• 제목/요약/키워드: Security technologies

검색결과 1,856건 처리시간 0.028초

Comments on an Improved RFID Security Protocol for ISO/IEC WD 29167-6

  • Kang, You Sung;Choi, Dooho;Park, Dong-Jo
    • ETRI Journal
    • /
    • 제35권1호
    • /
    • pp.170-172
    • /
    • 2013
  • With the rapid progress of RFID security technologies, the international standard group ISO/IEC JTC 1/SC 31 is developing a few security technologies for RFID systems. One of the initial proposals is ISO/IEC working draft (WD) 29167-6. Recently, Song and others stated that Protocol 1 of ISO/IEC WD 29167-6 is vulnerable to a malicious adversary. However, their analysis comes from a misunderstanding regarding a communication parameter called Handle. In this letter, we point out that an adversary cannot obtain any sensitive information from intervening in Protocol 1.

미국 통신 분야 프라이버시 보호 사례를 통한 우리나라 적용 방안 (The Study on Electronic Communication Privacy Protection of United State)

  • 박은엽;임종인
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2006년도 하계학술대회
    • /
    • pp.631-634
    • /
    • 2006
  • 정보화 사회로 변하고 있는 지금 통신기술 역시 발전하고 있으며 음성통신 및 비음성통신(전자 매체를 통한 통신)의 활용도가 점점 증가하고 있고, 사용되는 정보의 양 역시 늘어나고 있다. 그러나 정보의 흐름이 대량화, 가속화됨에 따라 통신매체를 통해 각종 개인정보가 노출될 위험이 증가하고 있으며 이에 따라 개인의 프라이버시 역시 위협받고 있다. 본고에서는 통신기술의 발달과 개인의 통신비밀 보호를 어떻게 조화시킬 수 있는가를 미국의 사례를 통하여 알아보겠다.

  • PDF

Provably-Secure Public Auditing with Deduplication

  • Kim, Dongmin;Jeong, Ik Rae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권4호
    • /
    • pp.2219-2236
    • /
    • 2017
  • With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu's scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.

Differential Power Analysis on Countermeasures Using Binary Signed Digit Representations

  • Kim, Tae-Hyun;Han, Dong-Guk;Okeya, Katsuyuki;Lim, Jong-In
    • ETRI Journal
    • /
    • 제29권5호
    • /
    • pp.619-632
    • /
    • 2007
  • Side channel attacks are a very serious menace to embedded devices with cryptographic applications. To counteract such attacks many randomization techniques have been proposed. One efficient technique in elliptic curve cryptosystems randomizes addition chains with binary signed digit (BSD) representations of the secret key. However, when such countermeasures have been used alone, most of them have been broken by various simple power analysis attacks. In this paper, we consider combinations which can enhance the security of countermeasures using BSD representations by adding additional countermeasures. First, we propose several ways the improved countermeasures based on BSD representations can be attacked. In an actual statistical power analysis attack, the number of samples plays an important role. Therefore, we estimate the number of samples needed in the proposed attack.

  • PDF

ETRI AI 실행전략 7: AI로 인한 기술·사회적 역기능 방지 (ETRI AI Strategy #7: Preventing Technological and Social Dysfunction Caused by AI)

  • 김태완;최새솔;연승준
    • 전자통신동향분석
    • /
    • 제35권7호
    • /
    • pp.67-76
    • /
    • 2020
  • Because of the development and spread of artificial intelligence (AI) technology, new security threats and adverse AI functions have emerged as a real problem in the process of diversifying areas of use and introducing AI-based products and services to users. In response, it is necessary to develop new AI-based technologies in the field of information protection and security. This paper reviews topics such as domestic and international trends on false information detection technology, cyber security technology, and trust distribution platform technology, and it establishes the direction of the promotion of technology development. In addition, the development of international trends in ethical AI guidelines to ensure the human-centered ethical validity of AI development processes and final systems in parallel with technology development are analyzed and discussed. ETRI has developed AI policing technology, information protection, and security technologies as well as derived tasks and implementation strategies to prepare ethical AI development guidelines to ensure the reliability of AI based on its capabilities.

코드 서명 기술과 인증서 프로파일 연구 (Study of Code Signing Technology and Certificate Profile)

  • 이래;이동훈
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2003년도 동계학술대회
    • /
    • pp.21-27
    • /
    • 2003
  • 오늘날 많은 웹 페이지들이 제한적인 정보의 제공에서 벗어나 ActiveX Control이나 Java Applet과 같은 응용프로그램을 사용자 컴퓨터에 다운로드 하게 하여 다양한 서비스를 제공하고 있다. 이러한 과정에서 인터넷을 통해 다운로드 되는 소프트웨어에 대한 무결성과 배포자에 대한 신원 확인을 해주는 코드 서명 기술이 필요하게 되었다. 본 논문에서는 Microsoft사의 Authenticode와 Netscape의 Object Signing기술에 대하여 분석하고 이러한 코드 서명 기술을 국내 공개키 기반구조(PKI)에 적용하기 위한 인증서 프로파일을 제안한다.

  • PDF

위협 모델링을 이용한 자율 주행 환경 분석 (Analysis of Self-driving Environment Using Threat Modeling)

  • 박민주;이지은;박효정;임연섭
    • 융합보안논문지
    • /
    • 제22권2호
    • /
    • pp.77-90
    • /
    • 2022
  • 현재 국내외 자동차 기업들은 꾸준한 기술 개발을 통해 자율 주행 자동차 산업을 선도하고자 경쟁하고 있다. 이러한 자율 주행 기술은 자동차와 주행 도로 환경과 같이 사물 간의 다양한 연결 의존성을 가지면서 발전하고 있다. 따라서 자동차를 포함한 전체 자율 주행 환경 내에서 사이버 보안 취약점이 발생하기 쉬워지고 있으며, 이에 대한 대비책의 중요성이 커지고 있다. 본 논문에서는 자율 주행 자동차에서 발생할 수 있는 위협을 모델링하고, 자율 주행 자동차의 안전한 보안을 위해 점검이 필요한 요소들을 체크리스트로써 제안한다.

The Essence Of Pedagogical Technologies In Modern Education

  • Korets, Mykola;Popova, Alla;Sinenko, Oksana;Trynko, Olga;Karolop, Olena;Krasovskyi, Serhii
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.48-51
    • /
    • 2021
  • The article discusses the use of modern technologies in the learning process. It has been determined that the modern period of the development of society is characterized by a strong influence of computer technologies on it, a new education system is being formed, focused on entering the world information and educational space. This process is accompanied by significant changes in the pedagogical theory and practice of the educational process associated with making adjustments to the content of learning technologies, which should be adequate to modern technical capabilities, and contribute to the harmonious entry of a teenager into the information society. Computer technologies are designed to become not an additional "makeweight" in training, but an integral part of a holistic educational process, significantly increasing its effectiveness

Applying Information and Communication Technologies as A Scope of Teaching Activities and Visualization Techniques for Scientific Research

  • Viktoriya L. Pogrebnaya;Natalia O. Kodatska;Viktoriia D. Khurdei;Vitalii M. Razzhyvin;Lada Yu. Lichman;Hennadiy A. Senkevich
    • International Journal of Computer Science & Network Security
    • /
    • 제23권2호
    • /
    • pp.193-198
    • /
    • 2023
  • The article focuses on the areas of education activities in using techniques for teaching and learning with information and communication technologies (ICTs), researching and analyzing the available ICTs, gearing the technologies to the specific psychological and pedagogical conditions, independently building and modeling ICTs, enlarging and developing their use in the learning environment. The visualization of scientific research has been determined to be part of the educational support for building students' ICT competence during teaching and learning and is essential to the methodology culture. There have been specified main tasks for pedagogy technologies (PTs) to develop the skills of adaptability to the global digital space in students, their effective database operation and using the data bases as necessary elements for learning and as part of professional training for research. We provided rationalization for implementing the latest ICTs into the Ukrainian universities' curricula, as well as creating modern methods for using the technologies in the learning / teaching process and scientific activities.

모바일 인터넷 상의 보안 기법 연구 (Research of Security Methods based on Mobile Internet)

  • 이원구;이재광
    • 한국콘텐츠학회:학술대회논문집
    • /
    • 한국콘텐츠학회 2004년도 춘계 종합학술대회 논문집
    • /
    • pp.296-300
    • /
    • 2004
  • 본 논문에서는 모바일 인터넷에서 보안에 대해 논의한다. 무선 인터넷 사용자나 프로그램 및 네트워크 기술들이 지난 몇 년간 눈부시게 발전했다. 단말기의 제약사항으로 인하여 모바일 인터넷은 유선의 인터넷과 몇 가지 다른 구조를 가지고 있다. 무선 단말기가 갖는 제약 사항으로는 낮은 CPU 처리 능력, 제한된 메모리, 낮은 대역폭으로 유선과 같은 보안 서비스가 이뤄지지 않고 있다. 이를 해결하기 위한 보안 기법에 대해서 논의한다.

  • PDF