• Title/Summary/Keyword: Security Knowledge

Search Result 792, Processing Time 0.027 seconds

Zero-knowledge proof based authentication protocol in ad-hoc wireless network (Ad-hoc wireless network에서의 authentication을 보장하는 zero-knowledge proof 기반의 프로토콜)

  • 윤여원;예흥진
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.473-476
    • /
    • 2002
  • 본 논문에서는 ad-hoc wireless network에서 상호간의 사전지식 없이 상대편을 authenticate하는 프로토콜을 제시한다. 기존에 Dirk Balfanz et al에 의해 제시된 변형된interactive Guy Fawkes protocol은 해쉬함수의, 전달하고자 하는 메시지와 그 authenticator의 해쉬값을 보내고, 다음 단계에서 그 원본을 밝히는 원리를 이용한 것으로, PKI 없이 해쉬함수 만으로 상호인증과 메시지의 무결성을 보장함으로써 전반적인 ID 체계와 public key encryption, decryption 연산에 대한 부담을 덜었다. 하지만, 이것은 여전히 eavesdropping같은 passive attack에 노출되어 있다[1]. 본 논문에서는 zero-knowledge 기반의 프로토콜을 이용하여 상호 정보를 교환할 수 없는 환경에서도 안전하게 상호 authentication을 가능하게 하는 방법을 제시한다.

  • PDF

SECURE IDENTIFICATION AND SIGNATURE USING ZERO-KNOWLEDGE PROOFS AND BILINEAR PAIRINGS

  • Choi, Byung Mun;Lee, Young Whan
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.21 no.3
    • /
    • pp.403-411
    • /
    • 2008
  • In 2005, A. Saxena, B. Soh and S. Priymak [10] proposed a two-flow blind identification protocol. But it has a weakness of the active-intruder attack and uses the pairing operation that causes slow implementation in smart cards. In 2008, Y. W. Lee [9] made a method of the active-intruder attack on their identification scheme and proposed a new zero-knowledge blind identification protocol for smart cards. In this paper, we give more simple and fast protocols than above protocols such that the prover using computationally limited devices such as smart cards has no need of computing the bilinear pairings. Computing the bilinear pairings is needed only for the verifier and is secure assuming the hardness of the Discrete-Logarithm Problem (DLP).

  • PDF

Effect of Potential Model Pruning on Official-Sized Board in Monte-Carlo GO

  • Oshima-So, Makoto
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.54-60
    • /
    • 2021
  • Monte-Carlo GO is a computer GO program that is sufficiently competent without using knowledge expressions of IGO. Although it is computationally intensive, the computational complexity can be reduced by properly pruning the IGO game tree. Here, I achieve this by using a potential model based on the knowledge expressions of IGO. The potential model treats GO stones as potentials. A specific potential distribution on the GO board results from a unique arrangement of stones on the board. Pruning using the potential model categorizes legal moves into effective and ineffective moves in accordance with the potential threshold. Here, certain pruning strategies based on potentials and potential gradients are experimentally evaluated. For different-sized boards, including an official-sized board, the effects of pruning strategies are evaluated in terms of their robustness. I successfully demonstrate pruning using a potential model to reduce the computational complexity of GO as well as the robustness of this effect across different-sized boards.

The Extent of Ordinary Classrooms Teachers' Knowledge and Perception of Attention Deficit Hyperactivity Disorder (ADHD)

  • Talafha, Abdulhameed Hasan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.413-422
    • /
    • 2022
  • The present study aimed to investigate the extent to which ordinary classrooms teachers are informed are familiar with Attention Deficit Hyperactivity Disorder 'ADHD'. The researcher adopted the descriptive approach. The sample of the study consisted of (89) male and female teachers who teach students from grade (1) to grade (6) at public primary schools in Northern Mazar Directorate of Education in Jordan. A questionnaire was employed as the primary tool for collecting the data. The findings of the current study indicated an average level of knowledge of ordinary classroom teachers about ADHD. The findings also indicated that there were no statistically significant differences in the extent of ordinary classroom teachers' knowledge of ADHD due to the variables (gender, qualification, professional experience, grade level being taught).

The Extent of Ordinary Classrooms Teachers' Knowledge and Perception of Attention Deficit Hyperactivity Disorder (ADHD)

  • Talafha, Abdulhameed Hasan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.127-136
    • /
    • 2022
  • The present study aimed to investigate the extent to which ordinary classrooms teachers are informed are familiar with Attention Deficit Hyperactivity Disorder 'ADHD'. The researcher adopted the descriptive approach. The sample of the study consisted of (89) male and female teachers who teach students from grade (1) to grade (6) at public primary schools in Northern Mazar Directorate of Education in Jordan. A questionnaire was employed as the primary tool for collecting the data. The findings of the current study indicated an average level of knowledge of ordinary classroom teachers about ADHD. The findings also indicated that there were no statistically significant differences in the extent of ordinary classroom teachers' knowledge of ADHD due to the variables (gender, qualification, professional experience, grade level being taught).

Activity Led Learning as Pedagogy for Digital Forensics

  • Shaik Shakeel Ahamad
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.134-138
    • /
    • 2023
  • The field of digital forensics requires good theoretical and practical knowledge, so practitioners should have an in-depth understanding and knowledge of both theory and practical as they need to take decisions which impacts human lives. With the demand and advancements in the realm of digital forensics, many universities around the globe are offering digital forensics programs, but there is a huge gap between the skills acquired by the student's and the market needs. This research work explores the problems faced by digital forensics programs, and provides solution to overcome the gap between the skills acquired by the student's and the market needs using Activity led learning pedagogy for digital forensics programs.

Designing demand side education of information security professionals (수요자 중심의 정보보호 전문 인력 양성을 위한 교육과정 설계)

  • Lee, Jong Lark
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.99-106
    • /
    • 2013
  • There has been a lot of growth more than 10% in the information security industry. In accordance with the industrial growth, it increased needs for the information security manpower development as a national problem. But there is an imbalance between demand and supply of the information security manpower in terms of the quantity and quality. It is mainly caused by the curriculum of the information security is made considering for suppliers not for demanders. As a resolution to solve this problem, we suggest the curriculum of information security for vocational education and training. As the information security area is wide in view of required knowledge and technology, we design the curriculum by selecting major occupation type from the information security manpower distribution and products and then by investigating the job description using NCS(National Competency Standard). And we compared the curriculum to that of two or three year diploma courses in Korea.

A Design on Information Security Core Knowledge for Security Experts by Occupational Classification Framework (보안전문인력 양성을 위한 직업분류체계별 정보보호 핵심지식 설계)

  • Lee, Hyojik;Na, Onechul;Sung, Soyoung;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.113-125
    • /
    • 2015
  • Information Security Incidents that have recently happen rapidly spread and the scale of that incidents' damage is large. In addition, as it proceeds to the era of converged industry in the future environment and the virtual cyber world expands to the physical world, new types of security threats have occurred. Now, it is time to supply security professionals who have a multi-dimensional security capabilities that can manage the strategies of technological security and physical security from the management point of view, rather than the ones who primarily focus on the traditional technologic-centered strategies to solve new types of security threats. In conclusion, in this paper we try to produce the curriculum of information security featured in the occupational classification system and analyze the subjects that are additionally required for those who move to other occupations to cultivate security professionals who suited to the converged-industrial environment. It is expected that multi-dimensional security professionals who suited to the converged-industrial environment will be cultivated by harmoniously integrating information security subjects from technological and business/managerial perspectives, and education training courses will be developed that effectively provide core knowledges per occupational classification when people moves to other occupations in the areas of information security.

The Research for Cyber Security Experts (사이버보안 전문가 양성을 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1137-1142
    • /
    • 2017
  • Cyber hacking attacks and cyber terrorism are damaging to the lives of the people, and in the end, national security is threatened. Cyber-hacking attacks leaked nuclear power cooling system design drawings, cyber accidents such as hacking of Cheongwadae's homepage and hacking of KBS stations occurred. The Act on Information and Communication Infrastructure Protection, Promotion of Information and Communication Network Utilization and Information Protection, and the Personal Information Protection Act remove the responsibility for cyber attacks, but it is difficult to prevent attacks by hackers armed with new technologies. This paper studies the development of cyber security experts for cyber security. Build a Knowledge Data Base for cyber security professionals. Web hacking, System hacking, and Network hacking technologies and evaluation. Through researches on the operation and acquisition of cyber security expert certification, we hope to help nurture cyber security experts for national cyber security.

Development of Skills Framework for Information Security Workforce (정보보호 분야 직무체계 개발)

  • Jun, Hyo-Jung;Kim, Tae-Sung;Yoo, Jin-Ho;Gee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.143-152
    • /
    • 2009
  • Successful industries that have maintained their competitiveness are characterized by well-established skills framework system. Skills framework establishes the agreed-upon, industry-identified knowledge, skills and abilities required to succeed in the workplace. Skills framework forms a solid foundation for the development of outcomes-based instruction and assessment, thus it benefits industry, students, educators and government. Each group has a major stake in the education of our students and in the efficient development of a productive workforce. Particularly in fast-changing fields like information security, relevant data that accurately reflect current and future knowledge and skills enable timely direction of resources, development and revision of industry-relevant curriculum, and efficient development of career information and job profiles. Skills framework occupies an indispensable position in any dialog concerning education or training in technical fields. In this study, we develop the skills framework for information security professionals.