• Title/Summary/Keyword: Private key

Search Result 687, Processing Time 0.024 seconds

A Study on Alcoholics Living like a Family in the Jokbang Village: Focusing on 'Relationship' and 'Emotional Bond' (가족처럼 살아가는 쪽방촌 알코올 의존자들의 일상 탐구: '관계'와 '유대감'을 중심으로)

  • Choi, Mi Kyung;Sang, Chong Ryel
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.5
    • /
    • pp.235-242
    • /
    • 2019
  • we explored the case of 'H-Community', a private organization that supports alcohol-dependent homeless people living in the Jokbang village, based on the awareness that "the key to social assistance for alcohol-dependent homeless may be an influential relationship to replace the role of their families." The data collection and analysis followed the research that Spradley presented, and the result was 'living in the balance rather than the great affection'. However, the density of the relationship and emotional bond appeared different, which had something to do with their respective life processes and their health, age and economic conditions. These differences were categorized and suggested as arguments through 'a family-alternative relationship', 'emotional bond' and 'participation'. Based on the results, the conclusions presented the implications needed for alcohol-dependent homeless people.

Military Application of Two-factor Authentication to Data Leakage and Access Prevention (데이터 유출 및 접근방지를 위한 이중 인증방식의 군(軍) 적용방안)

  • Jung, Ui Seob;Kim, Jee Won;Kim, Jae Hyun;Jeong, Chan ki
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.21-27
    • /
    • 2018
  • Most of the Internet users in Korea are issued certificates and use them for various tasks. For this reason, it is recommended that accredited certification authorities and security related companies and use public certificates on USB memory and portable storage devices rather than on the user's desktop. Despite these efforts, the hacking of the certificate has been continuously occurring and the financial damage has been continuing. Also, for security reasons, our military has disabled USB to general military users. Therefore, this study proposes a two-factor method using the unique information of the USB memory and the PC which is owned by the user, and suggests a method of managing the private key file secure to the general user. Furthermore, it will be applied to national defense to contribute to the prevention of important data and prevention of access by unauthorized persons.

  • PDF

Exploring Discourse and Issue on the Policy of England Greenbelt - Delivering Opportunities for Housing Development and Recreation - (잉글랜드 그린벨트 정책 담론과 쟁점 분석 - 주택 개발과 여가 기회를 중심으로 -)

  • Nam, Jin-Vo
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.24 no.3
    • /
    • pp.1-18
    • /
    • 2021
  • England's green belt policy as it delivered its framework to designating the development restriction zones(DRZ) in Korea is the key to address issues which try to change green belt boundary or/and housing development. Therefore it should necessarily be reviewed on the understanding of how England has been formulating a national policy to deal with the issues focusing on opportunities for housing development and recreation. This study explored the discourse and framework of England's green belt policy as well as driver changes of housing development and recreation. Results show several characteristics of England's green belt policy which are civil society consensus on conservation and management, limited small-scale housing development through management of release rates, a systematic procedure for application and approval, open-recreation space expansion and utilisation under the premise of conservation of natural green areas, and management structure by the involvement of NGO organisations. Therefore, five suggestions can be delivered to developing Korea's DRZ frameworks: first, preceding social consensus on the preservation value of development-restricted zones, second, addressing housing shortages in different alternatives e.g.) environmental-friendly small-scale housing, third, institutionalising the total proportion of release, fourth, establishing an open-recreation space, fifth, introducing expanded public-private partnerships. Ultimately securing the legitimacy of the nation's development-restricted zone system can contribute positively to the environment preservation and human health by promoting public leisure activities in terms of the recent increase in external activities caused by the Covid-19 crisis. Concluding remarks are here that the understanding of England's green belt policy can be delivered to and help formulate domestic policy addressing current issues.

Non-Interactive Oblivious Transfer Protocol based on EIGamal in WAP (WAP에서 사용 가능한 ElGamal 기반의 비대화형 불확정 전송 프로토콜)

  • 정경숙;홍석미;정태충
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.11-18
    • /
    • 2003
  • As the Internet moves to mobile environment, one of the most serious problems for the security is to required a new security Protocol with safety and efficiency. To solve the problem. we Propose a new Protocol that reduces the communication franc and solves the problem associated with the private security keys supplied by the trusted third party. The protocol is a non-Interactive oblivious transfer protocol, based on the EIGamal public-key algorithm. Due to its Non-Interactive oblivious transfer protocol, it can effectively reduce communication traffic in server-client environment. And it is also possible to increase the efficiency of protocol through the mechanism that authentication probability becomes lower utilizing a challenge selection bit. The protocol complexity becomes higher because it utilizes double exponentiation. This means that the protocol is difficult rather than the existing discrete logarithm or factorization in prime factors. Therefore this can raise the stability of protocol.

Security Analysis of ElGamal-Type Signature Scheme Using Integer Decomposition (정수의 분해를 이용한 ElGamal형 서명기법의 안전성 분석)

  • 이익권;김동렬
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.15-22
    • /
    • 2004
  • For an ElGamal-type signature scheme using a generate g of order q, it has been well-known that the message nonce should be chosen randomly in the interval (0, q-1) for each message to be signed. In (2), H. Kuwakado and H. Tanaka proposed a polynomial time algorithm that gives the private key of the signer if two signatures with message nonces 0<$k_1$, $k_2$$\leq$Ο(equation omitted) are available. Recently, R. Gallant, R. Lambert, and S. Vanstone suggested a method to improve the efficiency of elliptic curve crytosystem using integer decomposition. In this paper, by applying the integer decomposition method to the algorithm proposed by Kuwakado and Tanaka, we extend the algorithm to work in the case when |$k_1$ |,|$k_2$, |$\leq$Ο(equation mitted) and improve the efficiency and completeness of the algorithm.

A Study on Timeliness Advance Increment of Certificate Verification Using an Observer (Observer를 이용한 인증서 검증의 적시성 증대에 관한 연구)

  • 권오인;김진철;오영환
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.25-37
    • /
    • 2004
  • A certificate is expected to use for its entire validity period. However, a false information record of user and compromise of private key may cause a certificate to become invalid prior to the expiration of the validity period. The CA needs to revoke the certificate. The CA periodically updates a signed data structure called a certificate revocation list(CRL) at directory server. but as CA updates a new CRL at directory server. the user can use a revoked certificate. Not only does this paper analyzes a structure of CRL and a characteristic of certificate status conviction, OCSP method but also it proposes a new certificate status verification method adding an observer information in handshake process between user and server.

Message Authentication Code based on k-invertible Matrices (k-역행렬을 이용한 메시지 인증 기법)

  • Lee Hee Jung;Kim Tae Gwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.105-110
    • /
    • 2004
  • MAC is used for data origin authentication or message integrity protection. In Crypto'03 Cary and Venkatesan introduced new MAC based on unimodular matrix groups. It is to encrypt messages using private keys and to encrypt them again using public keys which are matrices whose determinants are $\pm$1. These matrices have property called k-invertible. This k effects on the collision probability of this new MAC. The smaller k is, the less collisions occur. Cary shows 6-invertible matrices, and 10-invertible matrices whose components are only 1, 0, -1. In this paper we figure out sufficient conditions about choosing 4 matrices among special 22 matrices. Also, we introduce 5-invertible matrices whose components are 1, 0, -1. Those have better efficiency and security.

PingPong 256 shuffling method with Image Encryption and Resistance to Various Noise (이미지 암호화 및 다양한 잡음에 내성을 갖춘 PingPong 256 Shuffling 방법)

  • Kim, Ki Hwan;Lee, Hoon Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.11
    • /
    • pp.1507-1518
    • /
    • 2020
  • High-quality images have a lot of information, so sensitive data is stored by encryption for private company, military etc. Encrypted images can only be decrypted with a secret key, but the original data cannot be retained when attacked by the Shear attack and Noise pollution attack techniques that overwrite some pixel data with arbitrary values. Important data is the more necessary a countermeasure for the recovery method against attack. In this paper, we propose a random number generator PingPong256 and a shuffling method that rearranges pixels to resist Shear attack and Noise pollution attack techniques so that image and video encryption can be performed more quickly. Next, the proposed PingPong256 was examined with SP800-22, tested for immunity to various noises, and verified whether the image to which the shuffling method was applied satisfies the Anti-shear attack and the Anti-noise pollution attack.

Impact of Self-Presentation Text of Airbnb Hosts on Listing Performance by Facility Type (Airbnb 숙소 유형에 따른 호스트의 자기소개 텍스트가 공유성과에 미치는 영향)

  • Sim, Ji Hwan;Kim, So Young;Chung, Yeojin
    • Knowledge Management Research
    • /
    • v.21 no.4
    • /
    • pp.157-173
    • /
    • 2020
  • In accommodation sharing economy, customers take a risk of uncertainty about product quality, which is an important factor affecting users' satisfaction. This risk can be lowered by the information disclosed by the facility provider. Self-presentation of the hosts can make a positive effect on listing performance by eliminating psychological distance through emotional interaction with users. This paper analyzed the self-presentation text provided by Airbnb hosts and found key aspects in the text. In order to extract the aspects from the text, host descriptions were separated into sentences and applied the Attention-Based Aspect Extraction method, an unsupervised neural attention model. Then, we investigated the relationship between aspects in the host description and the listing performance via linear regression models. In order to compare their impact between the three facility types(Entire home/apt, Private rooms, and Shared rooms), the interaction effects between the facility types and the aspect summaries were included in the model. We found that specific aspects had positive effects on the performance for each facility type, and provided implication on the marketing strategy to maximize the performance of the shared economy.

A High-Performance ECC Processor Supporting Multiple Field Sizes over GF(p) (GF(p) 상의 다중 체 크기를 지원하는 고성능 ECC 프로세서)

  • Choe, Jun-Yeong;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.419-426
    • /
    • 2021
  • A high-performance elliptic curve cryptography processor (HP-ECCP) was designed to support five field sizes of 192, 224, 256, 384 and 521 bits over GF(p) defined in NIST FIPS 186-2, and it provides eight modes of arithmetic operations including ECPSM, ECPA, ECPD, MA, MS, MM, MI and MD. In order to make the HP-ECCP resistant to side-channel attacks, a modified left-to-right binary algorithm was used, in which point addition and point doubling operations are uniformly performed regardless of the Hamming weight of private key used for ECPSM. In addition, Karatsuba-Ofman multiplication algorithm (KOMA), Lazy reduction and Nikhilam division algorithms were adopted for designing high-performance modular multiplier that is the core arithmetic block for elliptic curve point operations. The HP-ECCP synthesized using a 180-nm CMOS cell library occupied 620,846 gate equivalents with a clock frequency of 67 MHz, and it was evaluated that an ECPSM with a field size of 256 bits can be computed 2,200 times per second.