• Title/Summary/Keyword: Information weakness

Search Result 789, Processing Time 0.025 seconds

Improving The Security Of Quantum Key Distribution And Quantum Authentication By Using CHSH Inequality (CHSH 부등식을 이용하여 양자 키 분배와 양자 인증의 안전성을 개선한 프로토콜)

  • Heo, Jin-O;Hong, Chang-Ho;Lim, Jong-In;Yang, Hyoung-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.69-78
    • /
    • 2008
  • We propose to analyze a weakness of quantum key distribution and quantum authentication which use entangled state were proposed by Bao-sen Shi(2001) and to improve the security of the protocol. The existing protocol had a weakness against an impersonation attack of an eavesdropper, because of a only process which authenticated a third party(Center) by users. In this paper, we propose improving the security of the protocol that authenticates users by a third party using check mode which applies CHSH inequality.

Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol (Yong-Lee의 익명 핑거프린팅 프로토콜의 안전성 취약점 및 개선 방안)

  • Sohn, Ki-Wook;Lee, Yun-Ho;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.151-155
    • /
    • 2006
  • In 2005, Yong and Lee proposed a buyer-seller fingerprinting protocol using symmetric and commutative encryptions. They claimed that their protocol was practical and anonymous since they used symmetric and commutative encryptions. However, an attacker can get the content embedded with one or more honest buyers' fingerprints using man-in-the-middle attack. In this letter, we point out the weakness and propose methods for improving to their protocol.

A study on embedded & wireless fault code transmission device development for railroad vehicle (철도차량용 임베디드 무선전송장치의 개발에 관한 연구)

  • Kim, Jong-Keol;Shim, Ja-Hyun;Shon, Kang-Ho
    • Proceedings of the KSR Conference
    • /
    • 2010.06a
    • /
    • pp.1255-1261
    • /
    • 2010
  • An operating information and fault recode of train is very important information for safety driving and maintenance. And these information is increased and need high speed as the number of trains is increased. Wireless LAN or CDMA network is efficient to report more complicated and various information from vehicle to server in control center. Existing wireless transmission system has weakness due to transmission system is separated with TDCS and standalone. At first, standalone system needs space to be installed and cost is increased. And data transmission capacity and speed is limited by complicated structure that transmission system receive data thru serial communication like RS232 and then data transmission system send data to server in control center. This article is study to develop embedded & wireless fault code transmission device to be installed in TDCS to overcome weakness of space and to have more cost effective and simple structure. It is adapted 802.11b/g WiFi for wireless communication and OS is used embedded Linux that can easily implement wireless communication environment and ensure TCP/IP communication’s security. We also implement simple server to test wireless communication between embedded & wireless fault code transmission device and server in control center.

  • PDF

The Study on Improvement of the Program that Traces the Binary Codes in Execution (실행 중인 바이너리 코드 추출 프로그램의 기능 확장 연구)

  • Chang, Hang-Bae;Kwon, Hyuk-Jun;Kim, Yang-Hoon;Kim, Guk-Boh
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.9
    • /
    • pp.1309-1315
    • /
    • 2009
  • This research goal of developing and producing a tool that finds security weakness that may happen when a usual program is executed. The analyzing tool for security weakness has the major functions as follows. In case that a part of anticipated security weakness are in execution, it traces a machine language to a part in execution. And Monitoring System calls and DLL(API) calls when a program is in execution. The result of this study will enable to contribute to use as educational materials for security service in companies and related agencies and to prevent from hacking of external information invaders in the final analysis.

  • PDF

A Study on Magnetic Cure System Depending on Dominant Direction of Meridian using Heating Diagnosis Method

  • Kim, Byoung-Hwa;Lee, Hie-Soung;Lee, Woo-Cheol;Han, Gueon-Sang;Won, You-Seub;Sagong, Seok-Jin;Ahn, Hyun-Sik;Kim, Do-Hyun
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1776-1779
    • /
    • 2002
  • In this paper, we measured the heating time on the key measuring point of the meridian of the human body's left and right by using heating machine. Then, based on the fuzzy theory, this study diagnosed the each meridian's strength and weakness, After that, both the strengthening and weakening stimulus of magnetic field was applied to the dominant direction to find out how the degree of strength and weakness of the meridian changed. Ultimately, the magnetic therapy that can stimulate the magnetic field at the time of diagnosis and thereby balancing the interactive of a five system has been materialized. For the stimulation of magnetic field, a stimulating device which can change the direction and time on a specific part of the key measuring points has been developed and used. The therapeutic method is as follows. first, the strength and weakness of the meridian has been determined. Second, both the extremely weak meridian of Yin(Shade) and Yang(Shine), and the extremely strong meridian of Yin and Yang were adjusted by applying appropriate ascending and descending stimuli respectively.

  • PDF

한방진단시스템 DSOM의 진단결과에 따른 월경통 환자의 허실(虛實) 진단에 대한 연구

  • Lee, In-Sun;Cho, Hye-Sook;Youn, hyoun-Min;Jung, Kyoung-Keun;Kim, Kyu-Kon;Park, Ji-Eun;Choi, Sum-Mi
    • Journal of Pharmacopuncture
    • /
    • v.10 no.1 s.22
    • /
    • pp.137-155
    • /
    • 2007
  • Purpose : This study was undertaken to make a diagnosis weakness and firmness (虛實) of Dysmenorrhea patients by diagnosis questionnaires system(Diagnosis System of Oriental Medicine-DSOM) Methods : The subjects were 58 volunteers who was suffering for dysmenorrhea, employed using Measure of Menstrual Pain (MMP) questionnaire. The had agreed to take part in this experiment, with didn't take any anodyne drugs. The MMP score by using 7 questions and the Menstrual Symptom Severity List(MSSL-D) was measured before and after menstruation cycle. Results and Conclusions : The findings of this study were as follows; 1. We examined Pathogenic Factor's frequency of DSOM, Coldness(寒) was 45 persons 80.36%, Damp(濕) was 40 persons 71.43%, Heart(心) was 37 persons 66.07%, Heat syndrom(熱) was 9 persons 16.07%, insufficiency of Yang(陽虛) was 6 persons 10.71%. 2. We divided Dysmenorrhea patients into two groups(weakness and firmness) by Results of DSOM, Firmness was 25 Persons 43.1%, Weakness was 23 persons 39.7%, Unknown was 10 persons 17.2%. 3. In estimation based on Measure of Menstrual Pain (MMP) questionnaire Severe menstrual pain is weakness, Mild menstrual pain is Firmness. 4. In estimation of coldness and heat syndrom, Coldness was 40 persons 69.0%, Heat syndrom, was 2 persons 3.5%, Possess both coldness and heat syndrom was 9 persons 15.5%.

Analysis of Pattern Identification and Related Symptoms on Idiopathic Short Stature -Focusing on Traditional Chinese Medicine Literature- (특발성 저신장의 변증 유형 및 변증별 증상 분석 -중의학 논문을 중심으로-)

  • Lee, Boram;Kwon, Chan-Young;Jang, Soobin
    • The Journal of Pediatrics of Korean Medicine
    • /
    • v.35 no.1
    • /
    • pp.1-17
    • /
    • 2021
  • Objectives We aimed to analyze traditional Chinese medicine (TCM) literatures in regards to the pattern identification and related symptoms of idiopathic short stature (ISS). Methods We searched relevant literatures published up to September 29, 2020 through three Chinese electronic databases. We performed frequency analysis of the selected studies by extracting information on pattern identification, clinical symptoms, and TCM treatments presenting pattern identification of ISS. Results Sixteen studies were included. Spleen deficiency, kidney deficiency, dual deficiency of spleen-kidney, and liver-kidney yin deficiency were frequently reported. Clinical symptoms of the spleen deficiency include sallow complexion, body constituent weakness, anorexia, lack of qi and no desire to speak, and loose stools. Herbal medicines (HMs) such as Sijunzi-tang were frequently reported. Clinical symptoms of the kidney deficiency include cold limb and fear of cold, soreness and weakness of waist and knees, and clear and long urine. HMs such as Bishendihuang-wan were frequently reported. Clinical symptoms of the dual deficiency of spleen-kidney include body constituent weakness, spirit lassitude and lack of strength, anorexia, soreness and weakness of waist and knees, and cold limb and fear of cold. HMs such as Sijunzi-tang plus Bishendihuang-wan were frequently reported. Clinical symptoms of the liver-kidney yin deficiency include tidal fever and night sweating, heat in the palms and soles, dizziness, and dry throat. HMs such as Liuweidihuang-wan were frequently reported. Conclusions This was the first study to analyze the frequency of pattern identification and related symptoms on ISS. In the future, a standardized Korean medicine pattern identification system should be established.

Development of Safe Korean Programming Language Using Static Analysis (정적 분석을 이용한 안전한 한글 프로그래밍 언어의 개발)

  • Kang, Dohun;Kim, Yeoneo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.79-86
    • /
    • 2016
  • About 75% of software security incidents are caused by software vulnerability. In addition, the after-market repairing cost of the software is higher by more than 30 times than that in the design stage. In this background, the secure coding has been proposed as one of the ways to solve this kind of maintenance problems. Various institutions have addressed the weakness patterns of the standard software. A new Korean programming language Saesark has been proposed to resolve the security weakness on the language level. However, the previous study on Saesark can not resolve the security weakness caused by the API. This paper proposes a way to resolve the security weakness due to the API. It adopts a static analyzer inspecting dangerous methods. It classifies the dangerous methods of the API into two groups: the methods of using tainted data and those accepting in-flowing tainted data. It analyses the security weakness in four steps: searching for the dangerous methods, configuring a call graph, navigating a path between the method for in-flowing tainted data and that uses tainted data on the call graph, and reporting the security weakness detected. To measure the effectiveness of this method, two experiments have been performed on the new version of Saesark adopting the static analysis. The first experiment is the comparison of it with the previous version of Saesark according to the Java Secure Coding Guide. The second experiment is the comparison of the improved Saesark with FindBugs, a Java program vulnerability analysis tool. According to the result, the improved Saesark is 15% more safe than the previous version of Saesark and the F-measure of it 68%, which shows the improvement of 9% point compared to 59%, that of FindBugs.

Analysis of NTRUSign signature scheme

  • Sungjun Min;Go Yamamoto;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.399-405
    • /
    • 2003
  • A new type of signature scheme, called NTRUSign, based on solving the approximately closest vector problem in an NTRU lattice was proposed in[7],[8]. However no security proof against chosen messages attack has been made for this scheme. In this paper, we show that NTRUSign signature scheme contains the weakness of malleability. From this, one can derive new valid signatures from any previous message-signature pair which means that NTRUSign is not secure against strongly existential forgery.

  • PDF

The Validity Verification of Encrypted XML Document using the XML Schema (XML 스키마를 이용한 암호화된 XML 문서 유효성 검증)

  • Hong, Seong-Pyo;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.5
    • /
    • pp.972-977
    • /
    • 2003
  • XML has weakness problems on document modulation and elimination of data Because of the XML gives priority to present data format, XML signature, XML encryption, or XML access control is provided to overcome those weakness problems. However, structured XML efficiency contravention problem occurred from XML encryption and absence of protection from DID attack are still remains unsolved. In this paper, we suggests the XML schema that satisfies both validity and encryption. The DTD is unnecessary because XML schema supports Well-Formed XML documents and include meta information. Also XML schema has possibility to generate each XML document dynamically and because of self efficiency investigator rule, it has an advantage on extendability of DID based encryption of XML documents.