• Title/Summary/Keyword: Security-Critical

Search Result 850, Processing Time 0.027 seconds

Montgomery Multiplier with Very Regular Behavior

  • Yoo-Jin Baek
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.17-28
    • /
    • 2024
  • As listed as one of the most important requirements for Post-Quantum Cryptography standardization process by National Institute of Standards and Technology, the resistance to various side-channel attacks is considered very critical in deploying cryptosystems in practice. In fact, cryptosystems can easily be broken by side-channel attacks, even though they are considered to be secure in the mathematical point of view. The timing attack(TA) and the simple power analysis attack(SPA) are such side-channel attack methods which can reveal sensitive information by analyzing the timing behavior or the power consumption pattern of cryptographic operations. Thus, appropriate measures against such attacks must carefully be considered in the early stage of cryptosystem's implementation process. The Montgomery multiplier is a commonly used and classical gadget in implementing big-number-based cryptosystems including RSA and ECC. And, as recently proposed as an alternative of building blocks for implementing post quantum cryptography such as lattice-based cryptography, the big-number multiplier including the Montgomery multiplier still plays a role in modern cryptography. However, in spite of its effectiveness and wide-adoption, the multiplier is known to be vulnerable to TA and SPA. And this paper proposes a new countermeasure for the Montgomery multiplier against TA and SPA. Briefly speaking, the new measure first represents a multiplication operand without 0 digits, so the resulting multiplication operation behaves in a very regular manner. Also, the new algorithm removes the extra final reduction (which is intrinsic to the modular multiplication) to make the resulting multiplier more timing-independent. Consequently, the resulting multiplier operates in constant time so that it totally removes any TA and SPA vulnerabilities. Since the proposed method can process multi bits at a time, implementers can also trade-off the performance with the resource usage to get desirable implementation characteristics.

Worker Location Tracking System of Shipyard using Power Line Communication and Beacon (전력선 통신과 비컨을 활용한 선박 건조 현장의 작업자 위치 추적 시스템)

  • Taewoong Hwnag;Young-Doo Lee;Ki-Woong Park;In-Soo Koo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.41-49
    • /
    • 2024
  • This paper discusses the modeling and implementation of a worker location system at a shipbuilding site. The importance of worker location in an industrial environment is highlighted as a critical element in the prevention of industrial accidents. The paper presents a worker tracking system that integrates power line and beacon communication to accurately track worker position. Through experiments, the paper demonstrates how to monitor the changes in worker location based on different scenarios and how to access the status of worker location using the manager's web service. The paper can be used for the design of a system that will provide real-time location information to safety managers for the improvement of worker safety management.

Study on the Factors Affecting the Intention to Share Electronic Medical Records (전자의무기록 공유 의도에 영향을 미치는 요인 연구)

  • Young Eun Kim;Jee Yeon Lee
    • Journal of the Korean Society for information Management
    • /
    • v.41 no.1
    • /
    • pp.283-311
    • /
    • 2024
  • This study examined the factors affecting the intention of the public to share electronic medical records(EMR) based on the theory of reasoned action and the privacy calculus model. It also investigated whether the purpose of EMR sharing varies depending on personal characteristics, such as the degree of interest in health and personal medical history. According to an online survey of 145 people, altruistic enjoyment, awareness of personal information protection, recognition of legal and institutional roles, and interest in health had a positive impact on the level of EMR sharing, and trust in hospitals positively adjusted the relationship between recognition of legal and institutional roles and sharing intentions. Accordingly, we confirmed that the public recognized the role of the government and hospitals in the sharing process as necessary. The public interest benefits of sharing are critical to activating public participation in the sharing of EMR, and it is also essential to prepare guidelines that legally guarantee the security and proper use of EMR.

A Study on the Mission Engineering Applications for Improving the Defense Planning Management System -Focusing on the Requirement Planning and Acquisition - (국방기획관리체계 개선을 위한 임무공학 적용방안에 관한연구-소요기획과 획득체계를 중심으로-)

  • Sang-Seung Lee;Keun-Ha Choi;Seung-Hyeon Hwang
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.5
    • /
    • pp.181-188
    • /
    • 2024
  • This study explores the application of Mission Engineering, a concept and methodology adopted by the U.S. Department of Defense, to the Republic of Korea's defense planning and management system in response to the rapidly changing security environment. Through literature review, analysis of prior research and case studies, and focus group interviews (FGI), key elements of Mission Engineering were derived. Based on these findings, improvements for the ROK military's requirements planning and rapid acquisition system were proposed. As a result, three critical elements for applying Mission Engineering were identified: operational concepts, required capabilities, and acquisition. Suggestions for improvement include transitioning to a mission-oriented requirements planning system, applying Mission Engineering methodology when formulating operational concepts, supporting decision-making to shorten acquisition timelines, allocating budgets for rapid acquisition, and strengthening the capabilities of requirement-setting units. This study confirms the necessity and applicability of Mission Engineering and is expected to serve as a foundation for the future development of the defense planning and management system.

Homeland Security Management: A Critical Review of Civil Protection Mechanism in Korea (국가안전관리: 한국의 시민보호(위기재난관리) 체계에 관한 비판적 고찰)

  • Kim, Hak-Kyong
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.121-144
    • /
    • 2011
  • The Framework Act on the Management of Disasters and Safety 2004(FAMDS) currently underpins Korean civil protection system, and under this FAMDS, Korean civil protection establishes a three-tiered government structure for dealing with crises and disasters: central government, provincial & metropolitan government, and local government tiers. In particular, the concept of Integrated Emergency Management(IEM) emphasizes that emergency response organizations should work and act together to respond to crises and disasters effectively, based on the coordination and cooperation model, not the command and control model. In tune with this trend, civil protection matters are, first, dealt with by local responders at the local level without direct involvement of central or federal government in the UK or USA. In other words, central government intervention is usually implemented in the UK and the USA, only when the scale or complexity of a civil protection issue is so vast, and thus requires a degree of central government coordination and support, resting on the severity and impact of the event. In contrast, it appears that civil protection mechanism in Korea has adopted a rigid centralized system within the command and control model, and for this reason, central government can easily interfere with regional or local command and control arrangements; there is a high level of central government decision-making remote from a local area. The principle of subsidiarity tends to be ignored. Under these circumstances, it is questionable whether such top-down arrangements of civil protection in Korea can manage uncertainty, unfamiliarity and unexpectedness in the age of Risk Society and Post-modern society, where interactive complexity is increasingly growing. In this context, the study argues that Korean civil protection system should move towards the decentralized model, based on coordination and cooperation between responding organizations, loosening the command and control structure, as with the UK or the USA emergency management arrangements. For this argument, the study basically explores mechanisms of civil protection arrangements in Korea under current legislation, and then finally attempts to make theoretical suggestions for the future of the Korean civil protection system.

  • PDF

An Empirical Study on Perceived Value and Continuous Intention to Use of Smart Phone, and the Moderating Effect of Personal Innovativeness (스마트폰의 지각된 가치와 지속적 사용의도, 그리고 개인 혁신성의 조절효과)

  • Han, Joonhyoung;Kang, Sungbae;Moon, Taesoo
    • Asia pacific journal of information systems
    • /
    • v.23 no.4
    • /
    • pp.53-84
    • /
    • 2013
  • With rapid development of ICT (Information and Communications Technology), new services by the convergence of mobile network and application technology began to appear. Today, smart phone with new ICT convergence network capabilities is exceedingly popular and very useful as a new tool for the development of business opportunities. Previous studies based on Technology Acceptance Model (TAM) suggested critical factors, which should be considered for acquiring new customers and maintaining existing users in smart phone market. However, they had a limitation to focus on technology acceptance, not value based approach. Prior studies on customer's adoption of electronic utilities like smart phone product showed that the antecedents such as the perceived benefit and the perceived sacrifice could explain the causality between what is perceived and what is acquired over diverse contexts. So, this research conceptualizes perceived value as a trade-off between perceived benefit and perceived sacrifice, and we need to research the perceived value to grasp user's continuous intention to use of smart phone. The purpose of this study is to investigate the structured relationship between benefit (quality, usefulness, playfulness) and sacrifice (technicality, cost, security risk) of smart phone users, perceived value, and continuous intention to use. In addition, this study intends to analyze the differences between two subgroups of smart phone users by the degree of personal innovativeness. Personal innovativeness could help us to understand the moderating effect between how perceptions are formed and continuous intention to use smart phone. This study conducted survey through e-mail, direct mail, and interview with smart phone users. Empirical analysis based on 330 respondents was conducted in order to test the hypotheses. First, the result of hypotheses testing showed that perceived usefulness among three factors of perceived benefit has the highest positive impact on perceived value, and then followed by perceived playfulness and perceived quality. Second, the result of hypotheses testing showed that perceived cost among three factors of perceived sacrifice has significantly negative impact on perceived value, however, technicality and security risk have no significant impact on perceived value. Also, the result of hypotheses testing showed that perceived value has significant direct impact on continuous intention to use of smart phone. In this regard, marketing managers of smart phone company should pay more attention to improve task efficiency and performance of smart phone, including rate systems of smart phone. Additionally, to test the moderating effect of personal innovativeness, this research conducted multi-group analysis by the degree of personal innovativeness of smart phone users. In a group with high level of innovativeness, perceived usefulness has the highest positive influence on perceived value than other factors. Instead, the analysis for a group with low level of innovativeness showed that perceived playfulness was the highest positive factor to influence perceived value than others. This result of the group with high level of innovativeness explains that innovators and early adopters are able to cope with higher level of cost and risk, and they expect to develop more positive intentions toward higher performance through the use of an innovation. Also, hedonic behavior in the case of the group with low level of innovativeness aims to provide self-fulfilling value to the users, in contrast to utilitarian perspective, which aims to provide instrumental value to the users. However, with regard to perceived sacrifice, both groups in general showed negative impact on perceived value. Also, the group with high level of innovativeness had less overall negative impact on perceived value compared to the group with low level of innovativeness across all factors. In both group with high level of innovativeness and with low level of innovativeness, perceived cost has the highest negative influence on perceived value than other factors. Instead, the analysis for a group with high level of innovativeness showed that perceived technicality was the positive factor to influence perceived value than others. However, the analysis for a group with low level of innovativeness showed that perceived security risk was the second high negative factor to influence perceived value than others. Unlike previous studies, this study focuses on influencing factors on continuous intention to use of smart phone, rather than considering initial purchase and adoption of smart phone. First, perceived value, which was used to identify user's adoption behavior, has a mediating effect among perceived benefit, perceived sacrifice, and continuous intention to use smart phone. Second, perceived usefulness has the highest positive influence on perceived value, while perceived cost has significant negative influence on perceived value. Third, perceived value, like prior studies, has high level of positive influence on continuous intention to use smart phone. Fourth, in multi-group analysis by the degree of personal innovativeness of smart phone users, perceived usefulness, in a group with high level of innovativeness, has the highest positive influence on perceived value than other factors. Instead, perceived playfulness, in a group with low level of innovativeness, has the highest positive factor to influence perceived value than others. This result shows that early adopters intend to adopt smart phone as a tool to make their job useful, instead market followers intend to adopt smart phone as a tool to make their time enjoyable. In terms of marketing strategy for smart phone company, marketing managers should pay more attention to identify their customers' lifetime value by the phase of smart phone adoption, as well as to understand their behavior intention to accept the risk and uncertainty positively. The academic contribution of this study primarily is to employ the VAM (Value-based Adoption Model) as a conceptual foundation, compared to TAM (Technology Acceptance Model) used widely by previous studies. VAM is useful for understanding continuous intention to use smart phone in comparison with TAM as a new IT utility by individual adoption. Perceived value dominantly influences continuous intention to use smart phone. The results of this study justify our research model adoption on each antecedent of perceived value as a benefit and a sacrifice component. While TAM could be widely used in user acceptance of new technology, it has a limitation to explain the new IT adoption like smart phone, because of customer behavior intention to choose the value of the object. In terms of theoretical approach, this study provides theoretical contribution to the development, design, and marketing of smart phone. The practical contribution of this study is to suggest useful decision alternatives concerned to marketing strategy formulation for acquiring and retaining long-term customers related to smart phone business. Since potential customers are interested in both benefit and sacrifice when evaluating the value of smart phone, marketing managers in smart phone company has to put more effort into creating customer's value of low sacrifice and high benefit so that customers will continuously have higher adoption on smart phone. Especially, this study shows that innovators and early adopters with high level of innovativeness have higher adoption than market followers with low level of innovativeness, in terms of perceived usefulness and perceived cost. To formulate marketing strategy for smart phone diffusion, marketing managers have to pay more attention to identify not only their customers' benefit and sacrifice components but also their customers' lifetime value to adopt smart phone.

A Relational Approach to Political Geography of Border Dynamics: Case study of North Korea-China Border Region Dandong, China (접경지역 변화의 관계론적 정치지리학: 북한-중국 접경지역 단둥을 중심으로)

  • Chi, Sang-Hyun;Chung, Su-Yeul;Kim, Minho;Lee, Sung-Cheol
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.20 no.3
    • /
    • pp.287-306
    • /
    • 2017
  • Since the 1990s, political geographers have focused on the study of the process of border construction. They have shifted from the old morphological and functional approaches to boundary that have focused on the types and functions of boundaries. Recent scholarship on border studies understand boundaries and the border regions as entities with overlapping and competing relationships not as manifestation of territoriality. There has been the emphasis on the multidimensional actors and the historical and cultural legacies inherent in the border region as well. Based on these recent discussions, this study examines how the border region has been constructed by various actors and strategies in Dandong China, the border city between North Korea and China. Several sanctions including UN Security Council have been resolved and implemented in accordance with North Korea's nuclear and missile development, which is a relevant example to examine the "border as relationships" in which strategies of various actors are competing. In addition, this paper has a significance as a case study on the construction process of border and the characteristics of its materiality, which is a way to overcome the limitation of discourse-oriented critical geopolitical research.

Convergence and Integration Review of Fire fighter Image through Disaster Movies (재난 영화를 통해 본 소방관 이미지에 대한 융·복합적 고찰)

  • Lee, In-Seob;Kim, Jee-Hee;Kim, Yun-Jeong
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.2
    • /
    • pp.91-97
    • /
    • 2017
  • The purpose of the study was to investigate the fire fighter image through disaster movies in Korea and other countries. From September 1 to 7, 2016, the movie search methods were carried out using movie title and key words via Wikipedia and various internet web sites from 1903 to 2016. The results included that the fire fighters had been considered as the precious person of volunteer activity regarding fire suppression, investigators, and self-sacrifice. Through the convergence and integration review of the disaster movie, this research suggested that the national based establishment of the welfare and safety system for the posttraumatic stress disorder(PTSD) and critical incident stress management(CISM) education program. This study will provide the basic data for the development of welfare and safety management for the fire fighters and let the people know the sacrifice of the fire fighters including the motto, "First in and the last out".

A Study on Evaluation of Water Supply Capacity with Coordinated Weirs and Multi-reservoir Operating Model (댐-보 최적 연계운영을 통한 용수공급능력 평가에 관한 연구)

  • Chae, Sun-Il;Kim, Jae-Hee;Kim, Sheung-Kown
    • Journal of Korea Water Resources Association
    • /
    • v.45 no.8
    • /
    • pp.839-851
    • /
    • 2012
  • When we evaluate the water supply capacity of a river basin, it is a common practice to gradually increase the water demand and check if the water demands are met. This practice is not only used in the simulation approach, but also in the optimization approach. However, this trial and error approach is a tedious task. Hence, we propose a two-phase method. In the first phase, by assuming that the decision maker has complete information on inflow data, we use a goal programming model that can generate the maximum water supply capacity at one time. In the second phase, we simulate the real-time operation for the critical period by utilizing the water supply capacity given by the goal programming model under the condition that there is no foresight of inflow. We applied the two-phase method to the Geum-River basin, where multi-purpose weirs were newly constructed. By comparing the results of the goal programming model with those of the real-time simulation model we could comprehend and estimate the effect of perfect inflow data on the water supply capacity.

Determinants of the Ownership Structure of Franchise Systems: Theory and Evidence (프랜차이즈 시스템의 소유구조 결정요인: 이론과 증거)

  • Lim, Young-Kyun;Byun, Sook-Eun;Oh, Seung-Su
    • Journal of Distribution Research
    • /
    • v.16 no.3
    • /
    • pp.33-75
    • /
    • 2011
  • The ownership structure of a franchise system is determined by the franchisor's strategic choice. A close look at the extant theories and perspectives in economics and management such as resource scarcity theory, agency theory, transaction cost analysis, and mixed ownership theory reveals that firms choose their ownership structure for the sake of economic efficiency, profit potentials, the chance of survival, and other strategic concerns. The present study, on the basis of strategic choice perspective, reviews the divergent theories of a franchise system's ownership structure and its determinants, thus providing a theoretical framework for comparing the contradictory arguments along the several critical dimensions. We also developed and tested the conflicting hypotheses regarding key determinants of ownership structure including firm's age, size, transaction-specific investments, uncertainty, and risk-sharing propensity. Using a FDD (Franchise Disclosure Document) data set of 543 Korean franchisors, we found that the years in business, the total number of employees, days of training, the inverse of the years of franchising, and the requirement of royalty payment have positive relationships with the proportion of company-owned outlets to total number of outlets. On the other hand, the proportion of company-owned outlets was found to have negative relationships with the total number of outlets and the extent of geographic dispersion of outlets, but to have no significant relationships with the initial investment required and the inverse of contract length. Based on the findings, we provide several theoretical and managerial implications for studying ownership structure of franchise systems.

  • PDF