• Title/Summary/Keyword: Security Function

Search Result 1,555, Processing Time 0.033 seconds

Synthesizing a Boolean Function of an S-box with Integer Linear Programming (수리계획법을 이용한 S-box의 부울함수 합성)

  • 송정환;구본욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.49-59
    • /
    • 2004
  • Boolean function synthesize problem is to find a boolean expression with in/outputs of original function. This problem can be modeled into a 0-1 integer programming. In this paper, we find a boolean expressions of S-boxes of DES for an example, whose algebraic structure has been unknown for many years. The results of this paper can be used for efficient hardware implementation of a function and cryptanalysis using algebraic structure of a block cipher.

A Study on Security Requirements Specification in an Object-Oriented Development Environment (객체지향 개발환경에서의 보안 요구사항명세에 관한 연구)

  • Kim, Gi-Han;Chae, Soo-Young;Choi, Myeong-Ryeol;Park, Sang-Seo
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.67-73
    • /
    • 2005
  • Security requirements must be defined well to reduce software vulnerabilities in requirement specification phase. In this paper, we show how to specify security requirements in structured manner for object-oriented development methodology. Our method specifies security requirements through four phases: defining security objectives, identifying the threat, construct attack tree, and specifying security function. This method would help developers to specify security requirements and functions which software have to possess clearly and systematically.

  • PDF

The Implementation of Policy Management Tool Based on Network Security Policy Information Model (네트워크 보안 정책 정보 모델에 기반한 정책 관리 도구의 구현)

  • Kim, Geon-Lyang;Jang, Jong-Soo;Sohn, Sung-Won
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.775-782
    • /
    • 2002
  • This paper introduces Policy Management Tool which was implemented based on Policy Information Model in network suity system. Network security system consists of policy terror managing and sending policies to keep a specific domain from attackers and policy clients detecting and responding intrusion by using policies that policy server sends. Policies exchanged between policy server and policy client are saved in database in the form of directory through LDAP by using Policy Management Tool based on network security policy information model. NSPIM is an extended policy information model of IETF's PCIM and PCIMe, which enables network administrator to describe network security policies. Policy Management Tool based on NSPIM provides not only policy management function but also editing function using reusable object, automatic generation function of object name and blocking policy, and other convenient functions to user.

A Novel Watermarking using Cellular Automata Transform (셀룰러 오토마타 변환을 이용한 새로운 워터마킹)

  • Piao, Yong-Ri;Kim, Seok-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.155-158
    • /
    • 2008
  • In this paper, we propose a novel blind watermarking Method using 2D CAT (Two dimensional cellular automata transform). In our scheme, firstly, we obtain the gateway values to generate a dual-state, dual-coefficients basis function. Secondly, the basis function transforms images into cellular automata space. Lastly, we use the cellular automata transform coefficients to embed random noise watermark in the cover images. The proposed scheme allows only one 2D CAT basis function per gateway value. Since there are $2^{96}$ possible gateway values, better security is guaranteed. Moreover, the new method not only verifies higher fidelity than the existing method but also stronger stability on JPEG lossy compression, filtering, sharpening and noise through tests for robustness.

  • PDF

Improved An RFID Mutual Authentication Protocol Based on Hash Function (개선된 해시기반의 RFID 상호인증 프로토콜)

  • Shin, Ju-Seok;Oh, Se-Jin;Jeong, Cheol-Ho;Chung, Kyung-Ho;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3C
    • /
    • pp.241-250
    • /
    • 2012
  • In 2010, Jeon-Kim proposed HMAP(Hash-based Mutual Authentication Protocol for RFID Environment) to resolve a variety of problem related to security using Mutual authentication scheme, the hash function and secret key is used to update in RFID system. Jeon-Kim proved RMAP was safe for a variety of attacks including eavesdropping attacks through safety analysis. However, unlike the claims of the proposed protocol is vulnerable to next session of the secret key exposure due to eavesdropping. In this paper, we analyze the problem of RMAP and proves it through security analysis. And we also propose improved an RFID Mutual Authentication Protocol based on Hash Function to solve problems of HMAP.

Formalizing the Design, Evaluation, and Analysis of Quality of Protection in Wireless Networks

  • Lim, Sun-Hee;Yun, Seung-Hwan;Lim, Jong-In;Yi, Ok-Yeon
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.634-644
    • /
    • 2009
  • A diversity of wireless networks, with rapidly evolving wireless technology, are currently in service. Due to their innate physical layer vulnerability, wireless networks require enhanced security components. WLAN, WiBro, and UMTS have defined proper security components that meet standard security requirements. Extensive research has been conducted to enhance the security of individual wireless platforms, and we now have meaningful results at hand. However, with the advent of ubiquitous service, new horizontal platform service models with vertical crosslayer security are expected to be proposed. Research on synchronized security service and interoperability in a heterogeneous environment must be conducted. In heterogeneous environments, to design the balanced security components, quantitative evaluation model of security policy in wireless networks is required. To design appropriate evaluation method of security policies in heterogeneous wireless networks, we formalize the security properties in wireless networks. As the benefit of security protocols is indicated by the quality of protection (QoP), we improve the QoP model and evaluate hybrid security policy in heterogeneous wireless networks by applying to the QoP model. Deriving relative indicators from the positive impact of security points, and using these indicators to quantify a total reward function, this paper will help to assure the appropriate benchmark for combined security components in wireless networks.

A Study on the Isolated Cloud Security Using Next Generation Network

  • Park, Jae-Kyung;Lee, Won Joo;Lee, Kang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.11
    • /
    • pp.9-16
    • /
    • 2017
  • In this paper, we propose to present a model of cloud security that has emerged as the biggest topic of cloud computing, replacing the traditional IT environment. While cloud computing is an extension of existing IT technology, security issues and threats can be applied to traditional security technologies. However, the biggest difference between a typical computing environment and a cloud computing environment is a virtualized environment with a hypervisor. Currently, there are many weaknesses in the virtualized environment, and there are few related security products. In order for a cloud computing environment to function as a reliable IT environment, we expect more research on hypervisor-based security technologies, and we expect to secure safer cloud services through a secure model over the next generation of new-based networks.

The Study and Improvement of Boolean Function Property of MD5 Hash Function (MD5 해쉬함수의 부울함수 특성 고찰 및 개선)

  • 이원준;이국희;문상재
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1995.11a
    • /
    • pp.185-194
    • /
    • 1995
  • 일방성 해쉬함수는 임의 길이의 입력메세지를 일정한 길이의 출력메세지로 축약하는 함수로서, 디지탈서명에서 서명을 생성하는 시간을 단축하고 메세지 인증을 위한 암호학적 도구로 사용되고있다. 본 논문에서는 부울함수를 기초로 하는 해쉬함수 중에서 MD5의 부울함수를 정보이론의 관점에서 분석하여 암호학적으로 강하고 기존의 MD5에서 사용된 부울함수의 성질을 이용한 공격을 막을 수 있는 새로운 부울함수를 제안한다.

  • PDF

Some Properties on Existence of a Complete Function (완비함수의 존재성에 관한 몇가지 성질)

  • 이민섭
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.8 no.2
    • /
    • pp.3-12
    • /
    • 1998
  • 블럭암호의 비도는 S-box의 비도와 운영방식에 의존된다. S-box 의 비도는 이 한수의 성분함수인 Book함수의 비선형성, 상관면역위수, SAS, 균형성 등에 의존되며, S-box자체의 비선형성, 입력성부(또는 입력비트)에 대한 출력성분(또는 출력비트)의 독립성 등에 의존된다. 이와 같은 출력 성분의 독립성에 관한 개념의 하나가 완비성이다. 본 논문에서는 Galois 체 GF(2)위해 n차원 벡터공간 GF(2)$^{n}$ 에서 완비함수의 존재성에 관한 몇 가지 알고리즘과 완비함수가 만족하는 성질들을 조사하였다.

Analysis of Security Function of Smart Card & Requirement of Security Module (스마트카드의 보안 기능 및 사용자 보안 모듈의 요구사항에 관한 연구)

  • 김수진;안기범;문종철;윤혁중;원동호
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.68-71
    • /
    • 2002
  • 스마트카드는 휴대하기에 간편하고 사용하기에 편리하다는 장점으로 인해 세계 각국에서 전자상거래를 비롯한 다양한 분야에서 그 이용범위가 급속히 확대되고 있다. 현재 사용되고 있는 스마트카드가 자체적으로 어느 정도의 보안과 인증기능을 갖추고 있기는 하지만 아직까지 사용자 보안 모듈로서의 기능은 미비한 실정이다. 본 논문에서는 스마트카드가 가지고 있는 자체적 보안 특징과 기능적 보안 특징을 분석한 후, 이를 이용하여 스마트카드가 사용자 보안 모듈로 사용되기 위해 필요한 요구사항을 제안하고자 한다.

  • PDF