• 제목/요약/키워드: Forgery Prevention

검색결과 36건 처리시간 0.033초

다중 암호화 기법을 활용한 하이브리드 스마트카드 구현 (Implementation of Hybrid Smartcard Using Multi Encryption Method)

  • 이성은;장홍종;박인재;한선영
    • 정보보호학회논문지
    • /
    • 제13권2호
    • /
    • pp.81-89
    • /
    • 2003
  • 정보통신의 급속한 발전으로 정보의 온라인 유통이 급증하고 있으며 이에 따른 유통 정보에 대한 보호가 중요해지고 있다. 현재 공개키 기반구조(Public Key Infrastructure, PKI)는 전자상거래를 위한 정보보호 기반구조로써 많이 활용되고 있으며 스마트카드는 공개키 기반구조를 가장 잘 적용할 수 있다. 그러나 공개키 기반의 인증서는 사용자의 인증 정보만을 제공하기 때문에 사용자의 본인확인 및 권한 정보가 필요한 응용에서는 그 사용이 제한적일 수밖에 없으며 스마트카드의 위·변조 가능성 또한 존재하고 있다. 이의 해결을 위해 본 논문에서는 인증서 유효성 검증만으로 해결할 수 혀는 스마트카드의 위·변조에 대한 가능성을 광영상 암호화 기법인 각 다중화와 암호키다중화를 사용하여 위·변조를 방지하였고, 위·변조 시 이를 검증할 수 있도록 하였다. 또한, 보안성과 이동성이 뛰어난 스마트카드와 결합한 공개키 인증기반의 본인확인 기법을 제안하여 다중 인증 체계의 새로운 보안 인증시스템을 제안하였다.

WISA 2002에 제안된 무선 전자 지불 시스템의 안전성 (On the Security or a Mobile Payment System Proposed at WISA 2002)

  • 한대완;이동훈;황상철;류재철
    • 정보보호학회논문지
    • /
    • 제13권6호
    • /
    • pp.113-119
    • /
    • 2003
  • WISA 2002에서 함우석 등은 무선 환경에 적합한 단방향 지불 시스템을 제안하였고, 제안 시스템의 전자 화폐가 모듈러 멱승과 같은 공개키 연산 없이 위조 불가능성과 이중 사용 방지의 특성을 지닌다고 주장하였다. 본 논문에서는 제안된 전자 화폐가 제안자들의 주장과는 달리 실제로는 구매 내역의 위조가 가능함을 보임으로써, 올바른 서명이 없이는 다양한 공격이 가능함을 보인다.

국내 외국인근로자의 여권 위변조 방지 개발에 관한 연구 (A study on the development of prevention of passport forgery and alteration of foreign workers in Korea)

  • 윤영빈;김명우;이아현;한원희;김민영
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2023년도 추계학술발표대회
    • /
    • pp.803-804
    • /
    • 2023
  • 본 논문은 외국인 근로자의 여권 위변조를 탐지하기 위해 MRZ 코드와 발광 데이터를 활용하는 방법을 제안하고 구현한 것이다. 이 기술은 외국인 근로자의 보호와 국내 안보 강화, 금융 거래의 안전성 향상을 지원하며, 웹 기반 인터페이스를 통해 실시간 판별과 사용자 편의성을 제공한다. 이로써 여권 위변조로 인한 잠재적인 위험을 예방하고 국내 여행 및 비즈니스 환경을 향상시킬 수 있다.

국방분야 인공지능과 블록체인 융합방안 연구 (The study of Defense Artificial Intelligence and Block-chain Convergence)

  • 김세용;권혁진;최민우
    • 인터넷정보학회논문지
    • /
    • 제21권2호
    • /
    • pp.81-90
    • /
    • 2020
  • 본 연구는 인공지능의 국방 분야 활용 시 데이터 위·변조 방지를 위한 블록체인 기술의 적용방안을 연구 하는데 목적이 있다. 인공지능은 빅 데이터를 다양한 기계학습 방법론을 적용하여 군집화하거나 분류하여 예측하는 기술이며 미국을 비롯한 군사 강대국은 기술의 완성단계에 이르렀다. 만약 데이터를 기반으로 하는 인공지능의 데이터 위·변조가 발생한다면 데이터의 처리과정이 완벽하더라도 잘못된 결과를 도출할 것이며 이는 가장 큰 적의 위험요소가 될 수 있고 데이터의 위·변조는 해킹이라는 형태로 너무나 쉽게 가능하다. 만약 무기화된 인공지능이 사용하는 데이터가 북한으로부터 해킹되어 조작되어 진다면 예상치 못한 곳의 공격이 발생할 수도 있다. 따라서 인공지능의 사용을 위해서는 데이터의 위·변조를 방지하는 기술이 반드시 필요하다. 데이터의 위·변조 방지는 해수함수로 암호화된 데이터를 연결된 컴퓨터에 분산 저장하여 한 대의 컴퓨터가 해킹되더라도 연결된 컴퓨터의 과반 이상이 동의하지 않는 한 데이터가 손상되지 않는 기술인 블록체인을 적용함으로써 문제를 해결할 수 있을 것으로 기대한다.

이더리움 기반 이메일 시스템 모델 (E-mail System Model based on Ethereum)

  • 김태경
    • 디지털산업정보학회논문지
    • /
    • 제13권4호
    • /
    • pp.99-106
    • /
    • 2017
  • With the advent of virtual money such as bit coins, interest in the block chain is increasing. Block Chain is a technology that supports Distributed Ledger and is a versatile technology applicable to various fields. Currently, the block chain is conducting research for various applications such as virtual money, trade finance, marketplace, power market, image contents service, and IoT. The technologies that make up the block chain are smart contract, digital signature/hash function and consensus algorithm. And these technologies operate on P2P networks. In this paper, we have studied e-mail system based on the ethereum which is one of the block chain based technologies. Most legacy mail systems use SMTP and the POP3/IMAP protocol to send and receive e-mail, and e-mail use S/MIME to protect the e-mail. However, S/MIME is vulnerable to DDoS attacks because it is configured centrally. And it also does not provide non-repudiation of mail reception. To overcome these weaknesses, we proposed an e-mail system model based on ethereum. The proposed model is able to cope with DDoS attack and forgery prevention by using block chain based technology, and reliable recording and management among block chain participants are provided, so that it is possible to provide a non-repudiation function of e-mail transmission and reception.

바이오 정보보호 위한 히스토그램 쉬프팅 기반 가역성 DNA 워터마킹 기법 (Reversible DNA Watermarking Technique Using Histogram Shifting for Bio-Security)

  • 이석환;권성근;이응주;권기룡
    • 한국멀티미디어학회논문지
    • /
    • 제20권2호
    • /
    • pp.244-253
    • /
    • 2017
  • Reversible DNA watermarking is capable of continuous DNA storage and forgery prevention, and has the advantage of being able to analyze biological mutation processes by external watermarking by iterative process of concealment and restoration. In this paper, we propose a reversible DNA watermarking method based on histogram multiple shifting of noncoding DNA sequence that can prevent false start codon, maintain original sequence length, maintain high watermark capacity without biologic mutation. The proposed method transforms the non-coding region DNA sequence to the n-th code coefficients and embeds the multiple bits of the n-th code coefficients by the non-recursive histogram multiple shifting method. The multi-bit embedding process prevents the false start codon generation through comparison search between adjacent concealed nucleotide sequences. From the experimental results, it was confirmed that the proposed method has higher watermark capacity of 0.004-0.382 bpn than the conventional method and has higher watermark capacity than the additional data. Also, it was confirmed that false start codon was not generated unlike the conventional method.

Coordination of Anti-Spoofing Mechanisms in Partial Deployments

  • An, Hyok;Lee, Heejo;Perrig, Adrian
    • Journal of Communications and Networks
    • /
    • 제18권6호
    • /
    • pp.948-961
    • /
    • 2016
  • Internet protocol (IP) spoofing is a serious problem on the Internet. It is an attractive technique for adversaries who wish to amplify their network attacks and retain anonymity. Many approaches have been proposed to prevent IP spoofing attacks; however, they do not address a significant deployment issue, i.e., filtering inefficiency caused by a lack of deployment incentives for adopters. To defeat attacks effectively, one mechanism must be widely deployed on the network; however, the majority of the anti-spoofing mechanisms are unsuitable to solve the deployment issue by themselves. Each mechanism can work separately; however, their defensive power is considerably weak when insufficiently deployed. If we coordinate partially deployed mechanisms such that they work together, they demonstrate considerably superior performance by creating a synergy effect that overcomes their limited deployment. Therefore, we propose a universal anti-spoofing (UAS) mechanism that incorporates existing mechanisms to thwart IP spoofing attacks. In the proposed mechanism, intermediate routers utilize any existing anti-spoofing mechanism that can ascertain if a packet is spoofed and records this decision in the packet header. The edge routers of a victim network can estimate the forgery of a packet based on this information sent by the upstream routers. The results of experiments conducted with real Internet topologies indicate that UAS reduces false alarms up to 84.5% compared to the case where each mechanism operates individually.

열선 차단 필름용 니켈 착화합물의 합성과 특성 (Synthesis and Properties of Nickel Complexes for the Thermal Shielding Film)

  • 곽선엽;이태훈;손세모
    • 한국인쇄학회지
    • /
    • 제24권2호
    • /
    • pp.49-59
    • /
    • 2006
  • In this paper, a transparent film exposed the effect of heat cut-off, reveal as means of the prevention to wrong operation of parts of display and forgery of the credit card, also it will intercept rising of the temperature in interior of a room and car by diminish the influx of near-infrared ray wavelength of solar energy come from the window. As in the past a film which absorb a wavelength of $800{\sim}2500nm$ in near-infrared ray, manufactured in physical vapor deposition(PVD), chemical vapor deposition(CVD) to using ATO, ITO of inorganic materials or sputtering method. but it has lots of problem in manufacture. On the other hand, recently a paper said it easily form a transparent film to using organic dye. This paper show synthesis of many derivatives used in Ni-complex and then it investigate to optical property and durability of flim by make the transparent film.

  • PDF

A Study on the Security Technology of Real-time Biometric Data in IoT Environment

  • Shin, Yoon-Hwan
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권1호
    • /
    • pp.85-90
    • /
    • 2016
  • In this paper, the biometric data is transmitted in real time from the IoT environment is runoff, forgery, alteration, prevention of the factors that can be generated from a denial-of-service in advance, and the security strategy for the biometric data to protect the biometric data secure from security threats offer. The convenience of living in our surroundings to life with the development of ubiquitous computing and smart devices are available in real-time. And is also increasing interest in the IOT. IOT environment is giving the convenience of life. However, security threats to privacy also are exposed for 24 hours. This paper examines the security threats to biological data to be transmitted in real time from IOT environment. The technology for such security requirements and security technology according to the analysis of the threat. And with respect to the biometric data transmitted in real time on the IoT environment proposes a security strategy to ensure the stability against security threats and described with respect to its efficiency.

중국중재제도의 국제표준화에 대한 연구 (A Study for International Standardization of China Arbitration System)

  • 김석철
    • 한국중재학회지:중재연구
    • /
    • 제18권3호
    • /
    • pp.117-138
    • /
    • 2008
  • This study lies on building the International Standardization of China Arbitration System for improving a relationship of mutual trust and the safety trade between China and other worldwide countries, especially, South Korea as their one of the biggest trading partners through the comparative analysis of China and UNCITRAL Arbitration Law. In this analysis, the differences from China and UNCITRAL in arbitration law are like belows ; lack of arbitrator's international mind, the limitation of private property right, prohibition of Ad. hoc arbitration, arbitrator's biased nationalism, localism, and their short specialties. a deficiency of the objectiveness for arbitrator's election, a judgement rejection of claimants by using nonattendance and walkout, impossibility of prior and temporary property custody for execution of arbitration award. etc. For the improvement of the International Standardization of China Arbitration, this paper propose as follows: 1) Extension of private property right, reorganization of tax system, realization of open competition, exclusion of 'Sinocentrism', globalization of arbitration system 2) The abolition of old fashioned bureaucracy with approval for ad.hoc arbitration 3) An education for arbitrator's internationalization, specialty, and to promote legal knowledge 4) A settlement of the third country arbitrators' selection for reflecting interested party's decision by the court in a selection system of arbitration committee. 5) Institutionalization of arbitration judgment that prevent for claimant's avoidance by using a withdrawal and an intentional absent 6) A permission of the right of claimant's court custody directly before the begging of arbitration request for the prevention for destruction of evidence and property concealment 7) Grant of the arbitration tribunal's interim measures of protection for private property preservation to the third party, proof security, prevention from the loss that selling the corruptible goods 8) Improvement of arbitration's efficiency from the exclusion of the obstacles that are forgery, concealed evidence, and arbitrator's bribe taking Lastly, I hope that this study will serve to promote friendly economic relationship between China and South Korea and strive for international equilibrium through the achievement of China Arbitration's International Standardization. I will finish this paper with a firm belief that this will lead to more advanced studies.

  • PDF