• Title/Summary/Keyword: information weakness

Search Result 788, Processing Time 0.024 seconds

Group Key Transfer Protocol Based on Shamir's Secret Sharing (Shamir의 비밀 공유 방식의 그룹 키 전송 프로토콜)

  • Kim, Young-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.9
    • /
    • pp.555-560
    • /
    • 2014
  • Recently, there are many researches on sharing group session key for members in a group. Among them, Harn and Lin proposed a scheme based on the Shamir's group session key and Liu, Cheng, Cao, and Jiang improved it to reduce the specific weakness. Especially, these schemes are based on the finite integer ring to protest the insider attack, in which a valid member can derived another member's secret using known information. In this paper, it is shown that the finite integer ring implies the failure of the reconstruction of group session key depending on the adopted parameters. We fix this problem and propose new group session key transfer scheme using the Shamir's secret sharing.

Automated Formal Verification of Korean Standard Block Cipher Using Cryptol (Cryptol을 이용한 국내 표준 블록 암호 모듈의 자동 정형 검증)

  • Choi, Won-bin;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.53-60
    • /
    • 2018
  • Cryptographic algorithms are being standardized globally, and the security of cryptographic algorithms has been well proven. However, there is a need for an improved verification method to verify that the existing verification method is correctly implemented according to the standard, because there is a weakness in implementation and it can cause serious damage. Therefore, in this paper, we selected ARIA and LEA to be verified among 128-bit or more block cipher modules performed by the National Intelligence Service, and propose a method to verify whether it is implemented correctly using Cryptol for high-assurance cryptographic module.

Implementation of User Account Vulnerability Checking Function System using MS-SQL Database (MS-SQL 데이터베이스에서 특정 계정 취약점 판별 시스템 구현)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2482-2488
    • /
    • 2014
  • This paper proposes that a user account of the MS-SQL is checked whether expirated or not in C++ program environment. Vulnerability checking module decides security weakness for password change time or user configuration time. The proposed module prevents and protects a user account from a malicious user account. Recently, Information Assets becomes more important. If the loss of database information it would make large damage in our life. This paper develops user account checking module, which checks whether user password have not been changed for a long time or whether the user account expirated in the MS-SQL Database. By checking security vulnerability using this feature, a malicious user cannot access the Database.

Educational Indoor Autonomous Mobile Robot System Using a LiDAR and a RGB-D Camera (라이다와 RGB-D 카메라를 이용하는 교육용 실내 자율 주행 로봇 시스템)

  • Lee, Soo-Young;Kim, Jae-Young;Cho, Se-Hyoung;Shin, Chang-yong
    • Journal of IKEEE
    • /
    • v.23 no.1
    • /
    • pp.44-52
    • /
    • 2019
  • We implement an educational indoor autonomous mobile robot system that integrates LiDAR sensing information with RGB-D camera image information and exploits the integrated information. This system uses the existing sensing method employing a LiDAR with a small number of scan channels to acquire LiDAR sensing information. To remedy the weakness of the existing LiDAR sensing method, we propose the 3D structure recognition technique using depth images from a RGB-D camera and the deep learning based object recognition algorithm and apply the proposed technique to the system.

A study on the vulnerability of OTP implementation by using MITM attack and reverse engineering (MITM 공격과 리버스 엔지니어링을 이용한 OTP 적용환경의 취약점 연구)

  • Kang, Byung-Tak;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.83-99
    • /
    • 2011
  • OTP (One Time Password) is widely used for protecting accounts on Internet banking, portal services and online game services in Korea. OTP is very strong method for enforcing account security but there are several ways for exploiting vulnerabilities caused by implementation errors. These attacks can work because of the weakness from OTP enabled system's vulnerabilities, not for OTP's algorithm itself. In this paper, we present the known attack scenarios such as MITM (Man-in-the-Middle) attack and various reverse engineering techniques; also, we show the test result of the attacks and countermeasures for these attacks.

Effective Motor Evoked Potential Waveforms in Patients with Lower Extremity Weakness (다리에 힘이 없는 환자에서 효과적인 운동 유발전위 파형 측정에 대한 고찰)

  • Lim, Sung-Hyuk;Park, Sang-Ku;Han, Hung-Tae
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.48 no.1
    • /
    • pp.41-48
    • /
    • 2016
  • Motor evoked potential of spinal surgery is known to cause damage due to the movement path of the continuous scan operation and surgery can be performed with minimized disability after surgery. However, if it is not at all formed at the wave motion evoked potential can occur during surgery and, in some cases the size of the waveform to be measured is very small and intermittent. In this case, the surgery cannot provide information about whether there is neurological damage. Increased intensity of the wave-induced motion of the dislocation does not occur if it appears in a very small amplitude stimulus, but changing the inspection area that electrical stimulation of the waveform changes could not be found. However, stimulation of a wide area in the cerebral cortex was found to occur with a waveform in the patients who underwent examination. Through this study, we propose a useful motor evoked potential test. From November to December 2015 three spine surgery patients visited Samsung Medical Center as neurosurgery patients with omission discomfort, gait disturbance, and no symptom of strength before surgery. In spine surgery patients with motor grade weakness, when motor evoked potential waveform has not been measured, in examination of the site of electrical stimulation of the cerebral cortex from entering the C3+C5/C4+C6 or C3+C1/C4+C2 if by the activity of more motor neuron unit, it was found that the waveform is better formed.

A Study on Makeup Image and Self-Consciousness According to the Level of Expected Socio-Psychological Effect of Makeup (화장의 사회.심리적 기대효과에 따른 화장이미지와 자의식에 관한 연구)

  • 이화순;황춘섭
    • Journal of the Korean Society of Costume
    • /
    • v.52 no.8
    • /
    • pp.137-149
    • /
    • 2002
  • This study was made to investigate the differences in Korean woman's perceived makeup image and self-consciousness according to their expectation level in socio-psychological effect of makeup, and to gather information needed for the better understanding of cosmetics consumers and more effective marketing activities of cosmetics industries. Normative-descriptive survey method using questionnaire was employed for the present study. The survey was conducted in August 2001 and the sample consisted of 942 women between the ages of 18 and 50 residing in Seoul and Kyungi province. Data were analyzed by SPSS package. Factor analysis, ANOVA, and MANOVA were employed for the analysis of the data. The results are as follows : (1) Six factors emerged from the data related to the category of expected socio-psychological effect of makeup. Those factors were named as "increasing positiveness", "refreshment", "covering weakness", "self-expression", "consideration for others", and "the tool for self-change". Four factors were found in the category of makeup image, and the factors were named as "refinement", "nobility", "favorable impression ", and "personality ". (2) There was a tendency that those who highly expect the socio-psychological effect of makeup have more positive self-image. Considering this differences in self-image according to the level of expected socio-psychological effect of makeup. service activities for the consumers' positive opinion and attitude to the effect of makeup are needed, and it seems that those service activities will have a good influence on the consumers' emotional health. (3) Subjects with higher level of social anxiety showed higher expectations in refreshment, covering weakness and self-expression. Considering this trend, marketers have to make an constant effort for the variety of cosmetics and makeup manner by which consumers satisfy their expectation in makeup. It seems that the satisfaction of their expectation on the help of makeup effect will contribute to lessen social anxiety, and to get emotional stability. (4) Subjects with higher personal self-anxiety showed higher expectations of the effect. "increase of positiveness". Therefore, if the product advertisement imply the content of increasing positiveness effect of makeup, it might appeal more easily to their consumers.imply the content of increasing positiveness effect of makeup, it might appeal more easily to their consumers.

Open Source Software Security Issues and Applying a Secure Coding Scheme (오픈 소스의 소프트웨어 보안 문제 및 시큐어 코딩 적용방안)

  • Kim, Byoungkuk
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.8
    • /
    • pp.487-491
    • /
    • 2017
  • Open source software allows the users to freely use, copy, distribute and modify source code without any particular limitations, and this offers the advantages of low entry cost, fast and flexible development, compatibility, reliability and safety. The emergence of many useful open source projects has the advantage of achieving high levels of output with lower costs and time commitment for software development. However, this also increases the risks caused by the security vulnerabilities of the used open source software. There is still no separate process to verify security in using open source software. In this paper, we analyze the security weakness in open source and propose a secure coding scheme in adopting open source, which is known to be highly reliable from a security point of view.

Implementation of Badminton Motion Analysis and Training System based on IoT Sensors

  • Sung, Nak-Jun;Choi, Jin Wook;Kim, Chul-Hyun;Lee, Ahyoung;Hong, Min
    • Journal of Internet Computing and Services
    • /
    • v.18 no.4
    • /
    • pp.19-25
    • /
    • 2017
  • In this paper, we designed and implemented IoT sensors based badminton motion analysis and training system that can be readily used by badminton players with PC. Unlike the traditional badminton training system which uses signals of the flags by coach, the proposed electronic training system used IoT sensors to automatically detect and analysis the motions for badminton players. The proposed badminton motion analysis and training system has the advantage with low power, because it communicates with the program through BLE communication. The badminton motion analysis system automatically measures the training time according to the player's movement, so it is possible to collect objective result data with less errors than the conventional flag signal based method by coach. In this paper, training data of 5 athletes were collected and it provides the feedback function through the visualization of each section of the training results by the players which can enable the effective training. For the weakness section of each player, the coach and the player can selectively and repeatedly perform the training function with the proposed training system. Based on this, it is possible to perform the repeated training on weakness sections and they can improve the response speed for these sections. Continuous research is expected to be able to compare more various players' agility and physical fitness.

Improvements of a Dynamic ID-Based Remote User Authentication Scheme (동적 ID 기반 원격 사용자 인증 스킴의 보안성 개선)

  • Young-Do, Joo;An, Young-Hwa
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.303-310
    • /
    • 2011
  • Recently, many user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication process. In 2009, Wang et al. proposed a more effective and secure dynamic ID-based remote user authentication scheme to improve the security weakness of Das et al.'s scheme, and asserted that the improved scheme is secure against independent of password in authentication phase and provides mutual authentication between the user and the remote server. However, in this paper, we analyze the security of Wang et al. scheme and demonstrate that Wang et al.'s scheme is vulnerable to the man-in-the-middle attack and the off-line password guessing attack. In addition, we show that Wang et al. scheme also fails to provide mutual authentication. Accordingly, we propose an improved scheme to overcome these security weakness even if the secrete information stored in the smart card is revealed. Our proposed scheme can withstand the user impersonation attack, the server masquerading attack and off-line password guessing attack. Furthermore, this improved scheme provides the mutual authentication and is more effective than Wang et al.'s scheme in term of the computational complexities.