• Title/Summary/Keyword: SSL

Search Result 290, Processing Time 0.04 seconds

A study on the TELNET protocol supporting security functionalities (보안기능을 지원하는 TELNET 프로토콜에 관한 연구)

  • Seong, Jeong-Ki;Seo, Hye-In;Ahn, Jae-Won;Park, Seung-Peom;Kim, Eun-Gi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.637-639
    • /
    • 2015
  • TELNET은 사용자가 컴퓨터에 원격 접속할 때 사용하기 위한 프로토콜이다. TELNET은 사용자 계정과 비밀번호 등 모든 데이터를 평문으로 전송하여 기밀성과 무결성이 보장되지 않고 서버를 인증하는 과정이 없어 네트워크 공격에 취약하다는 문제가 있다. 이 문제를 해결하기 위해 Kerberos, SSL/TLS와 같은 보안 프로토콜 기반에서 TELNET을 동작시키거나 SSH을 통해 원격 접속하는 방법이 있다. 하지만 이 방법들은 별도의 보안 프로토콜이 필요하다는 단점이 있다. 본 논문에서는 추가적인 프로토콜을 사용하지 않고 TELNET 자체에서 보안 기능을 지원하는 STELNET(Secured TELNET)을 제안하였다. STELNET에서 클라이언트는 인증서와 전자서명을 이용하여 서버를 인증한다. 이후 서버와 클라이언트는 키 교환을 통해 공유된 키로 암호화 된 데이터와 HMAC을 전송한다. 결과적으로 STELNET은 신뢰하는 서버와의 접속을 지원해주고, 데이터의 암호화로 기밀성을 보장하며 HMAC을 사용하여 무결성을 보장한다.

Evolution of PKI Internet Banking in Korea

  • Park, Seungchul
    • International journal of advanced smart convergence
    • /
    • v.8 no.1
    • /
    • pp.44-57
    • /
    • 2019
  • Most banks in Korea have provided Internet banking services based on PKI(Public Key Infrastructure) certificates since the early 2000s when Internet banking began in Korea. To support PKI Internet banking, the Korean government backed the electronic signature law and supported the rapid spread of PKI-based Internet banking by regulating the application of PKI certificates to be compulsory in Internet banking until 2015. PKI Internet Banking in Korea has been developed as a pioneer in this field through many challenges and responses until its present success. Korea's PKI banking, which started with soft-token-based closed banking, has responded to various types of cyber attack attempts and promoted the transition to open banking by accepting various criticisms due to lack of compatibility with international standards. In order to improve the convenience and security of PKI Internet banking, various attempts have been made, such as biometric-integrated smartphone-based PKI authentication. In this paper, we primarily aim to share the experience and lessons of PKI banking by analyzing the evolution process of PKI Internet banking in Korea. It also has the purpose of presenting the challenges of Korea's PKI Internet banking and sharing its development vision.

An Experimental Study on the Structural Performance of Steel Beam with Opening Close to End Subjected to Cyclic Loading (반복하중을 받는 단부에 근접한 개구부를 갖는 강재보의 구조성능에 관한 실험적 연구)

  • Han, Dong-Ho
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.25 no.2
    • /
    • pp.66-73
    • /
    • 2021
  • In the existing study of steel beams with openings, openings are located at a location where the distance to the support point is equal to or greater than the section height. Considering the facilities using the openings in the steel beam, the distance from the opening to the support point may be closer than the height of the beam section. Therefore, research on this is needed. This study is an experimental study to understand the structural performance of beams with openings close to the ends subjected to Cyclic Loading. In addition, in this study, we want to understand the structural performance through experiments on beams with openings reinforced with vertical or horizontal steel plates.

An Experimental Study on the Structural Performance of Openings at End Steel Beams (강재 단순보 단부에 근접한 개구부의 구조성능에 관한 실험적 연구)

  • Han, Dong-Ho;Yoon, Sung-Kee
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.24 no.6
    • /
    • pp.138-145
    • /
    • 2020
  • This study was conducted to identify the structural performance of the opening in a location close to the support point in the perforated beam system of steel beams. In addition, structural performance was determined through experiments on reinforced openings using vertical and horizontal steel plates. In the steel simple beam, it was found that the opening was in a position closer to the support point, half the height of the steel beam (D/2), which was more appropriate than the height of the steel beam (D). In addition, the reinforcement effect of horizontal steel plate was greater than that of vertical steel plate reinforcement. Structural performance was improved when there was no gap between openings and steel plates.

Analysis and Suggest Problem about Internet Banking System Of domestic and foreign (국내외 인터넷 뱅킹 분석 및 문제점 제시)

  • Min, Kyung-Chel;Jang, Dong-Hoon;Jang, Seongsoo;Lim, Hun-Jung;chung, Tae-Myeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1225-1228
    • /
    • 2010
  • 최근 인터넷 뱅킹이 주요 국가들의 은행 거래 서비스에서 많은 비중을 차지하고 있다. 보안이 중요한 인터넷 뱅킹 분야에서 국내와 해외의 보안 방식을 비교하여 도출된 시사점을 적용한다면 더 안전한 시스템 설계에 바탕이 될 것이다. 따라서 본 논문에서는 국내와 해외의 인터넷 뱅킹 보안의 특징과 그 진행 과정을 살펴보았다. SSL/TLS(Secure Socket Layer/Transport Layer Security) 기술을 사용하는 외국 인터넷 뱅킹에 비해 공인인증서 체계를 채택한 국내 인터넷 뱅킹은 웹 브라우저에서 지원하지 않는 암호 알고리즘을 사용하기 위한 플러그인을 설치함으로써 사용자가 불편을 느끼며, 또한 이런 플러그인 때문에 인터넷 뱅킹을 이용할 수 있는 웹 브라우저의 종류가 제한된다. 마지막으로 이러한 플러그인을 은행 별로 서비스하기 위한 별도의 비용이 추가된다. 이런 문제점들을 해결하여 더 나은 인터넷 뱅킹 시스템을 구축하기 위해서는 면밀한 검증과 제도적 지원이 필요하다.

A Study on the Blocking of Commercial Mail Systems for the Prevention of Information Leakage in Public Institutions (공공기관 내부 정보유출 방지를 위한 상용메일시스템 차단 방안)

  • Kim, Seo-Hye;Kim, Do-hyun;Lee, Dae-sung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.195-197
    • /
    • 2022
  • In this paper, we intend to study the fundamental blocking methodology for the use of external commercial mail systems in the corporate internal Internet network, which is a common concern of public and administrative agencies. By checking the limitations of the blacklist-based blocking method used in the past, and by analyzing packet of the mail sending web page, the delimiter used for mail transmission is extracted, and the purpose is to monitor and block the leakage of intenal information of the company using whitelist technology.

  • PDF

A study on Seamless Security Connection of Web Services for Mobile Environment (모바일 환경을 위한 웹 서비스의 무단절 보안 연결에 관한 연구)

  • Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.41-49
    • /
    • 2008
  • Other server based-application and the need of more complex interaction is required with functional strengthening and variational uses of mobile device. And mobile environments make a problem of continuous of web-service by making a problem of instance cutting between web-server and mobile device which acts as a client because of mobility. Therefore, this paper embodies a framework which keeps security and connectivity between HTTP based web-service and mobile device, and is for connection to web-service of mobile device which uses WAP in a standard protocol based mobile environment of mobile web-service for continuous web-service. This paper is analyzed in the same standard condition to compared functional delay which is based on HTTP and WAP access, and data transmission volume. Also it investigates improvement of execution overhead which is brought by interaction process.

  • PDF

Rheological Properties of Dough and Quality Characteristics of Bread Added with Silkworm Powder (누에가루 첨가 반죽의 물성 변화 및 빵의 품질 특성)

  • Kim, Young-Ho;Cho, Nam-Ji;Im, Moo-Hyeog
    • Korean Journal of Food Science and Technology
    • /
    • v.37 no.3
    • /
    • pp.377-388
    • /
    • 2005
  • Effects of silkworm powder addition on rheological properties of dough and quality characteristics of bread were investigated. Protein content of silkworm powder was 53,98%, much higher than 12.46% of wheat powder, Crude fiber, fat, and pretense contents of silkworm powder were higher than those of wheat flour, Acid analysis revealed glutamic acid content was highest 4,046.16 mg thus, significant depreciation of breadmaking was expected due to weakened gluten structure or dough. Addition of silkworm powder(optimum at 2%) with pretense inactivated by heat treatment resulted in significant improvement of volume and bread quality, with external and internal scores close to those of the control.

Oil Price Forecasting Based on Machine Learning Techniques (기계학습기법에 기반한 국제 유가 예측 모델)

  • Park, Kang-Hee;Hou, Tianya;Shin, Hyun-Jung
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.37 no.1
    • /
    • pp.64-73
    • /
    • 2011
  • Oil price prediction is an important issue for the regulators of the government and the related industries. When employing the time series techniques for prediction, however, it becomes difficult and challenging since the behavior of the series of oil prices is dominated by quantitatively unexplained irregular external factors, e.g., supply- or demand-side shocks, political conflicts specific to events in the Middle East, and direct or indirect influences from other global economical indices, etc. Identifying and quantifying the relationship between oil price and those external factors may provide more relevant prediction than attempting to unclose the underlying structure of the series itself. Technically, this implies the prediction is to be based on the vectoral data on the degrees of the relationship rather than the series data. This paper proposes a novel method for time series prediction of using Semi-Supervised Learning that was originally designed only for the vector types of data. First, several time series of oil prices and other economical indices are transformed into the multiple dimensional vectors by the various types of technical indicators and the diverse combination of the indicator-specific hyper-parameters. Then, to avoid the curse of dimensionality and redundancy among the dimensions, the wellknown feature extraction techniques, PCA and NLPCA, are employed. With the extracted features, a timepointspecific similarity matrix of oil prices and other economical indices is built and finally, Semi-Supervised Learning generates one-timepoint-ahead prediction. The series of crude oil prices of West Texas Intermediate (WTI) was used to verify the proposed method, and the experiments showed promising results : 0.86 of the average AUC.

Montgomery Multiplier Base on Modified RBA and Hardware Architecture (변형된 RBA를 이용한 몽고메리 곱셈기와 하드웨어 구조)

  • Ji Sung-Yeon;Lim Dae-Sung;Jang Nam-Su;Kim Chang-Han;Lee Sang-Jin
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.351-355
    • /
    • 2006
  • RSA 암호 시스템은 IC카드, 모바일 및 WPKI, 전자화폐, SET, SSL 시스템 등에 많이 사용된다. RSA는 모듈러 지수승 연산을 통하여 수행되며, Montgomery 곱셈기를 사용하는 것이 효율적이라고 알려져 있다. Montgomery 곱셈기에서 임계 경로 지연 시간(Critical Path Delay)은 세 피연산자의 덧셈에 의존하고 캐리 전파를 효율적으로 처리하는 문제는 Montgomery 곱셈기의 효율성에 큰 영향을 미친다. 최근 캐리 전파를 제거하는 방법으로 캐리 저장 덧셈기(Carry Save Adder, CSA)를 사용하는 연구가 계속 되고 있다. McIvor외 세 명은 지수승 연산에 최적인 CSA 3단계로 구성된 Montgomery 곱셈기와 CSA 2단계로 구성된 Montgomery 곱셈기를 제안했다. 시간 복잡도 측면에서 후자는 전자에 비해 효율적이다. 본 논문에서는 후자보다 빠른 연산을 수행하기 위해 캐리 전파 제거 특성을 가진 이진 부호 자리(Signed-Digit, SD) 수 체계를 사용한다. 두 이진 SD 수의 덧셈을 수행하는 잉여 이진 덧셈기(Redundant Binary Adder, RBA)를 새로 제안하고 Montgomery 곱셈기에 적용한다. 기존의 RBA에서 사용하는 이진 SD 덧셈 규칙 대신 새로운 덧셈 규칙을 제안하고 삼성 STD130 $0.18{\mu}m$ 1.8V 표준 셀 라이브러리에서 지원하는 게이트들을 사용하여 설계하고 시뮬레이션 하였다. 그 결과 McIvor의 2 방법과 기존의 RBA보다 최소 12.46%의 속도 향상을 보였다.

  • PDF