

An Encrypted Botnet C&C Communication Method in Bitcoin Network (비트코인 네크워크에서의 암호화된 봇넷 C&C 통신기법)

  • Kim, Kibeom;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.103-110
    • /
    • 2022
  • Botnets have been exploited for a variety of purposes, ranging from monetary demands to national threats, and are one of the most threatening types of attacks in the field of cybersecurity. Botnets emerged as a centralized structure in the early days and then evolved to a P2P structure. Bitcoin is the first online cryptocurrency based on blockchain technology announced by Satoshi Nakamoto in 2008 and is the most widely used cryptocurrency in the world. As the number of Bitcoin users increases, the size of Bitcoin network is also expanding. As a result, a botnet using the Bitcoin network as a C&C channel has emerged, and related research has been recently reported. In this study, we propose an encrypted botnet C&C communication mechanism and technique in the Bitcoin network and validate the proposed method by conducting performance evaluation through various experiments after building it on the Bitcoin testnet. By this research, we want to inform the possibility of botnet threats in the Bitcoin network to researchers.