• Title/Summary/Keyword: SSL

Search Result 290, Processing Time 0.029 seconds

The Design of Improved Information Security Mechanism based on SSL(Secure Socket Layer) (SSL(Secure Socket Layer) 기반에서 향상된 정보보호 메커니즘의 설계)

  • Choi, Seong;You, Seong-Jin;Kim, Seong-Yeol;Chung, Il-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.04a
    • /
    • pp.318-323
    • /
    • 2000
  • The SSL(Secure Socket Layer) protocol is one of the mechanism widely used in the recent network system. The improved information security mechanism based on the SSL is designed in this paper. There are important four information security services. The first is the authentication service using the Certificate offered from the SSL(Secure Socket Layer), the second is the message confidentiality service using the DES encryption algorithm, the third is the message integrity service using Hash function, and the fourth is Non-repudiation service. Therefore, information could be transferred securely under the information security mechanism including Non-repudiation service especially designed in this paper.

  • PDF

Analysis of SSL Communication Process in CNG Crypto Library (CNG 암호 라이브러리에서의 SSL 통신과정 분석)

  • Lee, Kyungroul;Oh, Insu;Lee, Sun-Young;Yim, Kangbin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.5
    • /
    • pp.1027-1037
    • /
    • 2017
  • By a spread of utilizing environment of the CNG library, it is required to analyze its vulnerability. For this reason, in this paper, we analyzed SSL communication process in CNG library. This study is expected to draw vulnerabilities and security threats and improve security criteria for various applications to fully take advantage of the CNG library.

Method to Analyze Information Leakage Malware using SSL Communication in Android Platform

  • Cho, Gilsu;Kim, Sangwho;Ryou, Jaecheol
    • Journal of Internet Computing and Services
    • /
    • v.19 no.3
    • /
    • pp.1-6
    • /
    • 2018
  • Widely used around the world, smartphones contain many features and can store content such as contacts, photos, and videos. Information that can be leaked in proportion to the information that the smartphone can store has also been increased. In recent years, accidents such as personal information leakage have occurred frequently. Personal information leakage is happening in the Android environment, which accounts for more than half of the smartphone operating system market share. Analyzing malicious apps that leak information can tell you how to prevent information leakage. Malicious apps that leak information will send importantinformation to the hacker's (C & C) server, which will use network communication. Malicious apps that are emerging nowadays encrypt and transmit important information through SSL communication. In this case, it is difficult to knowwhat kind of information is exposed to network. Therefore, we suggest a method to analyze malicious apps when leak important information through SSL communication. In this paper, we identify the way malicious apps leak information. And we propose a method for analyzing information leaked by SSL communication. Data before encryption was confirmed in the device through SSL hooking and SSL Strip method.

Design and Implementation of Web-based Hierarchical Network Management System using SSL (SSL을 이용한 웹기반 계층적 네트워크 관리 시스템의 설계 및 구현)

  • 황일선;이명선;유기성;김종근;조강홍;정진욱
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.1-15
    • /
    • 2002
  • Network management system exchanges information between management servers to manage other network as well as local network for MSP(Management Service Provider) business. Because communication line that is used here is communication line that several users use, other user can steal a important information that are passed through communication line. For these information include important information of administrator or equipments, These information should be protected. Usually it is use much SSL to security of communication and it wish to protect information using SSL in communication between management servers' or communication between server and client at network management system to use much SSL for security of communication.

  • PDF

The Analysis of Semi-supervised Learning Technique of Deep Learning-based Classification Model (딥러닝 기반 분류 모델의 준 지도 학습 기법 분석)

  • Park, Jae Hyeon;Cho, Sung In
    • Journal of Broadcast Engineering
    • /
    • v.26 no.1
    • /
    • pp.79-87
    • /
    • 2021
  • In this paper, we analysis the semi-supervised learning (SSL), which is adopted in order to train a deep learning-based classification model using the small number of labeled data. The conventional SSL techniques can be categorized into consistency regularization, entropy-based, and pseudo labeling. First, we describe the algorithm of each SSL technique. In the experimental results, we evaluate the classification accuracy of each SSL technique varying the number of labeled data. Finally, based on the experimental results, we describe the limitations of SSL technique, and suggest the research direction to improve the classification performance of SSL.

Influence of sodium stearoyl-2-lactylate emulsifier on growth performance and nutrient digestibility of growing pig

  • Hoque, Md Raihanul;Kim, In Ho
    • Korean Journal of Agricultural Science
    • /
    • v.48 no.1
    • /
    • pp.95-101
    • /
    • 2021
  • This study investigated the influence of sodium stearoyl-2-lactylate (SSL) emulsifier on the growth performance and nutrient digestibility of growing pigs. For this 56-day long-duration experiment, 80 heads of cross-bred ([Landrace × Yorkshire] × Duroc) pigs with an initial body weight of 23.80 ± 4.87 kg were divided into two (2) treatment groups each fed a different diet: with and without an emulsifier. Each treatment group had 8 replication pens with 5 pigs per pen. Feed treatments were as follows: 1) CON: Basal diet, and 2) SSL: CON + 0.05% SSL. Body weight (BW), average daily gain (ADG), and feed conversion ratio (FCR) were measured for three periods: 0 - 4, 5 - 8, and 0 - 8 weeks. The nutrient digestibility parameters consisting of dry matter (DM) digestibility and nitrogen (N) digestibility were calculated on the 4th and 8th week. Based on the results, the SSL supplementation did not show any significant influence on the growth performance parameters during the 0 to 4 and 5 to 8 week phases. For the overall performance, only the FCR (p = 0.048) was significantly different in the emulsifier fed group (SSL) compared to the CON group (T1). DM and N digestibility was also not influenced by the SSL addition in the growing pig diet. Overall, the SSL supplementation showed a limited effect on the growth performance of growing pigs.

Effect of Emulsifiers on Properties of the Bread Made by the Dough Frozen after First Fermentation (유화제가 스펀지발효 후 냉동생지로 제조한 빵의 품질특성에 미치는 영향)

  • Lee, Jeong-Hoon;Choi, Doo-Ri;Lee, Joong-Keun;Lee, Si-Kyung
    • Applied Biological Chemistry
    • /
    • v.47 no.1
    • /
    • pp.107-112
    • /
    • 2004
  • This study was carried out to investigate properties of the bread prepared by applying emulsifiers to the frozen dough, Doughs made by the sponge and dough method with the sweet dough formula were quickly frozen at $-40^{\circ}C$ and stored for 6 weeks at $-20^{\circ}C$. The effects of emulsifiers on the number of yeast cells, the volume of the bread, the hardness and the quality evaluation were investigated after frozen doughs were thawed, fermented and baked every week. In the effect of the number of yeast cells, SSL 0.3% and DATEM 0,2% produced a more effective result than others during the freezing storage, The highest loaf volume was formed in bread supplemented with SSL 0,3% and DATEM 0,2%, In the moisture content, bread supplemented with SSL 0,5% showed the highest value, Bread supplemented with SSL 0,3% and DATEM 0,2% produced the lowest value of bread hardness and received the highest score in quality evaluation, In this study, the addition of SSL 0,3% and DATEM 0,2% in making frozen dough led to better bread quality as compared to others.

Attacking OpenSSL Shared Library Using Code Injection (코드 주입을 통한 OpenSSL 공유 라이브러리의 보안 취약점 공격)

  • Ahn, Woo-Hyun;Kim, Hyung-Su
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.4
    • /
    • pp.226-238
    • /
    • 2010
  • OpenSSL is an open-source library implementing SSL that is a secure communication protocol. However, the library has a severe vulnerability that its security information can be easily exposed to malicious software when the library is used in a form of shared library on Linux and UNIX operating systems. We propose a scheme to attack the vulnerability of the OpenSSL library. The scheme injects codes into a running client program to execute the following attacks on the vulnerability in a SSL handshake. First, when a client sends a server a list of cryptographic algorithms that the client is willing to support, our scheme replaces all algorithms in the list with a specific algorithm. Such a replacement causes the server to select the specific algorithm. Second, the scheme steals a key for data encryption and decryption when the key is generated. Then the key is sent to an outside attacker. After that, the outside attacker decrypts encrypted data that has been transmitted between the client and the server, using the specified algorithm and the key. To show that our scheme is realizable, we perform an experiment of collecting encrypted login data that an ftp client using the OpenSSL shared library sends its server and then decrypting the login data.

New Security Approaches for SSL/TLS Attacks Resistance in Practice (SSL/TLS 공격에 대한 신규 대응 방안)

  • Phuc, Tran Song Dat;Lee, Changhoon
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.169-185
    • /
    • 2017
  • Juliano Rizzo and Thai Duong, the authors of the BEAST attack [11, 12] on SSL, have proposed a new attack named CRIME [13] which is Compression Ratio Info-leak Made Easy. The CRIME exploits how data compression and encryption interact to discover secret information about the underlying encrypted data. Repeating this method allows an attacker to eventually decrypt the data and recover HTTP session cookies. This security weakness targets in SPDY and SSL/TLS compression. The attack becomes effective because the attacker is enable to choose different input data and observe the length of the encrypted data that comes out. Since Transport Layer Security (TLS) ensures integrity of data transmitted between two parties (server and client) and provides strong authentication for both parties, in the last few years, it has a wide range of attacks on SSL/TLS which have exploited various features in the TLS mechanism. In this paper, we will discuss about the CRIME and other versions of SSL/TLS attacks along with countermeasures, implementations. We also present direction for SSL/TLS attacks resistance in practice.

A Study on the Application of SSL for Wireless Internet Security (무선 인터넷 보안을 위한 SSL 활용 연구)

  • 김기욱;정경훈;김창수;장용호
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2001.11a
    • /
    • pp.690-694
    • /
    • 2001
  • 최근 무선 인터넷을 이용한 전자 상거래가 증가하고 있으며, 이에 따라 무선 인터넷 환경에서의 보안에 관한 관심이 집중하고 있다. 본 연구에서는 무선 인터넷 프로토콜 별 보안 서비스를 분석한 후, 현재 유선에서 많이 활용되고 있는 128bits SSL 보안 프로토콜을 무선에서 적용하기 위한 활용방안에 대해 연구한다. 그리고 무선 SSL-Proxy의 기능에서 다양한 응용 계층의 프로토콜과의 호환성 기능들에 대해 고찰한다.

  • PDF