• Title/Summary/Keyword: private security

Search Result 1,407, Processing Time 0.027 seconds

A design of Giga-bit security module using Fully pipe-lined CTR-AES (Full-pipelined CTR-AES를 이용한 Giga-bit 보안모듈 설계)

  • Vinh, T.Q.;Park, Ju-Hyun;Kim, Young-Chul;Kim, Kwang-Ok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1026-1031
    • /
    • 2008
  • Nowdays, homes and small businesses rely more and more PON(Passive Optical Networks) for financial transactions, private communications and even telemedicine. Thus, encryption for these data transactions is very essential due to the multicast nature of the PON In this parer, we presented our implementation of a counter mode AES based on Virtex4 FPGA. Our design exploits three advanced features; 1) Composite field arithmetic SubByte, 2) efficient MixColumn transformation 3) and on-the-fly key-scheduling for fully pipelined architecture. By pipeling the composite field implementation of the S-box, the area cost is reduced to average 17 percent. By designing the on-the-fly key-scheduling, we implemented an efficient key-expander module which is specialized for a pipelined architecture.

OTP Authentication Protocol using PingPong-128 (PingPong-128을 이용한 OTP 인증 프로토콜)

  • Lee, Jang-Chun;Lee, Hoon-Jae;Lim, Hyo-Taek;Lee, Sang-Gon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.661-669
    • /
    • 2008
  • Nowadays, authentication is essential to identify the legal users in a network communication. Usually, there are few wars to achieve authentication over a publicly accessible network system in order to protect certain private data from the unauthorized users, ranging from simple ID/Password to Biometrics System. One of the most active areas in OTP(One Time Password) research today aims at exploiting OTP to provide authentication in the finance and security industry. OTP is usually discarded once it has been used. this prevents huge loophole of traditional authentication system which employs the same ID and Password every time. However this OTP system also has its weaknesses in surviving some attacks. this paper proposes an advanced OTP protocol using PingPong-128 without loop hole of pre-existing OTP.

Government as a Platform Revitalization Strategy Derived from Webtoon Platform Success Factors (웹툰플랫폼 성공요인에서 도출한 플랫폼 정부 활성화 방안)

  • Seo, Hyungjun
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.1-13
    • /
    • 2021
  • This study postulates that Government as a Platform(GaaP) could be a next generation government model, drawing activation strategy from success factors of webtoon platform by NAVER. It suggests success factors of Naver webtoon case based on three main components of platform strategy. First, in the aspect of platform infrastructure, Naver webtoon was established based on powerful portal site by parent company Naver and improved platform accessibility through using webtoon without login. Second, in the aspect of stakeholder engagement, Naver webtoon has offed webtoon at no cost and it has taken an intermediary role for supporting the stakeholders with PPS. Third, in the aspect of outputs production, Naver webtoon offered real time feedback from webtoon users that could affect webtoon production and established incubating system that allow users to create their webtoon. And due to PPS, it makes possible to various create second outputs based on webtoon, which can contribute to activating webtoon ecosystem.

Security Model Tracing User Activities using Private BlockChain in Cloud Environment (클라우드 환경에서 프라이빗 블록체인을 이용한 이상 행위 추적 보안 모델)

  • Kim, Young Soo;Kim, Young Chan;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.11
    • /
    • pp.475-483
    • /
    • 2018
  • Most of logistics system has difficulties in transportation logistics tracking due to problems in real world such as discordance between logistics information and logistics flow. For the solution to these problems, through case study about corporation, suppliers that transport order items in shopping mall, we retain traceability of order items through accordance between logistics and information flow and derive transportation logistics tracking model. Through literature review, we selected permissioned public block chain model as reference model which is suitable for transportation logistics tracking model. We compared, analyzed and evaluated using centralized model and block chain as application model for transportation logistics tracking model. In this paper we proposed transportation logistics tracking model which integrated with logistics system in real world. It can be utilized for tracking and detection model and also as a tool for marketing.

Analysis on Smishing Attack Trends and Mobile Forensic (스미싱 공격 동향 분석 및 Mobile Forensic)

  • Noh, Jung-Ho;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.394-397
    • /
    • 2014
  • Most of Koreans have smartphone. By using smartphone, they have done internet-banking, e-commerce and private scheduling. However, convenience of smart phone has been made side effect such as tool of fraud and crime. Especially, Smishing on smartphone has been increased rapidly since 2013. Smishing have utilized social-engineering technique with social issue such as Korean near-sea cruse ship, 'Sewol-Ho', Sinking and traditional thanks-giving holiday, 'Chu-Seok', etc. This paper proposed the oncoming trend of smishing on smartphone after 2014. This paper also analyzed the process and technique of smishing on internal financial fraud. It also covered smartphone forensic for using legal evidence. By discovering the connectivity of smishing and financial fraud, this paper could be reference for social security on smartphone.

  • PDF

Privacy-preserving Customized Order Service Protocol based on Smart Contract in Smart Factory (프라이버시를 제공하는 스마트 컨트랙트 기반의 스마트 팩토리 주문제작 프로토콜)

  • Lee, YongJoo;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.215-222
    • /
    • 2019
  • Advances in technologies about 3D (three-dimensional) printing and smart factory related issues will have the effect of reducing the cost of building a smart factory and making various types of service available. Manufacturers and service providers of small assets work with outside experts to provide small amounts of customized ordering services. If customers have to disclose their private information to subscribe to a new service, they may be reluctant to use it and the availability of developed technology may cause slow progress. We propose a new protocol for customized order service for smart factory. The proposed approach is designed to meet requirements of security and based on smart contract in IoT convergence network. We analyzed the requirements of the proposed approach which provided anonymity, privacy, fairness, and non-repudiation. We compared it with closely related studies to show originality and differences.

The Contents of SatDSiG and Its Implications for Korea (독일 위성자료보안법의 내용 및 시사점)

  • JUNG, Yungjin
    • Journal of Aerospace System Engineering
    • /
    • v.13 no.2
    • /
    • pp.60-65
    • /
    • 2019
  • TerraSAR-X, launched in June 2007, and TanDEM-X, June 2010, are remote-sensing satellites with 1M resolution that are capable of observing the ground even during the nighttime and poor weather conditions. The two satellites had been developed under a public-private partnership between the German Aerospace Centre and Airbus in the interest of the commercial marketing for German satellite data. However, the data of high-grade earth remote-sensing system, such as those of the satellites, has been produced by a military satellite and thus used under limited circumstances in Germany. Therefore, a legislation to commercialize the German satellite data and to protect its national security is needed. For this, SatDSiG was enacted in December 2007. Thus this article will contain the main contents of SatDSiG and its implication for Korea, which stared to export data of Kompsat 3, 3A and 5 in 2018.

A Comparative Study of Men and Women on the Preparation of Retirement Life

  • Lim, Ahn Na
    • International journal of advanced smart convergence
    • /
    • v.10 no.3
    • /
    • pp.113-121
    • /
    • 2021
  • This study was conducted on 1,174 retirees in their 50s and 60s nationwide using the 7th data of the National Pension Service's National Elderly Security Panel Survey. We were able to confirm the following results through the SPSS WIN 18.0 program.. First, men showed a higher level of education than women. From these results, it is expected that men will be better prepared for retirement. Second, men had spouses and two or more household members than women. According to previous studies showing that men are better prepared for retirement if they have a spouse, it is expected that men are better prepared for retirement. Second, 38% of men and 62% of women were voluntary retirees. Third, both men and women responded that their own and spouses should play the main role in preparing for retirement. Fourth, both men and women had very low rates of preparation for old age, economic independence, and public and private pensions. Among them, women were lower than men. Fifth, economic problem solving, health, and medical care were the priority as parts to be done for retirement in oneself and society. Based on these results, the directions for preparing retirees for retirement are as follows. First, education on wage peak system, retirement age extension and financial management for involuntary retirees is required, and guidance and management methods on health care and disease should be provided to address needs for health and health care. Women had more voluntary retirees than men, and they need to know why. Second, when both men and women are very poor at preparing for retirement, there should be job creation measures to ensure that they and their spouses are fully prepared for retirement.

A Study of Incentive Problems of Welfare State (복지국가의 인센티브 문제에 관한 연구)

  • Cheon, Byung You
    • 한국사회정책
    • /
    • v.20 no.2
    • /
    • pp.69-96
    • /
    • 2013
  • This paper is to critically review the economic reasoning of non-sustainability of welfare state due to its intrinsic incentive problems and to see how the nordic welfare state responds to them. The welfare state as a political design of state to pursue equality has social insurance as its main economic function. It survives market failure of private insurance to contribute to human capital investment and industrial restructuring. The universal tax-financed welfare state, however, has the problem of tragedy of commons such as reduced work incentive and work ethics. But, the existing nordic welfare state overcomes it through employment-focused policy arrangements, maintenance of work ethics and benefits moral, incentive mechanism of wage-compression, public educational investment and its complementation with social security. The Nordic model shows that problems of incentive and moral are not about those of theory and reasoning, but about their reality which policies and institutions could respond to.

Analysis of the Global Data Law & Policy and its Implications: Focusing on the cases of the United States, the United Kingdom, and the European Union (국내외 데이터법·정책 분석 및 시사점: 미국, 영국, EU의 사례를 중심으로)

  • Yoon, Sang-Pil;Kwon, Hun-Yeong
    • Informatization Policy
    • /
    • v.28 no.2
    • /
    • pp.98-113
    • /
    • 2021
  • This study presents implications of the Global Data Law & Policy by comparing national data strategies, data regulations and policies, and governance in South Korea, the United States, the United Kingdom, and the European Union. According to the result of the comparative analysis, the biggest difference is in data governance, in other words, the management and coordination of policies at the pan-government level and data ethics. Therefore, this study proposes the establishment of a presidential special committee on data policy or the creation of a 'National Digital Innovation Office' at the Presidential Secretariat as a national CDO for the governance of data policies. Furthermore, this paper suggests a) to enact 'the Framework Act on the Development of Data Industry' that can regulate data practices in the private sector, b) to institutionalize the data-centric security and data protection, c) to settle the public ethics and personnel management based on data expertise and professional ethics, including explainability and responsibility, and d) the education and training systems.