• Title/Summary/Keyword: public property

Search Result 536, Processing Time 0.024 seconds

A Study on primitive polynomial in stream cipher (스트림암호에서 원시다항식에 대한 고찰)

  • Yang, Jeong-mo
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.27-33
    • /
    • 2018
  • Stream cipher is an one-time-pad type encryption algorithm that encrypt plaintext using simple operation such as XOR with random stream of bits (or characters) as symmetric key and its security depends on the randomness of used stream. Therefore we can design more secure stream cipher algorithm by using mathematical analysis of the stream such as period, linear complexity, non-linearity, correlation-immunity, etc. The key stream in stream cipher is generated in linear feedback shift register(LFSR) having characteristic polynomial. The primitive polynomial is the characteristic polynomial which has the best security property. It is used widely not only in stream cipher but also in SEED, a block cipher using 8-degree primitive polynomial, and in Chor-Rivest(CR) cipher, a public-key cryptosystem using 24-degree primitive polynomial. In this paper we present the concept and various properties of primitive polynomials in Galois field and prove the theorem finding the number of irreducible polynomials and primitive polynomials over $F_p$ when p is larger than 2. This kind of research can be the foundation of finding primitive polynomials of higher security and developing new cipher algorithms using them.

  • PDF

An Anonymous Rights Trading System using group signature schemes (그룹서명을 이용하여 익명성이 보장되는 디지털 권한 전달 시스템)

  • 주학수;김대엽;이동훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.3-13
    • /
    • 2004
  • E-Commerce is suddenly spreading in a daily life. A rights trading system is a system that circulates digital-tickets such as plane tickets, software license, coupon. There are two main approaches so far account-based and smart-card based systems. The NTT Proposed FlexToken, a new smart card based copy prevention scheme for digital rights. They Proposed using pseudonymous self certified keys of Petersen and Horster in order to ensure anonymity of users. However. Petersen and Holster's scheme should register a pseudonymous key pair at TTP (One-time) every time so that users create the signature which is satisfied with unlinkability property In this paper, we propose a new anonymous rights trading system using group signature. This paper has a meaning having applied to digital rights trading system an efficient smart card based group signature.

Exploratory study on the Spam Detection of the Online Social Network based on Graph Properties (그래프 속성을 이용한 온라인 소셜 네트워크 스팸 탐지 동향 분석)

  • Jeong, Sihyun;Oh, Hayoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.5
    • /
    • pp.567-575
    • /
    • 2020
  • As online social networks are used as a critical medium for modern people's information sharing and relationship, their users are increasing rapidly every year. This not only increases usage but also surpasses the existing media in terms of information credibility. Therefore, emerging marketing strategies are deliberately attacking social networks. As a result, public opinion, which should be formed naturally, is artificially formed by online attacks, and many people trust it. Therefore, many studies have been conducted to detect agents attacking online social networks. In this paper, we analyze the trends of researches attempting to detect such online social network attackers, focusing on researches using social network graph characteristics. While the existing content-based techniques may represent classification errors due to privacy infringement and changes in attack strategies, the graph-based method proposes a more robust detection method using attacker patterns.

A Design on The Zone Master Platform based on IIoT communication for Smart Factory Digital Twin (스마트 팩토리 디지털 트윈(Digital Twin)을 위한 IIoT 통신 기반 ZMP(Zone Master Platform) 설계)

  • Park, Seon-Hui;Bae, Jong-Hwan
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.81-87
    • /
    • 2020
  • This paper creates a standard node for acquiring sensor data from various industrial sensors (IoT/non-IoT) for the establishment of Smart Factory Digital Twin, and provides inter-compatible data by linking zones by group/process to secure data stability and to ensure the digital twin (Digital Twin) of Smart Factory. The process of the Zone Master platform contains interface specifications to define sensor objects and how sensor interactions between independent systems are performed and carries out individual policies for unique data exchange rules. The interface for execution control of the Zone Master Platform processor provides system management, declaration management for public-subscribe, object management for registering and communicating status information of sensor objects, ownership management for property ownership sharing, time management for data synchronization, and data distribution management for Route information on data exchange.

Prediction of Housing Price Index using Data Mining and Learning Techniques (데이터마이닝과 학습기법을 이용한 부동산가격지수 예측)

  • Lee, Jiyoung;Ryu, Jae Pil
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.8
    • /
    • pp.47-53
    • /
    • 2021
  • With increasing interest in the 4th industrial revolution, data-driven scientific methodologies have developed. However, there are limitations of data collection in the real estate field of research. In addition, as the public becomes more knowledgeable about the real estate market, the qualitative sentiment comes to play a bigger role in the real estate market. Therefore, we propose a method to collect quantitative data that reflects sentiment using text mining and k-means algorithms, rather than the existing source data, and to predict the direction of housing index through artificial neural network learning based on the collected data. Data from 2012 to 2019 is set as the training period and 2020 as the prediction period. It is expected that this study will contribute to the utilization of scientific methods such as artificial neural networks rather than the use of the classical methodology for real estate market participants in their decision making process.

A Design of File Leakage Response System through Event Detection (이벤트 감지를 통한 파일 유출 대응 시스템 설계)

  • Shin, Seung-Soo
    • Journal of Industrial Convergence
    • /
    • v.20 no.7
    • /
    • pp.65-71
    • /
    • 2022
  • With the development of ICT, as the era of the 4th industrial revolution arrives, the amount of data is enormous, and as big data technologies emerge, technologies for processing, storing, and processing data are becoming important. In this paper, we propose a system that detects events through monitoring and judges them using hash values because the damage to important files in case of leakage in industries and public places is serious nationally and property. As a research method, an optional event method is used to compare the hash value registered in advance after performing the encryption operation in the event of a file leakage, and then determine whether it is an important file. Monitoring of specific events minimizes system load, analyzes the signature, and determines it to improve accuracy. Confidentiality is improved by comparing and determining hash values pre-registered in the database. For future research, research on security solutions to prevent file leakage through networks and various paths is needed.

Big Data Application for Judgment on Consumer's Awareness of the Trademark (상표의 소비자 인식 판단을 위한 빅데이터 활용 방안)

  • You, Hyun-Woo;Lee, Hwan-soo
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.8
    • /
    • pp.399-408
    • /
    • 2016
  • As entering the Big Data age, utilization of Big Data is also increasing in the intellectual property sector. Meanwhile, the purpose of a trademark which distinguishes the source of the goods essentially is to enable the public to recognize the goods. Big Data technologies which is recently becoming a issue can be used as a tool to judge consumer's awareness of the trademark. It was difficult for judgment of trademark awareness through traditional ways. As a new way, survey methodology has bee received attention, and it was applied to the field of trademark law. However, various problems such as cost, time, objectivity, and fairness were observed. In order to overcome theses limitations, this study proposes new way utilizing big data analytics for judgment on consumer's awareness of the trademark. This new way will not only contribute to enhancing the objectivity of judging trademark awareness but also utilized to support for related legal judgments.

A Study on the Mechanism between 'National Crisis Management' and 'National Defense Elements'in the Perspective of Comprehensive Security - Focusing on the Principles, Problems, and Altenatives of'Integrated Defense'- (포괄안보 관점의 국가위기관리와 국가방위 요소간의 관계 연구 - 통합방위의 원칙, 문제, 그리고 대안을 중심으로 -)

  • Kim Tai Jin
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.115-126
    • /
    • 2022
  • This study studied the working relationship between national crisis management and national defense elements from a comprehensive security perspective. The elements of national defense are presented in the Integrated Defense Act. Therefore, by presenting the principles, problems, and alternatives of integrated defense, the study was conducted with the aim of protecting the lives and property of the people in the event of a national crisis and strengthen national security. As a theoretical background, an analysis frame was envisioned based on the four stages of crisis management in the 'Comprehensive Crisis Management Model' and the 'Basic Guidelines for National Crisis Management'. Through this, four domestic and foreign case studies were conducted. As a result of the study, it can be confirmed that related laws, organizations, and public awareness must be provided in order for the national defense elements at each stage of national crisis management to work well. For the completeness of national crisis management, it was suggested that the enactment of the Framework Act on National Crisis Management, the establishment of an integrated defense plan, linked training, C4I for communication, strengthening the capabilities of local government heads, and national defense elements of firefighters.

Development of Urban Flood Analysis Model Adopting the Unstructured Computational Grid (비정형격자기반 도시침수해석모형 개발)

  • Lee, Chang Hee;Han, Kun Yeun;Kim, Ji Sung
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.5B
    • /
    • pp.511-517
    • /
    • 2006
  • Flood damage is one of the most important and influential natural disaster which has an effect on human beings. Local concentrated heavy rainfall in urban area yields flood damage increase due to insufficient capacity of drainage system. When the excessive flood occurs in urban area, it yields huge property losses of public facilities involving roadway inundation to paralyze industrial and transportation system of the city. To prevent such flood damages in urban area, it is necessary to develop adequate inundation analysis model which can consider complicated geometry of urban area and artificial drainage system simultaneously. In this study, an urban flood analysis model adopting the unstructured computational grid was developed to simulate the urban flood characteristics such as inundation area, depth and integrated with subsurface drainage network systems. By the result, we can make use of these presented method to find a flood hazard area and to make a flodd evacuation map. The model can also establish flood-mitigation measures as a part of the decision support system for flood control authority.

Research on Diversification of Transfer Specifications and Reproduction Methods for Administrative Information Datasets (행정정보 데이터세트의 이관규격의 다양화 및 재현 방안에 관한 연구)

  • Dongmin Yang;Kwanghoon Choi;Ji-Hye Kim;Nam-Hee Yoo
    • Journal of the Korean Society for information Management
    • /
    • v.40 no.4
    • /
    • pp.167-200
    • /
    • 2023
  • For the record management of administrative information datasets in Korea, it is recommended to utilize SIARD as a transfer specification when transferring administrative information datasets. However, there are many cases where the application of SIARD is not suitable due to the record management unit of administrative information datasets, technical limitations of tools that support SIARD, and the realistic situation of public institutions. In this study, we propose a plan to diversify the transfer specifications of administrative information datasets other than SIARD. In the record management of administrative information datasets, the need to reproduce the user interface associated with the dataset has been discussed but not specifically presented. This study confirms that the user interface is a property to be preserved from the perspective of Significant Properties, proposes a method to effectively reproduce the user interface, and provides an example of actual verification.