• Title/Summary/Keyword: Key Park

Search Result 4,873, Processing Time 0.04 seconds

Secure Message Transmission against Remote Control System

  • Park, Taehwan;Seo, Hwajeong;Bae, Bongjin;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.14 no.4
    • /
    • pp.233-239
    • /
    • 2016
  • A remote control system (RCS) can monitor a user's confidential information by using the broadcast receivers in Android OS. However, the current RCS detection methods are based only on a virus vaccine. Therefore, if the user's smartphone is infected by a brand new RCS, these methods cannot detect this new RCS immediately. In this paper, we present a secure message transmission medium. This medium is completely isolated from networks and can communicate securely through a QR code channel by using symmetric key cryptography such as the AES block cipher and public key cryptography such as elliptic curve cryptography for providing security. Therefore, the RCS cannot detect any confidential information. This approach is completely immune to any RCS attacks. Furthermore, we present a secure QR code-based key exchange protocol by using the elliptic curve Diffie-Hellman method and message transmission protocols; the proposed protocol has high usability and is very secure.

A Study on Management Performance by ISO/TS 16949 Quality Management System Certification (ISO/TS16949 품질경영시스템 인증에 따른 경영성과에 관한 연구)

  • Park, Jong-Young;Hong, Jung-Eui;Kim, Kwang-Soo
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2009.11a
    • /
    • pp.269-288
    • /
    • 2009
  • After enterprise get a certification in acquisition, the core requirements of ISO/TS 16949 standard is pull out the Performance Indicators by process access approach during the settlement and operation of system, and the pulled key performance indicators classified into the customer intention process, support process and management process and analyzed the effect to the management result. This study conducted with following step. Firstly, preceding research, the literature and investigation analysis about process approach method which is the special characteristics of ISO/TS 16949 standard. Secondly, each process of ISO/TS 16949 standard is classified and deduced the key performance indicators followed process access method. Finally, get a enterprise survey data related to improvement of Performance Indicator and analyzed by SPSS statistical software.

  • PDF

Complete Larval Development of Hemigrapsus longitarsis (Miers, 1879) (Crustacea, Decapoda, Grapsidae), with a Key to the Known Grapsid Zoeas of Korea

  • Park, Young-Sook;Ko, Hyun-Sook
    • Animal cells and systems
    • /
    • v.6 no.2
    • /
    • pp.107-123
    • /
    • 2002
  • One ovigerous crab of Hemigrapsus longitarsis (Miers, 1879) was collected in Jeju Island, Korea and their larvae were reared in the laboratory. Five zoeal and one megalopal stages are described and illustrated in detail. Morphology of the zoeas slightly differs from that in the previous record. Within the genus Hemigrapsus, H. longitarsis shows similarity closer to H. sanguineus and H. penicillatus than to H. sinensis based on the zoeal morphology. The zoeas of H. longitarsis can be distinguished from those of the two other species in having a dorsal carapace spine with minute spinules which is naked in H. sanguineus and H. penicillatus. A provisional key is provided to aid the identification of the grapsid zoeas in Korea.

A Study on Management Performance by ISO/TS 16949 Quality Management System Certification (ISO/TS16949 품질경영시스템 인증에 따른 경영성과에 관한 연구)

  • Park, Jong-Young;Hong, Jung-Eui;Kim, Kwang-Soo
    • Journal of the Korea Safety Management & Science
    • /
    • v.11 no.3
    • /
    • pp.227-237
    • /
    • 2009
  • After enterprise get a certification in acquisition, the core requirements of ISO/TS 16949 standard is pull out the Performance Indicators by process access approach during the settlement and operation of system, and the pulled key performance indicators classified into the customer intention process, support process and management process and analyzed the effect to the management result. This study conducted with following step. Firstly, preceding research, the literature and investigation analysis about process approach method which is the special characteristics of ISO/TS 16949 standard. Secondly, each process of ISO/TS 16949 standard is classified and deduced the key performance indicators followed process access method. Finally, get a enterprise survey data related to improvement of Performance Indicator and analyzed by SPSS statistical software.

Differential Fault Analysis for Round-Reduced AES by Fault Injection

  • Park, Jea-Hoon;Moon, Sang-Jae;Choi, Doo-Ho;Kang, You-Sung;Ha, Jae-Cheol
    • ETRI Journal
    • /
    • v.33 no.3
    • /
    • pp.434-442
    • /
    • 2011
  • This paper presents a practical differential fault analysis method for the faulty Advanced Encryption Standard (AES) with a reduced round by means of a semi-invasive fault injection. To verify our proposal, we implement the AES software on the ATmega128 microcontroller as recommended in the standard document FIPS 197. We reduce the number of rounds using a laser beam injection in the experiment. To deduce the initial round key, we perform an exhaustive search for possible key bytes associated with faulty ciphertexts. Based on the simulation result, our proposal extracts the AES 128-bit secret key in less than 10 hours with 10 pairs of plaintext and faulty ciphertext.

Development of Certificate and Key Management System Using Web Service Technology (웹서비스 기술을 이용한 그리드 인증서 및 키관리 시스템 개발)

  • Kim, Sang-Wan;Park, Hyung-Woo;Lee, Sang-San;Kim, Jong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11a
    • /
    • pp.237-240
    • /
    • 2002
  • 현재 그리드 컴퓨팅 툴킷으로 사용되고 있는 Globus는 PKI (Public Key Infrastructure) 기반의 인증방식을 이용하고 있다. PKI 인증방식은 통합 인증 기능(Single Sign-On)을 구현하기에 적당하지만, 그리드에 참여하는 수많은 컴퓨터와 사용자들의 공개키 인증서(public key certificate)를 발급하고 관리해야하는 부담이 따른다. 본 연구에서는 인증기관이 사용자에게 인증서를 발급하고, 인증서를 관리하는 과정을 자동화 해 줄 수 있는 시스템을 개발하고, 다양한 클라이언트에 서비스 제공을 위해 웹서비스를 통한 인터페이스 기능을 새로 추가하였다.

  • PDF

Blackboard Scheduler Control Knowledge for Recursive Heuristic Classification

  • Park, Young-Tack
    • Journal of Intelligence and Information Systems
    • /
    • v.1 no.1
    • /
    • pp.61-72
    • /
    • 1995
  • Dynamic and explicit ordering of strategies is a key process in modeling knowledge-level problem-solving behavior. This paper addressed the important problem of howl to make the scheduler more knowledge-intensive in a way that facilitates the acquisition, integration, and maintenance of the scheduler control knowledge. The solution a, pp.oach described in this paper involved formulating the scheduler task as a heuristic classification problem, and then implementing it as a classification expert system. By doing this, the wide spectrum of known methods of acquiring, refining, and maintaining the knowledge of a classification expert system are a, pp.icable to the scheduler control knowledge. One important innovation of this research is that of recursive heuristic classification : this paper demonstrates that it is possible to formulate and solve a key subcomponent of heuristic classification as heuristic classification problem. Another key innovation is the creation of a method of dynamic heuristic classification : the classification alternatives that are selected among are dynamically generated in real-time and then evidence is gathered for and aginst these alternatives. In contrast, the normal model of heuristic classification is that of structured selection between a set of preenumerated fixed alternatives.

  • PDF

The Analysis of the TETRA Authentication Protocol (TETRA 인증 프로토콜 분석)

  • Park Yong-Seok;Ahn Jae-Hwan;Jung Chang-Ho;Ahn Jeong-Chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.187-190
    • /
    • 2006
  • TETRA system provides the radio authentication service which permits only authorized radio to access network. Radio authentication is the process which checks the sameness of authentication-key(K) by challenge-response protocol between radio and authentication center. This paper analyzes authentication-key generation/delivery/injection model in TETRA authentication system and analyzes the threat of clone radio caused by authentication-key exposure.

  • PDF

Design On Secure Messenger Mechanism Using Elliptic Curve Cryptography and IPSec

  • Choi Gwang-Mi;Park Su-Young;Kim Hyeong-Gyun
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.3
    • /
    • pp.182-186
    • /
    • 2004
  • When most of existing instant messengers log on server, they transmit to sever in encoding password to RC5. but RC5 don't be secured because it has been known many of password cracking tools. Also, messengers don't have any protection on the transmitted information with communicating two hosts since loging on, endangering the privacy of the user. As a counter measure, messengers need to provide security service including message encryption. In this paper, we designed a key exchange method of password representing fast, effective and high security degree, using ECC(Elliptic Curve Cryptography) that being known the very stronger than another public key cryptography with same key size. To effectively improve data transmission and its security using IPSec protocol between users, tunnel mode is introduced. Tunnel mode transmits Host-to-Host data through virtual pipelines on the Internet.

A Study on Trend of Technology Development for Unmanned Combat Ground Vehicle (무인전투차량 기술개발 동향조사 및 분석)

  • Park, Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.7
    • /
    • pp.1735-1739
    • /
    • 2009
  • The keen global competition is expected among foreign advanced nations for source, key technologies required by unmanned combat ground vehicle. Therefore, the trend of technologies for unmanned ground combat vehicle was analyzed in this research. It was based on the submitted patents from 1988 to 2008 in Korea, U.S.A, Japan, Europe, Canada and Israel. This analysis was focused on finding the technical level, the challenge area and breakthrough technologies and the growth of technologies of each nations considering opinions of experts. This report suggested the field of key technology development