• Title/Summary/Keyword: confidentiality

Search Result 694, Processing Time 0.025 seconds

A Design of Mutual Authentication One Time Password Mechanism for Confidentiality (기밀성을 제공하는 상호 인증 일회용 패스워드 메커니즘 설계)

  • Park, Hee-Un;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.04a
    • /
    • pp.1101-1105
    • /
    • 2000
  • 컴퓨터 및 네트워크의 급속한 발전은 우리의 생활 전반에 다양성과 편리성을 제공하고 있다. 그러나 이러한 발전 속에서 자신의 정보를 보호하고 정당한 사용자의 접근을 보장하기 위해 접근 통제가 필수적으로 요구되고 있다. 그러나 단순한 접근 통제는 상호 인증 및 기밀성 제공에 있어 한계가 있다. 본 고에서는 기존 방식들의 특징 및 문제점들을 고찰하고, 이들이 고려하지 안았던 상호 인증 및 기밀성을 제공하는 새로운 일회용 패스워드 방식을 제안한다.

  • PDF

A Study on the Key Distribution Protocol for Secure P2P information Security Service (안전한 P2P 정보보호 서비스를 위한 키 분배 프로토콜에 관한 연구)

  • Lee, Jun Seok
    • Journal of Industrial Convergence
    • /
    • v.6 no.1
    • /
    • pp.57-72
    • /
    • 2008
  • In this study, general outline of P2P(peer to peer) application was analyzed dealing with security attacks and threats on the P2P environment. Information security service was studied to provide secure P2P service under the information threats. This study proposes two methods to provide secure information security service. One is a method to use personal firewall software on the peer. The other is a method to use key distribution protocol for confidentiality and integrity.

  • PDF

The use of ChatGPT in occupational medicine: opportunities and threats

  • Chayma Sridi;Salem Brigui
    • Annals of Occupational and Environmental Medicine
    • /
    • v.35
    • /
    • pp.42.1-42.4
    • /
    • 2023
  • ChatGPT has the potential to revolutionize occupational medicine by providing a powerful tool for analyzing data, improving communication, and increasing efficiency. It can help identify patterns and trends in workplace health and safety, act as a virtual assistant for workers, employers, and occupational health professionals, and automate certain tasks. However, caution is required due to ethical concerns, the need to maintain confidentiality, and the risk of inconsistent or inaccurate results. ChatGPT cannot replace the crucial role of the occupational health professional in the medical surveillance of workers and the analysis of data on workers' health.

A secure authentication system on wired wireless integrated network using OpenFlow (OpenFlow를 이용한 유‧무선 통합 네트워크 환경에서의 인증 시스템)

  • Moon, Jeong-Kyung;Cho, Han Jin;Kim, Jin-Mook
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.285-291
    • /
    • 2014
  • Recent, development of wireless communication devices are rapidly and these device being deployed to the user very fast. By this results, a wired network device and the new device such as wireless devices incorporate. Then a demand of new mesh network is rapidly growing. In this wired/wireless integrated network environment, the network is configured automatically, and a user or wireless communication devices must be provided for authentication services. But, these services do not in the real world. Therefore, in this paper, we propose that wired/wireless integrated network environment to automatically configure the network using OpenFlow and the authentication system using Kerberos method. Our proposed system to be able to provide authentication services, confidentiality, integrity services for user or wired/wireless communication devices. And it can be prvented as well to man-in-the-middle attacks.

Implementation of a Secure Wireless LAU System using AP Authentication and Dynamic Key Exchange (AP 인증 및 동적 키 분배를 이용한 안전한 무선랜 시스템 구현)

  • Lee, Jong-Hu;Lee, Myung-Sun;Ryou, Jae-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.497-508
    • /
    • 2004
  • The existing wireless LAN standard IEEE802.11b has many vulnerabilities from security point of view. The authentication mechanisms in IEEE802.11b have many vulnerabilities. As a result to complement the weak of IEEE802.11b authentication, the IEEE802.1x had been developed in the sense of providing strong user authentication with appropriate mechanism. But this mechanism does not perform AP authentication and there are also some weak points. And in confidentiality and message Integrity case, WEP is weak from key stream reuse attack, IV reuse attack and so on. For that reason, in this paper we propose secure wireless LAN system. Our system provides strong user authentication, confidentiality, and message integrity based on existing IEEE802.1x framework and TLS.

A Study of Definition of Security Requirements on Encryption and Audit Logging (암호화와 감사 로깅에서 보안 요건 정의 연구)

  • Shin, Seong-Yoon;Lee, Kang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.9
    • /
    • pp.85-91
    • /
    • 2014
  • Encryption is a method to convert information to no-sense code in order to prevent data from being lost or altered by use of illegal means. Audit logging creates audit log of users' activities, exceptions, and information security events, and then conserves it for a certain period for investigation and access-control auditing. Our paper suggests that confidentiality and integrity of information should be guaranteed when transmitting and storing important information in encryption. Encryption should consider both one-way encryption and two-way one and that encryption key should assure security. Also, all history related to electronic financial transactions should be logged and kept. And, it should be considered to check the details of application access log and major information. In this paper, we take a real example of encryption and log audit for safe data transmission and periodic check.

A Design and Application of a Web-Based Counseling system (웹 기반 상담시스템의 설계와 적용)

  • Bae, Eun-Hee;Moon, Gyo-Sik
    • Journal of The Korean Association of Information Education
    • /
    • v.5 no.3
    • /
    • pp.329-336
    • /
    • 2001
  • This paper addresses the issue of design and application of a Web-based counseling system of which purpose is to facilitate counseling so that students can freely express their personal problems and get professional helps through the system. The prominent features of the counseling system are that the system encourages students to involve actively in interactive process, and it helps them to create genuine interests out of disbelief or uneasiness towards counseling, and it helps them to create positive attitude towards counseling. To do that, counseling process should meet the requirement of confidentiality in order to build trust between counselor and counselee. Many counseling sites operated by various organizations utilize E-mail as a communication channel for confidentiality purpose, which is likely to end up with single occasions in which desirable relationships for counseling can hardly be established. To solve the above-mentioned problem, a closed, confidential, Web-based counseling system was built on a Web server so that trustful relationship can be accomplished through a confidential, Web-based counseling system. Also, the result of applying it to a local elementary school is stated. Thanks to the merits of personalized, confidential counseling system compared to the face-to-face counseling, surpassing the limitation of time and space and overcoming the fearfulness, it was well observed that students showed great interests in participation of conseling.

  • PDF

Applications of Image Steganography Using Secret Quantization Ranges (비밀 양자화 범위를 이용한 화상 심층암호 응용)

  • Shin Sang-Uk;Park Young-Ran
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.3
    • /
    • pp.379-388
    • /
    • 2005
  • Image steganography Is a secret communication scheme to transmit a secret message, which is embedded into an image. The original image and the embedded image are called the cover image and the stego image, respectively. In other words, a sender embeds a secret message into a cover image and transmits a stego image to a receiver, while the receiver takes the stego image, extracts the message from it, and reads the message. General requirements for steganography are great capacity of secret messages, imperceptibility of stego images, and confidentiality between a sender and a receiver. In this paper, we propose a method for being satisfied with three requirements. In order to hide a secret message into a cover image safely, we use a difference value of two consecutive pixels and a secret quantization range. The former is used for the imperceptibility and the latter for the confidentiality. Furthermore, the number of insertion bits is changed according to the difference value for the imperceptibility. Through experiments, we have shown that our method is more good quality of stego images than many other related methods and increases the amount o( message insertion by performing dual insertion processing for some pixels.

  • PDF

Optimal Information Dispersal Scheme for Survivable Storage Systems (서바이벌 스토리지 시스템을 위한 최적 정보 분할 기법)

  • Song, Sung-Keun;Youn, Hee-Yong;Lee, Hyung-Soo;Lee, Kang-Shin
    • The KIPS Transactions:PartA
    • /
    • v.10A no.6
    • /
    • pp.657-664
    • /
    • 2003
  • Supporting the availability, integrity, and confidentiality of the information is crucial. The survivability storage systems require to encode and distribute data over multiple storage nodes or data base to survive failures and malicious attacks Information dispersal scheme is one of the most efficient schemes allowing high availability and security with reasonable overhead. In this paper, we propose an algorithm determining the optimal (m, n)-lDS in terms of availability, given a set of IDS's. The proposed algorithm will be very useful for designing a highly available and secure storage system since many factors such as node number, storage space, operation speed, etc. interact with each other and thereby finding an optimal information dispersal scheme is very difficult.

A Fast stream cipher Canon (고속 스트림 암호 Canon)

  • Kim, Gil-Ho
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.7
    • /
    • pp.71-79
    • /
    • 2012
  • Propose stream cipher Canon that need in Wireless sensor network construction that can secure confidentiality and integrity. Create Canon 128 bits streams key by 128 bits secret key and 128 bits IV, and makes 128 bits cipher text through whitening processing with produced streams key and 128 bits plaintext together. Canon for easy hardware implementation and software running fast algorithm consists only of simple logic operations. In particular, because it does not use S-boxes for non-linear operations, hardware implementation is very easy. Proposed stream cipher Canon shows fast speed test results performed better than AES, Salsa20, and gate number is small than Trivium. Canon purpose of the physical environment is very limited applications, mobile phones, wireless Internet environment, DRM (Digital Right Management), wireless sensor networks, RFID, and use software and hardware implementation easy 128 bits stream ciphers.