• Title/Summary/Keyword: Power analysis attack

Search Result 212, Processing Time 0.032 seconds

Authenticated Mobile IPv6 Binding Update Protocol for Micro/Pico Cell Environments (마이크로 및 피코 셀 환경에 적합한 인증된 모바일 IPv6 바인딩 갱신 프로토콜)

  • Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1519-1523
    • /
    • 2007
  • In this paper, we propose the fast and secure binding update protocol as handoff or handover in the micro and pico environment based on mobile IPv6. The nodes or routers on participating in this protocol generate their addresses from cryptographically generated addresses (CGAs) method unlike previous address generation method. The mobile node (MN) includes in home network or home link has limited power and computational abilities. So the home agent (HA) of the MN executes key agreement protocol with the correspondent node (CN) on behalf of the MN. The CN then creates a ticket on including session key, lifetime of ticket. and so on. It then transmits it to the MN via the HA of the MN. The ticket is used to communicate directly between the MN and its CN. In performance analysis, we analyze security of proposed binding update protocol under various attack scenarios and efficiency by comparing proposed protocol with prior binding update protocols. Finally we make a conclusion of this paper and present future works.

  • PDF

Contrast Analysis for CBRN attacks on educational research and best practices (테러대비를 위한 CBRNE교육 선진사례 분석에 관한 연구)

  • Kim, Tae hwan;Park, Dae woo;Hong, Eun sun
    • Journal of the Society of Disaster Information
    • /
    • v.5 no.1
    • /
    • pp.78-100
    • /
    • 2009
  • This study is to protect peoples' life, minimize the property damage by coping with threats quickly and take more preventive measures in advance against nuclear bomb, CBR, and potential explosive. For this, CBRNE(Chemical, Biological, Radiological, Nuclear, Explosive) program research was used. Thanks to advance in technology, terrorist groups and even individuals make or keep nuclear and CBR weapons. And also it's likely that disaster and threats from a toxic gas, acute pathogens, accidents in the nuclear power plants and a high explosive could be happened a lot. Recently more organized terrorist groups maintain random attacks for unspecified individuals and also it's highly likely that a large-scale terrorist attack by WMD and CBRNEwill be done. To take strict measures against CBRNE attacks by terrorists is on the rise as an urgent national task. Moreover biological weapons are relatively easy and inexpensive to obtain or produce and cause mass casualties with a small amount. For this reason, more than 25 countries have already possessed them. In the 21 st century, the international safety environment marks the age of complicated threats : transnational threats such as comprehensive security and terror, organized crime, drug smuggling, illegal trade of weapons of mass destruction, and environmental disruption along with traditional security threats. These cause military threats, terror threats, and CBRNE threats in our daily life to grow. Therefore it needs to come up with measures in such areas as research development, policy, training program. Major industrial nations on CBRNE like USA, Canada, Switzerland, and Israel have implemented various educational programs. These researches could be utilized as basic materials for drawing up plans for civil defense, emergency services and worldwide countermeasures against CBRNE.

  • PDF

Analysis on the Correlation of Humor Style Types Shown in (<런닝맨>에서 나타난 유머스타일 유형 상관관계 분석)

  • Kim, Joon
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.157-162
    • /
    • 2019
  • This thesis analyzed the intermediation and correlation of positive humor style and negative humor style through an entertainment program broadcasted on SBS. For the theoretical background, the Humor Style Questionnaire(HSQ) developed by Martin et al., was selected. As the research methods, first, after classifying the types of humor style of members of , this study analyzed how the positive humor style and negative humor style would intermediate the formation of humor, and also the correlation of humor style of members. The types of positive humor style and negative humor style shown in were balanced in 4:4, which was classified in accordance with age, career experience, and power. The mediation of humor formation occurred at the point where humors confronted. The humor style had the correlation with twist.

Randomization of Elliptic Curve Secret Key to Efficiently Resist Power Analysis (전력분석공격을 효율적으로 방어하는 타원곡선 비밀키의 랜덤화)

  • 장상운;정석원;박영호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.169-177
    • /
    • 2003
  • We establish the security requirements and derive a generic condition of elliptic curve scalar multiplication to resist against DPA and Goubin’s attack. Also we show that if a scalar multiplication algorithm satisfies our generic condition, then both attacks are infeasible. Showing that the randomized signed scalar multiplication using Ha-Moon's receding algorithm satisfies the generic condition, we recommend the randomized signed scalar multiplication using Ha-Moon's receding algorithm to be protective against both attacks. Also we newly design a random recoding method to Prevent two attacks. Finally, in efficiency comparison, it is shown that the recommended method is a bit faster than Izu-Takagi’s method which uses Montgomery-ladder without computing y-coordinate combined with randomized projective coordinates and base point blinding or isogeny method. Moreover. Izu-Takagi’s method uses additional storage, but it is not the case of ours.

Protection Profile for Smart Meters: Vulnerability and Security Requirements Analysis (스마트미터의 취약성/보안요구사항 분석 CC v3.1 기반 보호프로파일 개발)

  • Jung, Chul-Jo;Eun, Sun-Ki;Choi, Jin-Ho;Oh, Soo-Hyun;Kim, Hwan-Koo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.111-125
    • /
    • 2010
  • There is a growing interest in "smart grid" technology, especially after the government recently announced "low-carbon green-growth industry" project. A smart grid uses "smart meters", which can be deployed in any power-consuming places like homes and factories. It has been shown that smart meters have several security weaknesses. There is, however, no protection profile available for smart meters, which means that safety with using them is not guaranteed at all. This paper analyzes vulnerabilities of smart meters and the relevant attack methods, thereby deriving the security functions and requirements for smart meters. Finally, we propose a protection profile based on Common Criterion v3.l for smart meters.

Discussion on the Strategic Priorities and Navy's Coping in the Interwar Period Britain, 1919?1939 (「전간기 영국의 전략 우선순위 논의와 영국해군의 대응, 1919-1939」)

  • Jeon, Yoon-Jae
    • Strategy21
    • /
    • s.32
    • /
    • pp.123-159
    • /
    • 2013
  • The purpose of this research paper is to re-valuate the factors that affected the Royal Navy's rearmament and preparation for war by conducting analysis on the discussion held in the Britain on the strategic priorities and Navy's coping measures adopted during the interwar period. After the end of the WWI, each of the military arms of the Britain faced significant difficulty in securing budget and increasing their military power all throughout the interwar period, and the Navy was not an exception. The WWII that got started on September 1939 was the turning point in which this difficulty led to full-fledged crisis. Immensely many criticisms followed after the war and problems were identified when it comes to the Royal Navy's performance during the war. This type of effort to identify problem led to the attempt to analyze whether Royal Navy's preparation for war and rearmament policy during interwar period were adequate, and to identify the root causes of failure. Existing studies sought to find the root cause of failed rearmament from external factors such as the deterioration of the Britain itself or pressure from the Treasury Department to cut the budget for national defense, or sought to detect problems from the development of wrong strategies by the Navy. However, Royal Navy's failed preparation for the war during interwar period is not the result of one or two separate factors. Instead, it resulted due to the diverse factors and situations that the Britain was facing at the time, and due to intricate and complex interaction of these factors. Meanwhile, this research paper focused on the context characterized by 'strategic selection and setting up of priorities' among the various factors to conduct analysis on the Navy's rearmament by linking it with the discussion held at the time on setting up strategic priorities, and sought to demonstrate that the Navy Department's inadequate counter-measures developed during this process waned Royal Navy's position. After the end of WWI, each of the military arms continued to compete for the limited resources and budget all throughout the interwar period, and this type of competition amidst the situation in which the economic situation of Britain was still unstable, made prioritization when it comes to the allocation of resources and setting up of the priorities when it comes to the military power build-up, inevitable. Amidst this situation, the RAF was able to secure resources first and foremost, encouraged by the conviction of some politicians who were affected by the 'theory of aerial threat' and who believed that curtailing potential attack with the Air Force would be means to secure national security at comparatively lower cost. In response, Navy successfully defended the need for the existence of Navy despite the advancement of the aerial power, by emphasizing that the Britain's livelihood depends on trade and on the maintenance of maritime traffic. Despite this counter-measuring logic, however, Navy's role was still limited to the defense of overseas territory and to the fleet run-off instead of sea traffic route production when it comes to the specific power build-up plan, and did not understand the situation in which financial and economic factors gained greater importance when it comes to the setting up of strategic priorities. As a result, Navy's plan to build its powers was met with continual resistance of the Treasury Department, and lost the opportunity to re-gain the status of 'senior service' that it had enjoyed in the past during the competition for strategic prioritization. Given that the strategic and economic situation that Korea faces today is not very different from that of the Britain during the interwar period, our Navy too should leverage the lessons learned from the Royal Navy to make the effort to secure viable position when it comes to the setting of priorities in case of national defense strategy by presenting the basis on why maritime coping should be prioritized among the numerous other threats, and by developing the measures for securing the powers needed effectively amidst the limited resources.

  • PDF

Estimation of Inundation Damages of Urban area Around Haeundae Beach Induced by Super Storm Surge Using Airborne LiDAR Data (항공 LiDAR 자료를 이용한 슈퍼태풍 내습시 해운대 해수욕장 인근 도심지역 침수 피해 규모 추정)

  • Han, Jong-Gyu;Kim, Seong-Pil;Chang, Dong-Ho;Chang, Tae-Soo
    • Spatial Information Research
    • /
    • v.17 no.3
    • /
    • pp.341-350
    • /
    • 2009
  • As the power and scale of typhoons are growing due to global warming and socioeconomic damages induced by super-typhoons are increasing, it is important to estimate inundation damages and to prepare proper adaptation plans against an attack of the super-typhoon. In this paper, we estimated the inundation damages of urban area around Haeundae beach induced by super-typhoons which follow the route of Typhoon Maemi with the conditions of Typhoon Vera (Ise Bay in Japan, 1959), Typhoon Durian (Philippine, 2006) and Hurricane Katrina (New Oleans in U.S.A, 2005). The coastal area around the Haeundae beach (Busan and Gyeongnam province) is expectedly damaged by severe storm surges. In this study we calculated the rise of sea level height after harmonizing the different datum levels of land and ocean and estimated the inundation depth, inundation area and the amount of building damages by using airborne LiDAR data and GIS spatial analysis techniques more accurately and quantitatively. As many researchers are predicting that super-typhoon of overwhelming power will occur around the Korean peninsula in the near future, the results of this study are expected to contribute to producing coastal inundation map and evacuation planning.

  • PDF

Enhanced and Practical Alignment Method for Differential Power Analysis (차분 전력 분석 공격을 위한 향상되고 실제적인 신호 정렬 방법)

  • Park, Jea-Hoon;Moon, Sang-Jae;Ha, Jae-Cheol;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.93-101
    • /
    • 2008
  • Side channel attacks are well known as one of the most powerful physical attacks against low-power cryptographic devices and do not take into account of the target's theoretical security. As an important succeeding factor in side channel attacks (specifically in DPAs), exact time-axis alignment methods are used to overcome misalignments caused by trigger jittering, noise and even some countermeasures intentionally applied to defend against side channel attacks such as random clock generation. However, the currently existing alignment methods consider only on the position of signals on time-axis, which is ineffective for certain countermeasures based on time-axis misalignments. This paper proposes a new signal alignment method based on interpolation and decimation techniques. Our proposal can align the size as well as the signals' position on time-axis. The validity of our proposed method is then evaluated experimentally with a smart card chip, and the results demonstrated that the proposed method is more efficient than the existing alignment methods.

Analysis report for readiness posture against north korea nuclear threat - Focused mainly in non-military area of government readiness posture - (북한의 핵위협 대비태세 분석 - 정부의 비군사분야 대비태세를 중심으로 -)

  • Kim, In-Tae
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.205-227
    • /
    • 2015
  • The Korean Peninsula is put in a position to carry out a highly strategic game vis-a-vis nK, which is asserting itself as a nuclear power amongst Northeast Asia's complex dynamics. While the international community recognizes nK's possession of nuclear weapons as released secret based on nK's three nuclear tests, shrewd strategic thinking is needed by ROK to secure itself as a non-nuclear nation in order to assume a responsible role to the international community, while simultaneously being ready to respond at all times for nK's military provocations. ROK must continue with its twofold strategy, by firm response to military confrontation with nK and maintaining flexible policy of tolerance in the areas of economy and ethnicity. Various strategic options to overcome nK's nuclear threats have been presented to ROK, whose possession of nuclear weapons have been difficult, and nK's nuclear capability is a real threat to ROK's national security. We must be able to respond to nK's nuclear threats strictly from ROK's national security perspective. This thesis aims to propose a response policy for nK's nuclear capability and nK's nuclear attack based on analysis of such nuclear damage, ROK Government's response posture against nK's nuclear threats, centered around ROK Government's non-military response posture.

  • PDF

Analysis of the Application Method of Cyber Security Control to Develop Regulatory Requirement for Digital Assets in NPP (원전디지털자산 사이버보안 규제 요건 개발을 위한 보안조치 적용 방안에 대한 분석)

  • Kim, In-kyung;Byun, Ye-eun;Kwon, Kook-heui
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1077-1088
    • /
    • 2019
  • As the cyber threats of nuclear power plants become more necessary to systematically prepare against the cyber attack, the international community and the domestic government are urged to apply proper security controls for Critical Digital Assets (CDA) through cyber security regulatory guidelines. In this study, we suggests the application of security controls to develop the regulatory requirements of the graded approach through the analysis of domestic and foreign cyber security regulation guidelines and best practices for digital assets directly related to nuclear accidents. In order to apply the regulatory requirements based on the consequence(impact of infringement) of the regulated facility, which is a basic consideration of the graded approach, we will classify two methods and describe details of each method. By reanalyzing existing security controls, it is introduced that the method of demanding digital assets directly related to accident to enhance security controls required for existing CDA or develop additional security controls and requiring minimum security controls for CDA that are not directly related to accident.