• Title/Summary/Keyword: Security White Paper

Search Result 63, Processing Time 0.025 seconds

The Trend and Implications of the Publication of China's Defense and Security White Papers (중국의 국방·안보백서 발간의 추이와 함의)

  • Kim, Kang-nyeong
    • Korea and Global Affairs
    • /
    • v.3 no.1
    • /
    • pp.39-76
    • /
    • 2019
  • This paper is to analyze the trend and implications of the publication of China's defense and security white papers. To this end the paper is composed of 5 chapters titled instruction; publication details and composition of China's defense and security white paper; the gist of the white paper on national defense and security during the Chinese president Xi Jinping era; the implications of Chinese white paper on national defense and security during the Chinese president Xi Jinping era; and conclusion. The Chinese Ministry of National Defense had published seven books every two years since 1998 to 2010. In 1995, the ministry published a white paper titled 'China's arms control and disarmament' for the first time. In 2013, it published a white paper titled 'The Diversified Employment of China's Armed Forces' and 'China's Military Strategy' in 2015. All have the common characteristic of being a propaganda policy reflecting China's strategic calculations. It seems that China has began to publish defense white papers in a proactive manner, due to the following factors: (1)pressure on China to demand military transparency from neighboring countries such as the United States; (2)the erosion of the 'China threat.' and (3)confidence in the achievement of China's military modernization. The 'active defensive strategy' and the 'strong defense strategy' of Si Jinping are implied in the words "China's dream is a dream of a powerful country and dream of a strong nation is essential to construct a strong nation." His these strategies have raised security concerns for neighboring countries. We need to maintain and reinforce strong ROK-US security cooperation, and hedging strategies to harmoniously promote ROK-China economic cooperation.

The Necessity and Development Direction of the ROK's Maritime Security Strategy White Paper (한국의 해양안보전략서의 필요성과 발전방향)

  • Kim, Kang-nyeong
    • Strategy21
    • /
    • s.45
    • /
    • pp.148-187
    • /
    • 2019
  • This paper is to analyse the necessity and development direction of the ROK's maritime security strategy white paper. To this end the paper is composed of 5 chapters titled introduction; the necessity of the ROK's maritime security strategy white paper; the ROK's actual situation in relation to maritime security strategy and cases of major advanced oceanic countries; the vision, goals, strategic tasks, and implementation system of the ROK's 'national maritime security strategy'; and conclusion. The achievement of the national marine strategic vision, such as the 'Ocean G5,' is of course possible when Korea can maintain and strengthen the maritime safety and maritime security of the people. The Sewol Ferry incident reminds us that we need a 'national maritime security strategy white paper' like the advanced marine countries. In order for the national maritime security strategy to be carried our efficiently, as in advanced oceanic countries, mere should be a dedicated department with sufficient authority and status to mobilize the cooperation of related organizations including naval-coastal cooperation. It would be good to set up a tentatively named Maritime Security Council, an organization of minister-level officials involved under the National Security Council, and an executive body composed of working-level officials from related ministries. In order to successfully carry out the national maritime security strategy for the maritime safety and maritime security of the people like the United States and the United Kingdom, we need to further strengthen our domestic cooperation and cooperation system, international cooperation, and maritime security. We have to promote the establishment and promotion of maritime security strategies by the Navy; strengthening the operational link between the Navy and the Coast Guard; strengthening the maritime surveillance capability at the national level, and promoting sharing with the private sector, etc.

New Higher-Order Differential Computation Analysis on Masked White-Box AES (마스킹 화이트 박스 AES에 대한 새로운 고차 차분 계산 분석 기법)

  • Lee, Yechan;Jin, Sunghyun;Kim, Hanbit;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.1-15
    • /
    • 2020
  • As differential computation analysis attack(DCA) which is context of side-channel analysis on white-box cryptography is proposed, masking white-box cryptography based on table encoding has been proposed by Lee et al. to counter DCA. Existing higher-order DCA for the masked white box cryptography did not consider the masking implementation structure based on table encoding, so it is impossible to apply this attack on the countermeasure suggested by Lee et al. In this paper, we propose a new higher-order DCA method that can be applied to the implementation of masking based on table encoding, and prove its effectiveness by finding secret key information of masking white-box cryptography suggested by Lee et al. in practice.

A White-box ARIA Implementation (화이트박스 ARIA 구현)

  • Hong Tae Kim
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.69-76
    • /
    • 2024
  • The white-box implementation is a cryptographic technique used to protect the secret key of a cryptographic system. It is primarily employed for digital rights management for music and videos. Since 2002, numerous white-box implementations have been developed to ensure secure digital rights management. These have been applied to AES and DES. ARIA, a 128-bit block cipher with an involution substitution and permutation network (SPN), was selected as a South Korean standard in 2004. In this paper, we propose the first white-box ARIA implementation. Our implementation consists of 7,696 lookup tables, with a total size of 1,984 KB. We demonstrate that it also has considerable white-box diversity and white-box ambiguity from a security perspective.

A White Box Implementation of Lightweight Block Cipher PIPO (경량 블록 암호 PIPO의 화이트박스 구현 기법)

  • Ham, Eunji;Lee, Youngdo;Yoon, Kisoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.751-763
    • /
    • 2022
  • With the recent increase in spending growth in the IoT sector worldwide, the importance of lightweight block ciphers to encrypt them is also increasing. The lightweight block cipher PIPO algorithm proposed in ICISC 2020 is an SPN-structured cipher using an unbalanced bridge structure. The white box attack model refers to a state in which an attacker may know the intermediate value of the encryption operation. As a technique to cope with this, Chow et al. proposed a white box implementation technique and applied it to DES and AES in 2002. In this paper, we propose a white box PIPO applying a white box implementation to a lightweight block cipher PIPO algorithm. In the white box PIPO, the size of the table decreased by about 5.8 times and the calculation time decreased by about 17 times compared to the white box AES proposed by Chow and others. In addition, white box PIPO was used for mobile security products, and experimental results for each test case according to the scope of application are presented.

Holographic image encryption and decoding scheme (홀로그래픽 영상 암호화 및 디코딩 기법)

  • 양훈기;정대섭;김은수
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.33A no.12
    • /
    • pp.97-103
    • /
    • 1996
  • This paper presents a new security verification technique based on an image encryption by a white noise image that serves as an encryption key. In the proposed method that resembles holographic process, the encryption process is executed digitally using FFT routine which gives chances for separating corruptive noise from reconstructed primary image The encoded image thus obtained is regarded as an nterference pattern caused by two lightwaves transmitted through the primary image and the white noise image. The decoding process is executed optically and in real-tiem fashion where lightwave transmitted through the white noise image illuminates the encrypted card.

  • PDF

White Blood Cell Types Classification Using Deep Learning Models

  • Bagido, Rufaidah Ali;Alzahrani, Manar;Arif, Muhammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.223-229
    • /
    • 2021
  • Classification of different blood cell types is an essential task for human's medical treatment. The white blood cells have different types of cells. Counting total White Blood Cells (WBC) and differential of the WBC types are required by the physicians to diagnose the disease correctly. This paper used transfer learning methods to the pre-trained deep learning models to classify different WBCs. The best pre-trained model was Inception ResNetV2 with Adam optimizer that produced classification accuracy of 98.4% for the dataset comprising four types of WBCs.

White-Box AES Implementation Revisited

  • Baek, Chung Hun;Cheon, Jung Hee;Hong, Hyunsook
    • Journal of Communications and Networks
    • /
    • v.18 no.3
    • /
    • pp.273-287
    • /
    • 2016
  • White-box cryptography presented by Chow et al. is an obfuscation technique for protecting secret keys in software implementations even if an adversary has full access to the implementation of the encryption algorithm and full control over its execution platforms. Despite its practical importance, progress has not been substantial. In fact, it is repeated that as a proposal for a white-box implementation is reported, an attack of lower complexity is soon announced. This is mainly because most cryptanalytic methods target specific implementations, and there is no general attack tool for white-box cryptography. In this paper, we present an analytic toolbox on white-box implementations of the Chow et al.'s style using lookup tables. According to our toolbox, for a substitution-linear transformation cipher on n bits with S-boxes on m bits, the complexity for recovering the $$O\((3n/max(m_Q,m))2^{3max(m_Q,m)}+2min\{(n/m)L^{m+3}2^{2m},\;(n/m)L^32^{3m}+n{\log}L{\cdot}2^{L/2}\}\)$$, where $m_Q$ is the input size of nonlinear encodings,$m_A$ is the minimized block size of linear encodings, and $L=lcm(m_A,m_Q)$. As a result, a white-box implementation in the Chow et al.'s framework has complexity at most $O\(min\{(2^{2m}/m)n^{m+4},\;n{\log}n{\cdot}2^{n/2}\}\)$ which is much less than $2^n$. To overcome this, we introduce an idea that obfuscates two advanced encryption standard (AES)-128 ciphers at once with input/output encoding on 256 bits. To reduce storage, we use a sparse unsplit input encoding. As a result, our white-box AES implementation has up to 110-bit security against our toolbox, close to that of the original cipher. More generally, we may consider a white-box implementation of the t parallel encryption of AES to increase security.

A Study of an Anomalous Event Detection using White-List on Control Networks (제어망에서 화이트 리스트 기법을 이용한 이상 징후 탐지에 관한 연구)

  • Lee, DongHwi;Choi, KyongHo
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.77-84
    • /
    • 2012
  • The control network has been operated in a closed. But it changes to open to external for business convenience and cooperation with several organizations. As the way of connecting with user extends, the risk of control network gets high. Thus, in this paper, proposed the technique of an anomalous event detection using white-list for control network security and minimizing the cyber threats. The proposed method can be collected and cataloged of only normal data from traffic of internal network, control network and field devices. Through way to check the this situation, we can separate normal and abnormal behavior.

Conditional Re-encoding Method for Cryptanalysis-Resistant White-Box AES

  • Lee, Seungkwang;Choi, Dooho;Choi, Yong-Je
    • ETRI Journal
    • /
    • v.37 no.5
    • /
    • pp.1012-1022
    • /
    • 2015
  • Conventional cryptographic algorithms are not sufficient to protect secret keys and data in white-box environments, where an attacker has full visibility and control over an executing software code. For this reason, cryptographic algorithms have been redesigned to be resistant to white-box attacks. The first white-box AES (WB-AES) implementation was thought to provide reliable security in that all brute force attacks are infeasible even in white-box environments; however, this proved not to be the case. In particular, Billet and others presented a cryptanalysis of WB-AES with 230 time complexity, and Michiels and others generalized it for all substitution-linear transformation ciphers. Recently, a collision-based cryptanalysis was also reported. In this paper, we revisit Chow and others's first WB-AES implementation and present a conditional re-encoding method for cryptanalysis protection. The experimental results show that there is approximately a 57% increase in the memory requirement and a 20% increase in execution speed.