• Title/Summary/Keyword: information and telecommunications technologies

Search Result 259, Processing Time 0.026 seconds

Practical and Provable Security against Differential and Linear Cryptanalysis for Substitution-Permutation Networks

  • Kang, Ju-Sung;Hong, Seok-Hie;Lee, Sang-Jin;Yi, Ok-Yeon;Park, Choon-Sik;Lim, Jong-In
    • ETRI Journal
    • /
    • 제23권4호
    • /
    • pp.158-167
    • /
    • 2001
  • We examine the diffusion layers of some block ciphers referred to as substitution-permutation networks. We investigate the practical and provable security of these diffusion layers against differential and linear cryptanalysis. First, in terms of practical security, we show that the minimum number of differentially active S-boxes and that of linearly active S-boxes are generally not identical and propose some special conditions in which those are identical. We also study the optimal diffusion effect for some diffusion layers according to their constraints. Second, we obtain the results that the consecutive two rounds of SPN structure provide provable security against differential and linear cryptanalysis, i.e., we prove that the probability of each differential (resp. linear hull) of the consecutive two rounds of SPN structure with a maximal diffusion layer is bounded by $p^n(resp.q^n)$ and that of each differential (resp. linear hull) of the SDS function with a semi-maximal diffusion layer is bounded by $p^{n-1}(resp. q^{n-1})$, where p and q are maximum differential and linear probabilities of the substitution layer, respectively.

  • PDF

THE DESIGN OF U-GIS CONVERGENCE MIDDLEWARE

  • Jang, In-Sung;Kim, Min-Soo;Lee, Young-Jun
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2008년도 International Symposium on Remote Sensing
    • /
    • pp.115-118
    • /
    • 2008
  • Traditionally, Geographical Information System can only process static spatial data, which include geometries and attributes. Recently, According to Special attention is paid to ubiquitous computing environment, we require a u-GIS convergence middleware to efficiently process ubiquitous data and improves the existing GIS engine in order to enable converged processing of spatial and sensor data. So, in this study, we propose a design of u-GIS Convergence Middleware, which are based on the integration between GIS and USN technologies

  • PDF

인간 신체를 자율적으로 보조하고 보호하는 지능형 소프트 슈트(엑소스킨) (Intelligent Soft Suit That Can Autonomously Augment Strength and Protect the Human Body (Exoskin))

  • 손용기;정준영;진한빛;구자범;김배선;이동우;김혜진;신형철
    • 전자통신동향분석
    • /
    • 제36권1호
    • /
    • pp.32-42
    • /
    • 2021
  • Innovative developments in wearable and artificial intelligence technologies are accelerating the emergence of a soft suit that can autonomously augment a body's own strength and protect the human body. In this paper, we define the concept of "Exoskin," a new concept specifically derived from the "Road to an Intelligent Information Society" (Technology Development Map 2035) as predicted by the Electronics and Telecommunications Research Institute. In addition, we analyze the development status of each element of this technology and forecast its future development.

Using The Internet As A Tool For The Illicit Sale Of Drugs And Potent Substances

  • Manzhai, Oleksandr;Cherevko, Kyrylo;Chycha, Ruslan;Burlaka, Iryna;Piadyshev, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.246-250
    • /
    • 2022
  • The article analyzes the regulations of current criminal law and current issues, combating drug crime on the Internet, as well as measures to combat drug crime in the field of modern information technology. In connection with the growth of crimes in the field of drug trafficking committed with the use of information and telecommunications technologies, the urgent task of the state is to find effective ways to reduce drug crime. The article considers criminologically significant aspects of the mechanism of illicit drug trafficking, which is carried out with the use of information and telecommunication technologies and means of remote communication.

고속.지능형 마이크로머시닝을 위한 진단시스템 및 특성평가 (Development of Diagnosis System for Intelligent High-Speed Micro-Machining and Evaluation of Micro-Machining Characteristics)

  • 김흥배;이우영;최성주
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 1997년도 추계학술대회 논문집
    • /
    • pp.993-998
    • /
    • 1997
  • The advanced technology of micro-machining is starting to penetrate our lives. This technology, with which it is possible to make micro-structures by means of processing on the order of nm (micrometer = 1/1,000 mm) or less, is realizing machines that were only part of our wildest imagination. However, the fact is that many issues remain in the quest for a variety of applications. With the advent of computing technologies, information technologies, and telecommunications technologies, we foresee the need for new approaches in design, process, and the use of materials, technologies, and people in a globalized manufacturing enterprise. A new thinking paradigm is needed to focus on quality of service on the products we design and manufacture. Factories in different regions need to be co-ordinated through use of the state-of-the-art information on productivity, diagnostics, and service evaluation of manufacturing systems could be shared among different locations and partners. In this research, We develope the internet based Diagnosis system for micro machining and evaluate its characteristics by using mechatronic sensor like Dynamometer, acoustic emission, Acceleration sensor, micro phone, vision, infra-red thermometer.

  • PDF

Exploring Effective Zero Trust Architecture for Defense Cybersecurity: A Study

  • Youngho Kim;Seon-Gyoung Sohn;Kyeong Tae, Kim;Hae Sook Jeon;Sang-Min Lee;Yunkyung Lee;Jeongnyeo Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권9호
    • /
    • pp.2665-2691
    • /
    • 2024
  • The philosophy of Zero Trust in cybersecurity lies in the notion that nothing assumes to be trustworthy by default. This drives defense organizations to modernize their cybersecurity architecture through integrating with the zero-trust principles. The enhanced architecture is expected to shift protection strategy from static and perimeter-centric protection to dynamic and proactive measures depending on the logical contexts of users, assets, and infrastructure. Given the domain context of defense environment, we aim three challenge problems to tackle and identify four technical approaches by the security capabilities defined in the Zero Trust Architecture. First approach, dynamic access control manages visibility and accessibility to resources or services with Multi Factor Authentication and Software Defined Perimeter. Logical network separation approach divides networks on a functional basis by using Software Defined Network and Micro-segmentation. Data-driven analysis approach enables machine-aided judgement by utilizing Artificial Intelligence, User and Entity Behavior Analytics. Lastly, Security Awareness approach observes fluid security context of all resources through Continuous Monitoring and Visualization. Based on these approaches, a comprehensive study of modern technologies is presented to materialize the concept that each approach intends to achieve. We expect this study to provide a guidance for defense organizations to take a step on the implementation of their own zero-trust architecture.

다중로그 플랫폼 기반 차량안전시스템 (Multi-Log Platform Based Vehicle Safety System)

  • 박현호;권은정;변성원;신원재;장동만;정의석;이용태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2019년도 춘계학술대회
    • /
    • pp.546-548
    • /
    • 2019
  • 최근, 차량의 안전한 운행을 지원하기 위한 차량안전기술이 주목 받고 있다. 본 논문에서는 대인, 대물, 장소의 로그 데이터인 다중로그 데이터를 분석하여 차량 안전을 지원하는 다중로그 플랫폼 기반 차량안전시스템을 제안한다. 다중로그 플랫폼 기반 차량 안전 시스템은 대인, 대물, 장소에 대한 센서데이터와 영상데이터를 수집하여, 대인, 대물, 장소에 대한 상황인지데이터인 다중로그를 생성한다. 다중로그 플랫폼 기반 차량 안전 시스템은 다중로그를 분석하여 차량 위험을 감지, 예측, 대응을 수행할 수 있다. 다중로그 플랫폼 기반 차량 안전 시스템은 차량 사고를 줄이는 데에 기여할 수 있을 것이다.

  • PDF

Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks

  • Lu, Yanrong;Li, Lixiang;Peng, Haipeng;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권3호
    • /
    • pp.1273-1288
    • /
    • 2016
  • With the swift growth of wireless technologies, an increasing number of users rely on the mobile services which can exchange information in mobile networks. Security is of key issue when a user tries to access those services in this network environment. Many authentication schemes have been presented with the purpose of authenticating entities and wishing to communicate securely. Recently, Chou et al. and Farash-Attari presented two ID authentication schemes. They both claimed that their scheme could withstand various attacks. However, we find that the two authentication schemes are vulnerable to trace attack while having a problem of clock synchronization. Additionally, we show that Farash-Attari's scheme is still susceptible to key-compromise impersonation attack. Therefore, we present an enhanced scheme to remedy the security weaknesses which are troubled in these schemes. We also demonstrate the completeness of the enhanced scheme through the Burrow-Abadi-Needham (BAN) logic. Security analysis shows that our scheme prevents the drawbacks found in the two authentication schemes while supporting better secure attributes. In addition, our scheme owns low computation overheads compared with other related schemes. As a result, our enhanced scheme seems to be more practical and suitable for resource-constrained mobile devices in mobile networks.

Formation of a Person's Value Attitude to the Worldview Using Information Technologies

  • Yakymenko, Svitlana;Drobin, Andrii;Fatych, Mariia;Dira, Nadiia;Terenko, Olena;Zakharevych, Mykola;Chychuk, Antonina
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.183-190
    • /
    • 2022
  • The article analyzes the features of the formation of a person's value attitude to the worldview by means of information technologies. The present considers it necessary to form a person's value attitude to the perception of the world by means of information technologies. The explosive development of information and telecommunications technologies has become a determining factor in the development of modern society, which is called the information or Global Information Society. It is not yet fully formed, and we are all participants in the development of the Global Information Society. The article considers the basics of a harmonious worldview of a person, which is the basis for the formation of outlook ideas, views, knowledge, beliefs about the surrounding world, which determine the place and role and motivate actions in relation to the surrounding reality through the prism of value orientations. Worldview is considered as an integrity of relatively stable schemes, behaviors, feelings, thinking, vision of the surrounding world, inherent in an individual child, ethno-cultural and socio-cultural groups. The concept of "worldview" as a component of the multi-level structure of the individual's outlook is defined. The features that characterize a person's perception of the world are revealed. The main educational value of information technologies in the formation of a person's value attitude to the perception of the world is highlighted, which consists in the fact that they allow you to create an immeasurable brighter multi-sensory interactive learning environment with almost unlimited potential opportunities that fall at the disposal of both the teacher and the student. The trend of forming a person's value attitude to the perception of the world is clearly developing in the direction of mixed learning as a process that creates a comfortable information educational environment, communication systems that provide all the necessary educational information. The approach to student development by means of the educational environment and the formation, while in the person of a value attitude to the perception of the world by means of Information Technologies, has many pedagogical advantages, which is considered in the article.

ITU-T Vision

  • 김영균;도재혁
    • 정보와 통신
    • /
    • 제19권7호
    • /
    • pp.40-55
    • /
    • 2002
  • The advent of Third Generation (3G) communication systems, with their ability to process real-time multimedia applications and their large bandwidths, will greatly enhance mobile Internet access. Not only does Wideband Code Division Multiple Access (WCDMA) and cdma2000 radio technology offer an advantageous density for voice in terms of spectral efficiency, it also supports higher rates and offers differentiated levels of duality of Service (QoS) for data applications. The early introduction of packet and multimedia technologies will be a key element in realizing a quick and successful return on the operator's investments in Universal Mobile Telecommunications System (UMTS) and cdma2000.