• Title/Summary/Keyword: Plain Text

Search Result 95, Processing Time 0.022 seconds

A Design of MILENAGE Algorithm-based Mutual Authentication Protocol for The Protection of Initial Identifier in LTE (LTE 환경에서 초기 식별자를 보호하기 위한 MILENAGE 알고리즘 기반의 상호인증)

  • Yoo, Jae-hoe;Kim, Hyung-uk;Jung, Yong-hoon
    • Journal of Venture Innovation
    • /
    • v.2 no.1
    • /
    • pp.13-21
    • /
    • 2019
  • In LTE environment, which is 4th generation mobile communication systems, there is concern about private information exposure by transmitting initial identifier in plain text. This paper suggest mutual authentication protocol, which uses one-time password utilizing challenge-response and AES-based Milenage key generation algorithm, as solution for safe initial identification communication, preventing unique identification information leaking. Milenage key generation algorithm has been used in LTE Security protocol for generating Cipher key, Integrity key, Message Authentication Code. Performance analysis evaluates the suitability of LTE Security protocol and LTE network by comparing LTE Security protocol with proposed protocol about algorithm operation count and Latency.Thus, this paper figures out initial identification communication's weak points of currently used LTE security protocol and complements in accordance with traditional protocol. So, it can be applied for traditional LTE communication on account of providing additional confidentiality to initial identifier.

The Effect of Guibitang(歸脾湯) on the Ovarian Functions and Differential Gene Expression of Caspase-3, MAPK and MPG in Female Mice (귀비탕(歸脾湯)이 자성생쥐의 생식능력과 Caspase-3, MAPK, MPG유전자 발현에 미치는 영향)

  • Jung, Yeon-Chul;Baek, Seung-Hee;Kim, Eun-Ha;Kim, Dong-Chul
    • The Journal of Korean Obstetrics and Gynecology
    • /
    • v.20 no.3
    • /
    • pp.13-34
    • /
    • 2007
  • Purpose: To evaluate the effect of administration of Guibitang on ovarian functions and differential gene expressions related cell viabilities caspase-3, MAPK and MPG in female mice. Methods: We administered the Guibitang to 6-week-old female ICR mice for 4, 8, or 12 days. Then, the female mice were injected PMSG and hCG for ovarian hyperstimulation. The mice divided into 3 different groups for each experiment. To compare the differences, we set a control group treated with plain water at the same volume by the same way. Results: administration of Guibitang, the mean number of total ovulated oocytes and the number of morphologically normal oocytes increased significantly compared to control group. And the rates of blastocyst formation from 2-cell stages alsa increased significantly compared to control group. Capase-3 gene expression which is known to maker gene for cell apoptosis were significantly lower than that of control group. And MAPK and MPG gene expressions for cell viability and DNA repair were same that of control group. Conclusion: From our results suggested that the medication of Guibitang has beneficial effect on reproductive functions of female mice via prevention of cell apoptosis and DNA damaging and promotion of cell proliferation.

  • PDF

The Effect of Palmultang(八物湯) on the Ovarian Functions and Differential Gene Expression of Caspase-3, MAPK and MPG in Female Mice (팔물탕(八物湯)이 자성생쥐의 생식능력과 Caspase-3, MAPK 및 MPG 유전자 발현에 미치는 영향)

  • Joo, Jin-Man;Baek, Seung-Hee;Kim, Eun-Ha;Kim, Dong-Chul
    • The Journal of Korean Obstetrics and Gynecology
    • /
    • v.20 no.3
    • /
    • pp.91-110
    • /
    • 2007
  • Purpose : These experiments were undertaken to evaluate the effect of administration of Palmultang on ovarian functions and differential gene expressions related cell viabilities caspase-3, MAPK and MPG in female mice. Materials and Methods : We administered the Palmultang to 6-week-old female ICR mice for 4, 8, or 12 days. The female mice were injected PMSG and hCG for ovarian hyperstimulation. And then recovered ovaries were minced and extracted mRNA and analyzed cell viability related gene expression. We chose the caspase-3 for cell apoptosis, MAPK and MPG genes for cell viability and DNA repair. To compare the differences, we set a control group treated with plain water at the same volume by the same way. Results : In case of administration of Palmultang, the mean number of total ovulated oocytes and the number of morphologically normal oocytes increased significantly compared to a control group. We were also examined the embryonic developmental competence in vitro. The administration of Palmultang in a concentration with 10 and 100 mg/ml were beneficial effect of embryonic development in preimplantation period. The administration of Palmultang play a role of prevention of cell apoptosis and DNA damages and also increased cell proliferation resulted in ovarian functions. Conclusion : From our results suggested that the medication of Palmultang has beneficial effect on reproductive functions of female mice via prevention of cell apoptosis and DNA damaging and promotion of cell proliferation.

  • PDF

Utilization and Optimized Implementation of Format Preserving Encryption Algorithm for IoT and BLE Communications (IoT와 BLE 통신상의 형태보존암호 활용 및 최적화 구현 기법)

  • Lim, Ji-hwan;Kwon, Hyuk-dong;Woo, Jae-min;An, Kyu-hwang;Kim, Do-young;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1371-1378
    • /
    • 2018
  • Bluetooth is the key technology in the wireless connection of many Internet of Things (IoT) devices, especially focused on smartphones today. In addition, Bluetooth communication between the IoT device and the user is mainly performed via Bluetooth Low Energy (BLE), but as the Bluetooth technology gradually develops, the security vulnerability of the existing BLE is more prominent. Research on Bluetooth accessibility has been conducted steadily so far, but there is lack of research for data protection in Bluetooth communication. Therefore, in this paper, when sending and receiving data in BLE communication between IoT and users, we propose effective methods for communicating with each other through the Format Preserving Encryption Algorithm (FEA), not the plain text, and measures performance of FEA which is optimized in Arduino and PC.

An Implementation of Database Security Using Steganography in the Web (웹 상에서 스테가노그라피 기법을 이용한 안전한 데이터베이스 보안 구현)

  • Moon, Bong-Keun;Ryoo, Du-Gyu;Ko, Myung-Sun;Eom, Ki-Won;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.3-11
    • /
    • 2005
  • As the usage of Internet grows, we share many informations among the others and use more database systems for a various type of data. However, secure database system, which prevents the unauthorized users from modification, deletion, and access, is urgently required for sharing data in Internet. Conventional technologies of a data security are passive methods which depend on several steps with an access control, and these methods are vulnerable against the illegal attack because attacker can see the plain text that is private message. To prevent private data item for the special security from the malicious attack in web database, this paper is devoted to implement database system using steganography method, so we can protect the data item completely because attacker cannot know the secure message although he get the content of database.

Weaknesses of the new design of wearable token system proposed by Sun et al. (Sun 등이 제안한 착용 가능한 토큰 시스템의 취약점 분석에 관한 연구)

  • Kim, Jung-Yoon;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.81-88
    • /
    • 2010
  • Sun et al. proposed a new design of wearable token system for security of mobile devices, such as a notebook and PDA. In this paper, we show that Sun et al.'s system is vulnerable to off-line password guessing attack and man in the middle attack based on known plain-text attack. We propose an improved scheme which overcomes the weaknesses of Sun et al.'s system. The proposed protocol requires to perform one modular multiplication in the wearable token, which has low computation ability, and modular exponentiation in the mobile devices, which have sufficient computing resources. Our protocol has no security problem, which threatens Sun's system, and known vulnerabilities. That is, the proposed protocol overcomes the security problems of Sun's system with minimal overheads.

Vulnerability analysis for AppLock Application (AppLock 정보 은닉 앱에 대한 취약점 분석)

  • Hong, Pyo-gil;Kim, Dohyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.845-853
    • /
    • 2022
  • As the memory capacity of smartphone increases, the type and amount of privacy stored in the smartphone is also increasing. but recently there is an increasing possibility that various personal information such as photos and videos of smartphones may be leaked due to malicious apps by malicious attackers or other people such as repair technicians. This paper analyzed and studied the security and vulnerability of these vault apps by analyzing the cryptography algorithm and data protection function. We analyzed 5.3.7(June 13, 2022) and 3.3.2(December 30, 2020) versions of AppLock, the most downloaded information-hidding apps registered with Google Play, and found various vulnerabilities. In the case of access control, there was a vulnerability in that values for encrypting patterns entered by users were hardcoded into plain text in the source code, and encrypted pattern values were stored in xml files. In addition, in the case of the vault function, there was a vulnerability in that the files and log files for storing in the vault were not encrypted.

Legibility Evaluation of Two and Three Syllable Words Used in Pesticides According to Font, Thickness, Gender, and Visual Acuity (시력, 폰트, 굵기, 성별에 따른 2음절 및 3음절 농약 제품 표시글자의 가독성 평가)

  • Hwang, Hae-Young;Song, Young-Woong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.8
    • /
    • pp.3444-3451
    • /
    • 2012
  • Safety and health related information for the proper use and handing of pesticides is usually printed on the surface of the pesticide products in the form of texts. But, the guidelines or standards for the appropriate presentation of the texts for the pesticide products are most vague or not practical. Thus, this study aimed to provide the preliminary guidelines for the text sizes based on the legibility experiments. To achieve the objective legibility evaluation experiments were conducted to test the effects of different near vision (0.6, ${\geq}0.8$), gender, font type(thick gothic-type and fine gothic-type), thickness of font(plain and bold), and number of syllables(2 and 3 syllables) in the same age group of 20s. The results showed that legibility was different according to the visual acuity (p<0.05), and no other main effects showed statistically significant effects. The 'maximum illegible size' to read at least one word correctly in all the text conditions was 2 pt when the near vision was ${\geq}0.8$, and 2 pt or 3 pt when the near vision was 0.6. The 'minimum legible size' for 100% correct answer was 9 pt for the near vision of 0.6, and 5.3 pt for ${\geq}0.8$, respectively. Mean character size does not read any discomfort in 0.6 was 15.5 pt in both male and female but male was mean 8.5 pt, female was 10 pt in ${\geq}0.8$. Considering these experimental results, it was recommended that the 16 pt or larger characters should be used the important information such as 'Pesticides' or toxicity, and the minimum character size was 9 pt for the less important information.

Development of a gridded crop growth simulation system for the DSSAT model using script languages (스크립트 언어를 사용한 DSSAT 모델 기반 격자형 작물 생육 모의 시스템 개발)

  • Yoo, Byoung Hyun;Kim, Kwang Soo;Ban, Ho-Young
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.20 no.3
    • /
    • pp.243-251
    • /
    • 2018
  • The gridded simulation of crop growth, which would be useful for shareholders and policy makers, often requires specialized computation tasks for preparation of weather input data and operation of a given crop model. Here we developed an automated system to allow for crop growth simulation over a region using the DSSAT (Decision Support System for Agrotechnology Transfer) model. The system consists of modules implemented using R and shell script languages. One of the modules has a functionality to create weather input files in a plain text format for each cell. Another module written in R script was developed for GIS data processing and parallel computing. The other module that launches the crop model automatically was implemented using the shell script language. As a case study, the automated system was used to determine the maximum soybean yield for a given set of management options in Illinois state in the US. The AgMERRA dataset, which is reanalysis data for agricultural models, was used to prepare weather input files during 1981 - 2005. It took 7.38 hours to create 1,859 weather input files for one year of soybean growth simulation in Illinois using a single CPU core. In contrast, the processing time decreased considerably, e.g., 35 minutes, when 16 CPU cores were used. The automated system created a map of the maturity group and the planting date that resulted in the maximum yield in a raster data format. Our results indicated that the automated system for the DSSAT model would help spatial assessments of crop yield at a regional scale.

Design and Implementation of an HTML Converter Supporting Frame for the Wireless Internet (무선 인터넷을 위한 프레임 지원 HTML 변환기의 설계 및 구현)

  • Han, Jin-Seop;Park, Byung-Joon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.6
    • /
    • pp.1-10
    • /
    • 2005
  • This paper describes the implementation of HTML converter for wireless internet access in wireless application protocol environment. The implemented HTML converter consists of the contents conversion module, the conversion rule set, the WML file generation module, and the frame contents reformatting module. Plain text contents are converted to WML contents through one by one mapping, referring to the converting rule set in the contents converting module. For frame contents, the first frameset sources are parsed and the request messages are reconstructed with all the file names, reconnecting to web server as much as the number of files to receive each documents and append to the first document. Finally, after the process of reformatting in the frame contents reformatting module, frame contents are converted to WML's table contents. For image map contents, the image map related tags are parsed and the names of html documents which are linked to any sites are extracted to be replaced with WML contents data and linked to those contents. The proposed conversion method for frame contents provides a better interface for the users convenience and interactions compared to the existing converters. Conversion of image maps in our converter is one of the features not currently supported by other converters.