• Title/Summary/Keyword: Strong Authentication

Search Result 145, Processing Time 0.023 seconds

A study on design and performance test of fire door with high endurance performance in submarine tunnel (고내구성능을 갖는 해저터널 방화문 설계방안 및 성능시험 연구)

  • Park, Sang-Heon;Hwang, Ju-Hwan;Choi, Young-Hwan;An, Sung-Joo;Yoo, Yong-Ho
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.20 no.2
    • /
    • pp.331-346
    • /
    • 2018
  • In the tunnel of domestic high - speed railway, the main fire - fighting facility, fire - extinguishing passageway, is installed. However, due to the high pressure of the high - speed train, frequent breakage and maintenance are caused by strong shock and long - term vibration. In order to solve these problems, it is necessary to improve the fire door, but in Korea, it is installed by submitting a certificate by simple KS F 2296 performance test. At present, it is developed as a simple test certification by producing a real scale fireproof door without the theoretical examination in advance, so that a high cost for improvement is occurring in Korea. Therefore, through this study, structural analysis study which can preliminary structure review was carried out in order to design the refuge connection passage fire door and to improve the performance improvement. In order to secure the reliability of the result value, the official authentication test (KS F 2296) were compared.

Automated Detecting and Tracing for Plagiarized Programs using Gumbel Distribution Model (굼벨 분포 모델을 이용한 표절 프로그램 자동 탐색 및 추적)

  • Ji, Jeong-Hoon;Woo, Gyun;Cho, Hwan-Gue
    • The KIPS Transactions:PartA
    • /
    • v.16A no.6
    • /
    • pp.453-462
    • /
    • 2009
  • Studies on software plagiarism detection, prevention and judgement have become widespread due to the growing of interest and importance for the protection and authentication of software intellectual property. Many previous studies focused on comparing all pairs of submitted codes by using attribute counting, token pattern, program parse tree, and similarity measuring algorithm. It is important to provide a clear-cut model for distinguishing plagiarism and collaboration. This paper proposes a source code clustering algorithm using a probability model on extreme value distribution. First, we propose an asymmetric distance measure pdist($P_a$, $P_b$) to measure the similarity of $P_a$ and $P_b$ Then, we construct the Plagiarism Direction Graph (PDG) for a given program set using pdist($P_a$, $P_b$) as edge weights. And, we transform the PDG into a Gumbel Distance Graph (GDG) model, since we found that the pdist($P_a$, $P_b$) score distribution is similar to a well-known Gumbel distribution. Second, we newly define pseudo-plagiarism which is a sort of virtual plagiarism forced by a very strong functional requirement in the specification. We conducted experiments with 18 groups of programs (more than 700 source codes) collected from the ICPC (International Collegiate Programming Contest) and KOI (Korean Olympiad for Informatics) programming contests. The experiments showed that most plagiarized codes could be detected with high sensitivity and that our algorithm successfully separated real plagiarism from pseudo plagiarism.

Analysis on Power Consumption Characteristics of SHA-3 Candidates and Low-Power Architecture (SHA-3 해쉬함수 소비전력 특성 분석 및 저전력 구조 기법)

  • Kim, Sung-Ho;Cho, Sung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.115-125
    • /
    • 2011
  • Cryptographic hash functions are also called one-way functions and they ensure the integrity of communication data and command by detecting or blocking forgery. Also hash functions can be used with other security protocols for signature, authentication, and key distribution. The SHA-1 was widely used until it was found to be cryptographically broken by Wang, et. al, 2005. For this reason, NIST launched the SHA-3 competition in November 2007 to develop new secure hash function by 2012. Many SHA-3 hash functions were proposed and currently in review process. To choose new SHA-3 hash function among the proposed hash functions, there have been many efforts to analyze the cryptographic secureness, hardware/software characteristics on each proposed one. However there are few research efforts on the SHA-3 from the point of power consumption, which is a crucial metric on hardware module. In this paper, we analyze the power consumption characteristics of the SHA-3 hash functions when they are made in the form of ASIC hardware module. Also we propose power efficient hardware architecture on Luffa, which is strong candidate as a new SHA-3 hash function. Our proposed low power architecture for Luffa achieves 10% less power consumption than previous Luffa hardware architecture.

New Security Approaches for SSL/TLS Attacks Resistance in Practice (SSL/TLS 공격에 대한 신규 대응 방안)

  • Phuc, Tran Song Dat;Lee, Changhoon
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.169-185
    • /
    • 2017
  • Juliano Rizzo and Thai Duong, the authors of the BEAST attack [11, 12] on SSL, have proposed a new attack named CRIME [13] which is Compression Ratio Info-leak Made Easy. The CRIME exploits how data compression and encryption interact to discover secret information about the underlying encrypted data. Repeating this method allows an attacker to eventually decrypt the data and recover HTTP session cookies. This security weakness targets in SPDY and SSL/TLS compression. The attack becomes effective because the attacker is enable to choose different input data and observe the length of the encrypted data that comes out. Since Transport Layer Security (TLS) ensures integrity of data transmitted between two parties (server and client) and provides strong authentication for both parties, in the last few years, it has a wide range of attacks on SSL/TLS which have exploited various features in the TLS mechanism. In this paper, we will discuss about the CRIME and other versions of SSL/TLS attacks along with countermeasures, implementations. We also present direction for SSL/TLS attacks resistance in practice.

A Study on the development of Test Report Information Service(TRIS) by User survey analysis (사용자 설문분석을 통한 군수품 시험성적서 정보서비스 고도화 방안에 대한 연구)

  • Park, Dongsoo;Lee, Donghun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.2
    • /
    • pp.405-414
    • /
    • 2017
  • In this study, a survey for a satisfaction evaluation of the Test Report Information Service (TRIS) was conducted. A survey questionnaire on modified Information System Success Model(ISSM) of Delone and Mclean was carried out by 183 users in three groups, such as munition quality assurance agency, munition corporation, and test institute. As a survey result, training on the TRIS was in strong demand in all three groups. An understanding and proficiency of the overall system were different from the work process of each user group. In addition, the munition quality assurance agency needs to enhance the system function with its characteristics. Test institute has necessity of the linkage method with the TRIS depending on the authentication system. User groups are different in the operational method of TRIS between the contractor and cooperation. Accordingly, cooperation needs to be educated continually. This study can help in the construction of a Military Quality Integration Information System to secure the reliability of munitions.