• Title/Summary/Keyword: Deterministic Attack

Search Result 21, Processing Time 0.018 seconds

On a Deterministic Attack Against The RSA Cryptosystem (RSA 암호계에 대한 결정적 공격법에 관한 연구)

  • Kim, Yong-Tae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.4
    • /
    • pp.737-744
    • /
    • 2018
  • The RSA cryptosystem is a one of the first public-key cryptosystems and is widely used for secure data transmission and electric signature. The security of the RSA cryptosystem is based on the difficulty of factoring large numbers.. Though many studies on finding methods for factoring large numbers are going on, the results of that are all experimental or probabilistic. We, in this paper, construct an algorithm for finding large prime factors of integers without factoring integers using properties of the structure of semigroup of imaginary quadratic order and non-invertible ideal, then propose our methods foe deterministic attack against RSA cryptosystem.

Analysis for Effect of Diffusion Parameter with Time-dependent Diffusion Coefficient on Service Life Considering Deterministic and Probabilistic Method (시간의존성 염화물 확산계수를 고려한 확산 영향인자가 결정론적 및 확률론적 내구수명에 미치는 영향분석)

  • Kwon, Seung-Jun
    • Journal of the Korean Recycled Construction Resources Institute
    • /
    • v.4 no.3
    • /
    • pp.259-268
    • /
    • 2016
  • The service life evaluation in RC(Reinforced Concrete) structure exposed to chloride attack can be classified into deterministic and probabilistic method, and it significantly varies with design parameters. The present work derives PDF (Probability of Durability Failure) and the related service life considering time-dependent diffusion coefficient and internal parameters such as reference diffusion coefficient, critical chloride content, and time-exponent. When critical chloride content increases to 133.3%, the changing ratios of service life are 134.0~145.4% for deterministic method and 149.2%~152.5% for probabilistic method, respectively. In the case of increasing time-exponent to 200%, they increase to 323.8% for deterministic method and 346.0% for probabilistic method. Through adopting time-diffusion coefficient for probabilistic method, reasonable service life evaluation can be achieved, and it is also verified that increasing time-exponent through mineral admixture is very effective to extension of service life in RC structure.

Analysis Technique on Time-dependent PDF (Probability of Durability Failure) Considering Equivalent Surface Chloride Content (균등 표면 염화물량을 고려한 시간 의존적 내구적 파괴확률 해석기법)

  • Lee, Hack-Soo;Kwon, Seung-Jun
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.21 no.2
    • /
    • pp.46-52
    • /
    • 2017
  • Recently durability design based on deterministic or probabilistic method has been attempted since service life evaluation in RC(Reinforced Concrete) structure exposed to chloride attack is important. The deterministic durability design contains a reasonable method with time effect on surface chloride content and diffusion coefficient, however the probabilistic design procedure has no consideration of time effect on both. In the paper, a technique on PDF(Probability of Durability Failure) evaluation is proposed considering time effect on diffusion and surface chloride content through equivalent surface chloride content which has same induced chloride content within a given period and cover depth. With varying period to built-up from 10 to 30 years and maximum surface chloride content from $5.0kg/m^3$ to $10.0kg/m^3$, the changing PDF and the related service life are derived. The proposed method can be reasonably applied to actual durability design with preventing conservative design parameters and considering the same analysis conditions of the deterministic method.

Service Life Evaluation Considering Height of RC Structures and Distance from Sea Shore (RC 구조물 높이와 해안가 거리를 고려한 염해에 대한 내구수명 평가)

  • Oh, Kyeong-Seok;Kim, Young-Joon;Lee, Seong-Hee;Kwon, Sung-Jun
    • Journal of the Korean Recycled Construction Resources Institute
    • /
    • v.4 no.2
    • /
    • pp.172-179
    • /
    • 2016
  • For an evaluation of service life in RC(Reinforced Concrete) structures, deterministic method and probabilistic method considering random variables of design parameters are usually adopted. In the work, surface chloride contents which vary with distance from sea shore and height are investigated from the previous research literature surveys, and they are considered for service life estimation. Through the analysis, the probabilistic method shows much lower results, which is due to variations of design parameters and very low intended durability failure. In the deterministic method, the structures within 250m and higher than 60m are evaluated to be free from chloride attack. In the probabilistic method, those higher than 60m in all the region and higher than 40m and 250m from sea shore are evaluated to satisfy the service life.

Evaluation of Service Life in RC Column under Chloride Attack through Field Investigation: Deterministic and Probabilistic Approaches (염해 실태조사를 통한 철근 콘크리트 교각의 내구수명 평가 - 결정론적 및 확률론적 해석방법)

  • Kwon, Seung-Jun
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.19 no.5
    • /
    • pp.67-74
    • /
    • 2015
  • RC (Reinforced Concrete) structures are considered as cost-benefit and durable however performances of structural safety and durability are degraded due to steel corrosion. Service life in RC structure is differently evaluated due to different local environmental conditions even if it is exposed to the same chloride attack. In the paper, 25 concrete cores from field investigation are obtained from 4 RC columns with duration of 3.5~4.5 years exposed to sea water. Through total chloride content measurement, surface chloride contents and apparent diffusion coefficients are evaluated. Service life of the target structure is estimated through deterministic method based on Fick's $2^{nd}$ Law and probabilistic method based on durability failure probability, respectively. Probability method is evaluated to be more conservative and relatively decreased service life is evaluated in tidal zone and splash zone over 40.0 m. Chloride penetration behavior with coring location from sea level and the present limitations of durability design method are investigated in the paper.

A Probabilistic Test based Detection Scheme against Automated Attacks on Android In-app Billing Service

  • Kim, Heeyoul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1659-1673
    • /
    • 2019
  • Android platform provides In-app Billing service for purchasing valuable items inside mobile applications. However, it has become a major target for attackers to achieve valuable items without actual payment. Especially, application developers suffer from automated attacks targeting all the applications in the device, not a specific application. In this paper, we propose a novel scheme detecting automated attacks with probabilistic tests. The scheme tests the signature verification method in a non-deterministic way, and if the method was replaced by the automated attack, the scheme detects it with very high probability. Both the analysis and the experiment result show that the developers can prevent their applications from automated attacks securely and efficiently by using of the proposed scheme.

DDoS attack analysis based on decision tree considering importance (중요도를 고려한 의사 결정 트리 기반 DDoS 공격 분석)

  • Youm, Sungkwan;Park, Sangyoon;Shin, Kwang-Seong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.652-654
    • /
    • 2021
  • Attacks such as DDoS are detected by the intrusion detection system and can be prevented early. DDoS attack traffic was analyzed using the decision tree. Deterministic features with high importance were found, and the accuracy was verified by proceeding the decision tree for only those properties. And the contents of false positive and false negative traffic were analyzed. As a result, the accuracy of one attribute was 98% and the two attributes were 99.8%, respectively.

  • PDF

Enhancing VANET Security: Efficient Communication and Wormhole Attack Detection using VDTN Protocol and TD3 Algorithm

  • Vamshi Krishna. K;Ganesh Reddy K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.233-262
    • /
    • 2024
  • Due to the rapid evolution of vehicular ad hoc networks (VANETs), effective communication and security are now essential components in providing secure and reliable vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. However, due to their dynamic nature and potential threats, VANETs need to have strong security mechanisms. This paper presents a novel approach to improve VANET security by combining the Vehicular Delay-Tolerant Network (VDTN) protocol with the Deep Reinforcement Learning (DRL) technique known as the Twin Delayed Deep Deterministic Policy Gradient (TD3) algorithm. A store-carry-forward method is used by the VDTN protocol to resolve the problems caused by inconsistent connectivity and disturbances in VANETs. The TD3 algorithm is employed for capturing and detecting Worm Hole Attack (WHA) behaviors in VANETs, thereby enhancing security measures. By combining these components, it is possible to create trustworthy and effective communication channels as well as successfully detect and stop rushing attacks inside the VANET. Extensive evaluations and simulations demonstrate the effectiveness of the proposed approach, enhancing both security and communication efficiency.

A Two-Stage Stochastic Approach to the Artillery Fire Sequencing Problem (2단계 추계학적 야전 포병 사격 순서 결정 모형에 관한 연구)

  • Jo, Jae-Young
    • Journal of the military operations research society of Korea
    • /
    • v.31 no.2
    • /
    • pp.28-44
    • /
    • 2005
  • The previous studies approach the field artillery fire scheduling problem as deterministic and do not explicitly include information on the potential scenario changes. Unfortunately, the effort used to optimize fire sequences and reduce the total time of engagement is often inefficient as the collected military intelligence changes. Instead of modeling the fire sequencing problem as deterministic model, we consider a stochastic artillery fire scheduling model and devise a solution methodology to integrate possible enemy attack scenarios in the evaluation of artillery fire sequences. The goal is to use that information to find robust solutions that withstand disruptions in a better way, Such an approach is important because we can proactively consider the effects of certain unique scheduling decisions. By identifying more robust schedules, cascading delay effects will be minimized. In this paper we describe our stochastic model for the field artillery fire sequencing problem and offer revised robust stochastic model which considers worst scenario first. The robust stochastic model makes the solution more stable than the general two-stage stochastic model and also reduces the computational cost dramatically. We present computational results demonstrating the effectiveness of our proposed method by EVPI, VSS, and Variances.

A Fully Distributed Secure Approach using Nondeterministic Encryption for Database Security in Cloud

  • Srinu Banothu;A. Govardhan;Karnam Madhavi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.140-150
    • /
    • 2024
  • Database-as-a-Service is one of the prime services provided by Cloud Computing. It provides data storage and management services to individuals, enterprises and organizations on pay and uses basis. In which any enterprise or organization can outsource its databases to the Cloud Service Provider (CSP) and query the data whenever and wherever required through any devices connected to the internet. The advantage of this service is that enterprises or organizations can reduce the cost of establishing and maintaining infrastructure locally. However, there exist some database security, privacychallenges and query performance issues to access data, to overcome these issues, in our recent research, developed a database security model using a deterministic encryption scheme, which improved query execution performance and database security level.As this model is implemented using a deterministic encryption scheme, it may suffer from chosen plain text attack, to overcome this issue. In this paper, we proposed a new model for cloud database security using nondeterministic encryption, order preserving encryption, homomorphic encryptionand database distribution schemes, andour proposed model supports execution of queries with equality check, range condition and aggregate operations on encrypted cloud database without decryption. This model is more secure with optimal query execution performance.