• Title/Summary/Keyword: C2 attack

Search Result 359, Processing Time 0.03 seconds

On the Security of a New C2C-PAKA Protocol (새로운 C2C-PAKA 프로토콜의 안전성 연구)

  • Byun, Jin-Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.473-483
    • /
    • 2012
  • To achieve an entire end-to-end security, the classical authentication setting such that all participants have a same password is not practical since a password is not a common secret but a personal secret depending on an individual. Thus, an efficient client to client different password-based authenticated key agreement protocol (for short, EC2C-PAKA) has been suggested in the cross-realm setting. Very recently, however, a security weakness of the EC2C-PAKA protocol has been analyzed by Feng and Xu. They have claimed that the EC2C-PAKA protocol is insecure against a password impersonation attack. They also have presented an improved version of the EC2C-PAKA protocol. In this paper, we demonstrate that their claim on the insecurity of EC2C-PAKA protocol against a password impersonation attack is not valid. We show that the EC2C-PAKA protocol is still secure against the password impersonation attack. In addition, ironically, we show that the improved protocol by Feng and Xu is insecure against an impersonation attack such that a server holding password of Alice in realm A can impersonate Bob in realm B. We also discuss a countermeasure to prevent the attack.

Relationship between Ground Reaction Force and Attack Time According to the Position of Hand Segments during Counter Attack in Kendo

  • Hyun, Seung Hyun;Jin, HyeonSeong;Ryew, Che Cheong
    • Korean Journal of Applied Biomechanics
    • /
    • v.27 no.1
    • /
    • pp.1-7
    • /
    • 2017
  • Objective: The purpose of this study was to analyze the relationship between ground reaction force (GRF) and attack time according to the position of hand segments during counter attack in Kendo. Method: The participants consisted of 10 kendo athletes (mean age: $21.50{\pm}1.95yr$, mean height: $175.58{\pm}5.02cm$, mean body weight: $70.96{\pm}9.47kg$) who performed standard head strikes (A) and counter attack with a preferred hand position of +10 cm (B), 0 cm (C), and -10 cm (D). One force-plate (AMTI-OR-7., USA) was used to collect GRF data at a sample rate of 1,000 Hz. The variables analyzed were the attack time, medial-lateral GRF, anterior-posterior GRF (AP GRF), peak vertical force (PVF), and loading rate. Results: The total attack time was shorter in types A and C than in types C and D. The AP GRF, PVF, and loading rate had significantly higher forces in types C and D than in types A and C. The attack time (bilateral and unilateral leg support and total) was positively correlated with the GRF variables (vertical GRF and loading rate) during the counter attack in Kendo (r = 0.779 [$R^2=0.607$], p < 0.001). Conclusion: The positions of the hand segments can be changed by various conditions of the opponent in Kendo competitions; however, the position preferred by an individual can promote the successful ratio of the counter attack.

Attack Modeling for an Internet Security Simulation (인터넷 보안 시뮬레이션을 위한 공격 모델링)

  • Seo, Jung-Kuk;Choi, Kyung-Hee;Jung, Gi-Hyun;Park, Seung-Kyu;Sim, Jae-Hong
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.183-192
    • /
    • 2004
  • As the use of the Internet has explosively increased, it is likely for the Internet to be exposed to various attacks. Modeling the Internet attacks is essential to simulate the attacks. However, the existing studies on attack modeling have mainly focused on classifying and categorizing the attacks and consequently they are not suitable to representing attack scenarios in the Internet security simulation. In this paper, we introduce the existing methods of attack modeling, and propose an adapted attack modeling to properly express the properties for the Internet security simulator. The adapted attack modeling suggests a solution to the problems of the existing attack tree modelings, such as difficulty of composing complex scenarios ambiguity of attack sequence, lack of system state information. And it can represent simultaneous, precise time-dependent attack, and attack period, which are nearly impossible to be represented in many other existing methods.

Theoretical Studies of the Gas-Phase Identity Nucleophilic Substitution Reactions of Cyclopentadienyl Halides

  • Lee, Ik-Choon;Li, Hong-Guang;Kim, Chang-Kon;Lee, Bon-Su;Kim, Chan-Kyung;Lee, Hai-Whang
    • Bulletin of the Korean Chemical Society
    • /
    • v.24 no.5
    • /
    • pp.583-592
    • /
    • 2003
  • The gas phase identity nucleophilic substitution reactions of halide anions (X = F, Cl, Br) with cyclopentadienyl halides (1) are investigated at the B3LYP/6-311+G**, MP2/6-311+G** and G2(+)MP2 levels involving five reaction pathways: σ-attack $S_N2$, β-$S_N$2'-syn, β-$S_N$2'-anti, γ-$S_N$2'-syn and γ-$S_N$2'-anti paths. In addition, the halide exchange reactions at the saturated analogue, cyclopentyl halides (2), and the monohapto circumambulatory halide rearrangements in 1 are also studied at the same three levels of theory. In the σ-attack $S_N2$ transition state for 1 weak positive charge develops in the ring with X = F while negative charge develops with X = Cl and Br leading to a higher energy barrier with X = F but to lower energy barriers with X = Cl and Br than for the corresponding reactions of 2. The π-attack β-$S_N$2' transition states are stabilized by the strong $n_C-{\pi}^{*}_{C=C}$ charge transfer interactions, whereas the π-attack γ-$S_N$2' transition states are stabilized by the strong $n_C-{\sigma}^{*}_{C-X}$ interactions. For all types of reaction paths, the energy barriers are lower with X = F than Cl and Br due to the greater bond energy gain in the partial C-X bond formation with X = F. The β-$S_N$2' paths are favored over the γ-$S_N$2' paths only with X = F and the reverse holds with X = Cl and Br. The σ-attack $S_N2$ reaction provides the lowest energy barrier with X = Cl and Br, but that with X = F is the highest energy barrier path. Activation energies for the circumambulatory rearrangement processes are much higher (by more than 18 kcal $mol^{-1}$) than those for the corresponding $S_N2$ reaction path. Overall the gas-phase halide exchanges are predicted to proceed by the σ-attack $S_N2$ path with X = Cl and Br but by the β-$S_N$2'-anti path with X = F. The barriers to the gas-phase halide exchanges increase in the order X = F < Br < Cl, which is the same as that found for the gas-phase identity methyl transfer reactions.

Security Analysis of Block Cipher KT-64 (블록 암호 KT-64에 대한 안전성 분석)

  • Kang, Jin-Keon;Jeong, Ki-Tae;Lee, Chang-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.55-62
    • /
    • 2012
  • KT-64 is a 64-bit block cipher which use CSPNs suitable for the efficient FPGA implementation. In this paper, we propose a related-key amplified boomerang attack on the full-round KT-64. The attack on the full-round KT-64 requires $2^{45.5}$ related-key chosen plaintexts and $2^{65.17}$ KT-64 encryptions. This work is the first known cryptanalytic result on KT-64.

Wear Mechanism of MgO-C Refractory with Thermite Reaction Products of MgO and Al (MgO와 Al의 테르밋 반응생성물이 첨가된 MgO-C계 내화재료의 용손 기구)

  • 최태현;전병세
    • Journal of the Korean Ceramic Society
    • /
    • v.33 no.7
    • /
    • pp.832-838
    • /
    • 1996
  • Thermite reaction products of MgO and Al were added to MgO-C refractory to improve the properties of corrosion against the attack of slag, oxidation and mechanical spalling. Corrosion rate of MgO-C-MgAl2O4 spinel refractory at the ratio of 3.3(CaO/SiO2) slag was smaller than that of MgO-C and MgO-C-Al refractory. The excellent corrosion resistance of the MgO-C-MgAl2O4 spinel refractory against the slag attack was appeared by Al and MgAl2O4 spinel with high melting point and corrosion resistance and the high thermal conductivity and low thermal expansion of AIN. Hot M.O.R at 140$0^{\circ}C$ and the resistance of oxidation weight loss at 90$0^{\circ}C$ were 210kg/cm2 and -12% respectively.

  • PDF

Attack Evolution of 'DNSpionage' and Countermeasures on Survey ('DNS피오나지' 공격의 진화에 따른 대응방안)

  • Hong, Sunghyuck
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.52-57
    • /
    • 2019
  • DNS stands for 'Domain Name System' and uses IP addresses to identify devices connected to the network on the network. IP is a protocol that registers and manages aliases such as IPs because it is difficult for general users to remember. In recent years, the abuse of such DNS is increasing abroad, and behind the scenes, called 'DNS pionage,' are developing and evolving new rules and malware. DNSpionage attack is abusing DNS system such as Increasing hacking success rate, leading to fake sites, changing or forged data. As a result it is increasing the damage cases. As the global DNS system is expanding to the extent that it is out of control. Therefore, in this research, the countermeasures of DNSpionage attack is proposed to contribute to build a secure and efficient DNS system.

Side-channel Attack on the Final Round SHA-3 Candidate Skein (SHA-3 최종 라운드 후보 Skein에 대한 부채널 공격 방법)

  • Park, Ae-Sun;Park, Jong-Yeon;Han, Dong-Guk;Yi, Ok-Yeon
    • The KIPS Transactions:PartC
    • /
    • v.19C no.3
    • /
    • pp.179-184
    • /
    • 2012
  • Due to the absence of an alternative algorithm SHA-2, NIST (National Institute of Standards and Technology) is proceeding to development project of SHA-3. NIST announced five candidates of the final round at the end of 2010. Side-channel attack scenarios of five candidates for SHA-3 final round have been proposed. In this paper, we prove the possibility of the analysis against 32-bit modular addition by 8-bit blocks from our experiment on ARM chip board with a register size of 32-bit. In total we required 9700 power traces to successfully recover the 128-bit secret key for the attack against.

Resistance against Chloride Ion and Sulfate Attack of Cementless Concrete (무시멘트 콘크리트의 염소이온 침투 및 황산염 침투 저항성)

  • Lee, Hyun-Jin;Bae, Su-Ho;Kwon, Soon-Oh;Lee, Kwang-Myong;Jeon, Jun-Tai
    • Journal of the Korean Society for Advanced Composite Structures
    • /
    • v.6 no.2
    • /
    • pp.63-69
    • /
    • 2015
  • It has been well known that concrete structures exposed to chloride and sulfate attack environments lead to significant deterioration in their durability due to chloride ion and sulfate ion attack. The purpose of this experimental research is to evaluate the resistance against chloride ion and sulfate attack of the cementless concrete replacing the cement with ground granulated blast furnace slag. For this purpose, the cementless concrete specimens were made for water-binder ratios of 40%, 45%, and 50%, respectively and then this specimens were cured in the water of $20{\pm}3^{\circ}C$ and immersed in fresh water, 10% sodium sulfate solution for 28 and 91 days, respectively. To evaluate the resistance to chloride ion and sulfate attack for the cementless concrete specimens, the diffusion coefficient for chloride ion and compressive strength ratio, mass change ratio, and length change ratio were measured according to the NT BUILD 492 and JSTM C 7401, respectively. It was observed from the test results that the resistance against chloride ion and sulfate attack of the cemetntless concrete were comparatively largely increased than those of OPC concrete with decreasing water-binder ratio.

Sulfate Attack and the Role of Cement Compositions

  • Lee, Seung-Tae;Lee, Seung-Heun
    • Journal of the Korean Ceramic Society
    • /
    • v.44 no.9
    • /
    • pp.465-470
    • /
    • 2007
  • This paper presents an experimental study of the sulfate resistance of mortars and pastes exposed to sodium sulfate solutions up to one year. In order to check deterioration modes due to sulfate attack, the sodium sulfate solution was varied at three concentration steps (3,380, 10,140 and 33,800 ppm of $SO_4^{2-}$ ions), and maintained at ambient temperature. The tests include a visual examination, expansion and compressive strength loss measurements as well as x-ray diffraction tests. The experimental data indicated that the use of cement with a low $C_3A$ content and low silicate ratio has a beneficial effect on the sulfate attack of mortars. In contrast, the mortars with a high $C_3A$ content and high silicate ratio became severely degraded due to the formation of ettringite, gypsum and/or thaumasite in the cement matrix.