• Title/Summary/Keyword: Security test

Search Result 1,256, Processing Time 0.035 seconds

Test Vector Generator of timing simulation for 224-bit ECDSA hardware (224비트 ECDSA 하드웨어 시간 시뮬레이션을 위한 테스트벡터 생성기)

  • Kim, Tae Hun;Jung, Seok Won
    • Journal of Internet of Things and Convergence
    • /
    • v.1 no.1
    • /
    • pp.33-38
    • /
    • 2015
  • Hardware are developed in various architecture. It is necessary to verifying value of variables in modules generated in each clock cycles for timing simulation. In this paper, a test vector generator in software type generates test vectors for timing simulation of 224-bit ECDSA hardware modules in developing stage. It provides test vectors with GUI format and text file format.

A study on effective primality test algorithms (효율적 소수성 검정 알고리즘들에 대한 비교ㆍ분석)

  • 이호정;송정환
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.299-306
    • /
    • 2003
  • 본 논문에서는 현재 사용되고 있는 소수성 검정 알고리즘의 효율성을 비교하여 효과적인 알고리즘 사용에 관한 방향을 제시하려 한다. 현재 가장 일반적으로 사용하고 있는 Miller-Rabin 소수성검정법(Miller-Rabin primality test)에 대하여, Miller-Rabin 소수성 검정법 이외에 다른 확률적 소수성 검정법으로 제안된 Frobenius-Grantham 소수성 검정법(Frobenius-Grantham primality test) 이 있다. 그러나 합성수 판별에 대한 확률적 우세함에도 불구하고, Miller-Rabin 소수성 검정법을 대체하고 있지 못하는 이유는 시간복잡도(time complexity)가 Randomized polynomial time이기 때문에 같은 확률에 대한 평균 실행 속도가 Miller-Rabin 소수성 검정법보다 크게 효율적이지 못하기 때문이다. 또한, 2002년 Manindra Agrawal이 제시한 AKS 알고리즘(AKS algorithm)은 최초의 다항식 시간내 결정적 소수성 검정법(Polynomial time deterministic primality test)이지만, 시간 복잡도에서 다항식의 차수가 높기 때문에 현재 사용되고 있는 확률적 소수성 검정법(Probabilistic primality test)을 대체하지 못할 것으로 사료된다. 본 논문에서는 최근 발표된 소수성 검정법인 Frobenius-Grantham 소수성 검정법, AKS 알고리즘과 기존의 Miller-Rabin 소수성 검정법의 장단점을 비교·분석해 보고자 한다.

  • PDF

Developing a Model for Crime Prevention Hardware Performance Test and Certification System (방범하드웨어의 침입범죄 저항성능 시험·인증 체계에 관한 모형 연구)

  • Park, Hyeon-ho
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.255-292
    • /
    • 2013
  • Burglary (also called breaking and entering and sometimes housebreaking) is a crime, the essence of which is illegal entry into a building for the purposes of committing an offence. It is one of the most common types of crime and also a serious issue for every society. A house that is left insecure is an accessible and attractive target for burglars and therefore burglary resistance test & certification system for doors and windows has been developed in many countries. This paper explores several advanced foreign burglary resistance test/certifcation cases (the British SBD, the Dutch KOMO SKH/SKG, the Japanese CP mark, the Australian Standard Certification) for security products and domestic test/certification systems for fire safety products as a comparative study so that any improvement points can be gained for South Korea in the field of security product performance. The comparative analysis results show that South Korea is far behind the security product certification system and needs a lot of improvement in the system by benchmarking foreign cases. The domestic test/certification systems for fire safety products also give some insights for burglary-related security products' performance certification system in Korea. Overall, the need for relevant rules and regulations, the establishment of standards regarding testing and certification, including certified security +hardware product in building security certification system, performance testing as well as production testing (i.e. quality management system evaluation), the basic competency of testers, incentive system for certified/high quality security products were suggested in order to make an optimal model for the security production performance testing and certification system in Korea.

  • PDF

Finding Unexpected Test Accuracy by Cross Validation in Machine Learning

  • Yoon, Hoijin
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.549-555
    • /
    • 2021
  • Machine Learning(ML) splits data into 3 parts, which are usually 60% for training, 20% for validation, and 20% for testing. It just splits quantitatively instead of selecting each set of data by a criterion, which is very important concept for the adequacy of test data. ML measures a model's accuracy by applying a set of validation data, and revises the model until the validation accuracy reaches on a certain level. After the validation process, the complete model is tested with the set of test data, which are not seen by the model yet. If the set of test data covers the model's attributes well, the test accuracy will be close to the validation accuracy of the model. To make sure that ML's set of test data works adequately, we design an experiment and see if the test accuracy of model is always close to its validation adequacy as expected. The experiment builds 100 different SVM models for each of six data sets published in UCI ML repository. From the test accuracy and its validation accuracy of 600 cases, we find some unexpected cases, where the test accuracy is very different from its validation accuracy. Consequently, it is not always true that ML's set of test data is adequate to assure a model's quality.

The Implementation of Probabilistic Security Analysis in Composite Power System Reliability (복합전력계통 신뢰도평가의 확률론적 안전도 도입)

  • Cha, Jun-Min;Kwon, Sae-Hyuk;Kim, Hyung-Chul
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.55 no.5
    • /
    • pp.185-190
    • /
    • 2006
  • The security analysis relates to the ability of the electric systems to survive sudden disturbances such as electric short circuits or unanticipated loss of system elements. It is composed of both steady state and dynamic security analyses, which are not two separate issues but should be considered together. In steady state security analysis including voltage security analysis, the analysis checks that the system is operated within security limits by OPF (optimal power flow) after the transition of a new operating point. On the other hand, dynamic security analysis deals that the transition will lead to an acceptable operating condition. Transient stability, which is the ability of power systems to maintain synchronism when subjected to a large disturbance, is a principal component in dynamic security analysis. Usually any loss of synchronism will cause additional outages. They make the present steady state analysis of the post-contingency condition inadequate for unstable cases. This is the reason of the need for dynamics of systems. Probabilistic criterion can be used to recognize the probabilistic nature of system components and shows the possibility of system security. A comprehensive conceptual framework for probabilistic static and dynamic assessment is presented in this paper. The simulation results of the Western System Coordinating Council (WSCC) system compare an analytical method with Monte-Carlo simulation (MCS). Also, a case study of the extended IEEE Reliability Test System (RTS) shows the efficiency of this approach.

Refining software vulnerbility Analysis under ISO/IEC 15408 and 18045 (ISO/IEC 15408, 18045 기반 소프트웨어 취약성 분석 방법론)

  • Im, Jae-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.969-974
    • /
    • 2014
  • CC (Common Criteria) requires collecting vulnerability information and analyzing them by using penetration testing for evaluating IT security products. Under the time limited circumstance, developers cannot help but apply vulnerability analysis at random to the products. Without the systematic vulnerability analysis, it is inevitable to get the diverse vulnerability analysis results depending on competence in vulnerability analysis of developers. It causes that the security quality of the products are different despite of the same level of security assurance. It is even worse for the other IT products that are not obliged to get the CC evaluation to be applied the vulnerability analysis. This study describes not only how to apply vulnerability taxonomy to IT security vulnerability but also how to manage security quality of IT security products practically.

Development of Test Software Program and Digital Signal Processing Board for Array Module Signal Processing System (Array 검출 모듈 신호처리 시스템의 테스트 소프트웨어 프로그램 개발 및 디지털 신호처리 보드 개발)

  • Park, Geo;Kim, Young-kil;Lee, Jean
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.499-505
    • /
    • 2018
  • Shipping and logistics safety, security system is strengthening worldwide, the development of shipping and logistics safety security core technology for national security logistics system construction has been carried out. In addition, it is necessary to localize the Array Detection System, which is a core component of the container search machine, to cope with the 100% pre-inspection of the container scheduled for 2018 in the United States. In this research, we propose a test software program developed by using TI-RTOS (Texas Instruments - Real Time Operating System) with a test digital signal processing board which is developed self development. We have developed a program that can test GPIO, SRAM, TCP/IP, and SDcard using M4 MCU. Also we propose a study on a self-developed Digital Signal Processing Board among the array detection systems that replace foreign products. We have developed a test board that can test M4 MCU and developed an X-Ray Detector Digital Signal Processing Board that combines MCU and FPGA.

A Study on students' consciousness regarding their plans after graduation Education of Guard and Security Major (경호관련학과 대학생의 진로의식에 관한 연구)

  • Kim, Chang-Ho;Jung, Jsug-Suk;Lee, Young-Oh
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.21-36
    • /
    • 2006
  • This study aims to grasp the general conditions regarding university students in security related majors in Korea. Followings will be covered here: what motivated them to choose those majors, how much are they satisfied with major curriculum course after matriculation, whether they got jobs through the education, what is their consciousness on their majors, jobs, and courses like, and what effects their job preference. And this study also aims at helping the students with their future plans such as admission to a school of higher grade and choosing their job. For this study, we distributed 340 cpoies to the students in security related majors at 4 four-year colleges and 1 two-year college, and collected 298 copies by means of quota sampling method. For collected questionnaires, we used individual T-test verification and one-way ANOVA analysis to grasp the situation. Significance standard for the test results was set as p<0.05. Following are the test results. First, the analysis on students' satisfaction rate resulted in male students' average of 2.42, compared to female students' average of 2.10, which shows female students have higher satisfaction rate in choosing their majors than male students. Secondly, The results on analysis of satisfaction rate on their curriculums, classes, and majors show that students in security-related majors showed different satisfaction rate and different averages according to their sex and the year of the college. The study indicates that males have higher satisfaction rate on curriculum than females, with male students' average of 2.63 and female students' average 2.88. According to the year of the college, there was a significant difference statistically, Statistics show that students at two-year college have higher satisfaction rate than those at four-year college, with two-year college students' average of 2.48 and four-year college students' of 2.74. students have the average of 3.56. The higher year they were in, the more improvement the curriculum required. When it comes to convenience offer for employment, male students expected more from school than female students, with males' average of 2.74 and females' average of 4.07. Male students marked higher than female students in the extent of job information offer, with males' average of 2.96 and females' average of 2.59. Fourthly, when students in security-related majors were surveyed on their consciousness of their future plans such as getting jibs, two-year college students had more certificates of qualification for employment than four-year college students. What they do preponderantly in preparation for employment was studying foreign languages, which took up 40.4%. And when they were asked on their confidence for employment, positive answers were far more than negative ones with the percentage of 39.6%, while negative took up just 14.0%. Fifthly, when it come to the students in security-related students' job preferences, 49.2% preferred safe job conditions in public security area and 34% preferred private guard or private security organizations. And in the public security area, the highest percentage of 28.6 preferred to work in presidential security service. In the area of private security, 21.2% showed interests in private guard and private security organizations.

  • PDF

Study on Students' Consciousness Regarding Their Plans after Graduation (경호학 전공 만족도와 진로의식 조사)

  • Kim, Chang-Ho
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.91-107
    • /
    • 2008
  • This study aims to grasp the general conditions regarding university students in security related majors in Korea. Followings will be covered here: what motivated them to choose those majors, hw much are they git jobs through the education, what is their conscioucness on their majors, jobs, and courses like, and what effects their job preference. And ths study also aims at helping the student with their future plans such as admission to a school of higher grade and choosing their job. For this study, we distributed 340 copies to the students in security related majors at 4 four-year colleges and 1 two-year college, and collected 298 copies by means of quota sampling method. For collected questionnaires, we used individual T-test verification and one-way ANOVA analysis to grasp the situation. Significance stabdard for the test results was set as p<0.05. Followings are the test results. The results on analysis of satisfaction rate on their curriculums, classes, and majors show that students in security-related majors showed different satisfaction rate and different averages according to their sex and the year of the college. In the analysis on the relationship between major education and employment of students in security-related majors, the result of curriculum improvement and scholaril attainments analysis showed statistically significant relation. When students in security-related majors were surveyed on their consciousness of their future plans such as getting jibs, two-year college students had more certificates of qualification for employment than four-year college students.

  • PDF

A Simulation Model for the Response of Information-Warfare based on Computer Forensics (정보전대응을 위한 컴퓨터 포렌식스 기반 모의실험1))

  • Choe, Yong-Rak;Ko, Byong-Su;Park, Meong-Chan
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.391-421
    • /
    • 2003
  • While the social activities using Internet become generalized, the side effect of the information security violation is increasing steadily and threaten the countries which is not ready to prevent from offensive penetration such as the Information-fighter or Cyber-military. In this paper, we define the concept and characteristics of the modern Information-Warfare and analyze various kinds of threatened elements and also examine the recent trend in other countries. And introducing Computer Forensics raised recently for the confrontation against the security violation in the future, we will show the developing strategies and the necessity in order to response cyber attacks. These developing strategies can be used to ensure and re-trace the technical evidence for the security violation and to achieve the disaster relief effectively. So we hope that can apply them to the actual preparation through developing cyber trial test of the defense and attack for the Information-Warfare.

  • PDF