• Title/Summary/Keyword: security characteristic

Search Result 449, Processing Time 0.024 seconds

A Characteristic of Nonlinear Filter Models based on LFSMs (LFSM기한의 비선형 필터 모델의 특성)

  • Hong, Jin;Lee, Dong-Hoon;Ji, Sung-Taek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.75-83
    • /
    • 2004
  • We present a realization of an LFSM that utilizes an LFSR. This is based on a well-known fact from linear algebra. This structure is used to show that a previous attempt at using a cellular automata in place of an LFSR in constructing a stream cipher did not necessarily increase its security. We also give a general method for checking whether or not a nonlinear filter generator based on an LFSM allows reduction to one that is based on an LFSR and which is vulnerable to Anderson information leakage.

A Review on Preserving Data Confidentiality in Blockchain-based IoT-Supply Chain Systems

  • Omimah Alsaedi;Omar Batarfi;Mohammed Dahab
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.110-116
    • /
    • 2023
  • Data confidentiality refers to the characteristic that information kept undisclosed or hidden from unauthorized parties. It considered a key security requirement in current supply chain management (SCM) systems. Currently, academia and industry tend to adopt blockchain and IoT technologies in order to develop efficient and secure SCM systems. However, providing confidential data sharing among these technologies is quite challenging due to the limitations associated with blockchain and IoT devices. This review paper illustrates the importance of preserving data confidentiality in SCM systems by highlighting the state of the art on confidentiality-preserving methodologies in the context of blockchain based IoT-SCM systems and the challenges associated with it.

ON THE SECURITY OF CERTAIN HYPERELLIPTIC CURVES

  • KIM, INSUK;JUN, SUNGTAE
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.4 no.1
    • /
    • pp.23-28
    • /
    • 2000
  • We compute the order of jacobian groups of hyperelliptic curves on a finite field of characteristic 3 and we determine which curves are secure against known attacks.

  • PDF

Design of Improved Authentication Protocol for Sensor Networks in IoT Environment (사물인터넷 환경에서 센서 네트워크에 대한 개선된 인증 프로토콜 설계)

  • Kim, Deuk-Hun;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.467-478
    • /
    • 2015
  • Recently interest in Internet of Things(IoT) is increasing, and a variety of the security technologies that are suitable for Internet of Things has being studied. Especially sensor network area of the device is an increased using and diversified for a low specification devices because of characteristic of the Internet of Things. However, there is difficulty in directly applying the security technologies such as the current authentication technologies to a low specification device, so also increased security threats. Therefore, authentication protocol between entities on the sensor network communication in Internet of Things has being studied. In 2014, Porambage et al. suggested elliptic curve cryptography algorithm based on a sensor network authentication protocol for advance security of Internet of Things environment, but it is vulnerability exists. Accordingly, in this paper, we analyze the vulnerability in elliptic curve cryptography algorithm based on authentication protocol proposed by Porambage et al. and propose an improved authentication protocol for sensor networks in Internet of Things environment.

Conceptual Exploratory on Security Martial Arts' Spirit (경호무도 정신특성의 개념 탐색)

  • Kim, Dong-Hyun
    • Journal of the Society of Disaster Information
    • /
    • v.8 no.3
    • /
    • pp.213-222
    • /
    • 2012
  • The purpose of this study was to extract the spiritual characteristic factors of the security martial arts qualitatively which are emphasized in guard situation. To get the purpose of this study, 216 people who are students majored in security service, security service professionals, specialists of practical and theoretical security martial arts were selected as participants for this study. The results of this study were as follows. There were divided 4 sub-factors and 20 detailed factors. The spiritual characteristics of the security martial arts were named psychological spirit which was consisted of concentration, self-confidence, self-management, flow, and self-esteem, ethical spirit which was consisted of sacrifice, justice, royalty, peace, and sense of duty, martial arts' spirit which was consisted of courtesy, toughness, defense, balance of mind and body, and bravery, and practical spirit which was consisted of responsibility, cooperation, modesty, determination, and professionalism.

Who Cares More about Security?: Effects of Personality Traits on PC Security Intention (누가 보안에 더 신경을 쓰는가?: 성격특성이 PC보안의도에 미치는 영향)

  • June-Young Kim;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.99-114
    • /
    • 2018
  • Technical measures for computer security are essential, but they are not a sufficient condition for security. Therefore, a personal approach to user's security behavior should be developed. Personality, which is a human aspect, is a behavioral characteristic that characterizes each individual and facilitates prediction of how an individual will behave in certain situations. Protection motivation theory has been used extensively in the security research on human behavior. The present study discusses how protection motivation was formed from personality traits. Thus, organizations can refer the result of this study for their HRD and HRM concerns.

Metro Telecommunication Basis Facilities Standardization and Functional Improvement Research (도시철도 구내정보통신 기반설비 표준화 및 기능 향상방안)

  • Kim Moon-Tae;Yoon In-Young
    • Proceedings of the KSR Conference
    • /
    • 2005.11a
    • /
    • pp.964-968
    • /
    • 2005
  • The standardization of information communication is doing a Internal each other connection and each other characteristic stability operation security in objective. From the low-speed network of the subway operation beginning currently it changes with the superhigh speed digital information transmission communication service environment which is a quality service, the hazard which plans the quality improvement of the efficient communication service use which hits to here and passenger service the standardization of the technical standard which stands and the improvement which hits to an engineering standard and facility must come to accomplish. The facility which existing is been old or the enclosure communication equipments which are insufficient. it improves, establishment itexpands efficiently, like this facilities it is stabilized and it is economic and rationally use maintenance it manages with the plan for the inside and outside of the country information communication relation technical standard and engineering standard service feature improvement and future expandability and economical efficiency, the possibility of having a pliability in order to be, rational technical standard and standard it takes a triangular position, efficient characteristic security of information communication service there is a place objective which promises the rational development of course city railroad communication system with character. Function improvement of enclosure communication base equipment, against an improvement and standardization plan it described trom the prosecution which it sees.

  • PDF

A Group Key Management Scheme for WSN Based on Lagrange Interpolation Polynomial Characteristic

  • Wang, Xiaogang;Shi, Weiren;Liu, Dan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3690-3713
    • /
    • 2019
  • According to the main group key management schemes logical key hierarchy (LKH), exclusion basis systems (EBS) and other group key schemes are limited in network structure, collusion attack, high energy consumption, and the single point of failure, this paper presents a group key management scheme for wireless sensor networks based on Lagrange interpolation polynomial characteristic (AGKMS). That Chinese remainder theorem is turned into a Lagrange interpolation polynomial based on the function property of Chinese remainder theorem firstly. And then the base station (BS) generates a Lagrange interpolation polynomial function f(x) and turns it to be a mix-function f(x)' based on the key information m(i) of node i. In the end, node i can obtain the group key K by receiving the message f(m(i))' from the cluster head node j. The analysis results of safety performance show that AGKMS has good network security, key independence, anti-capture, low storage cost, low computation cost, and good scalability.

Generation of Maximum Length Cellular Automata (최대길이를 갖는 셀룰라 오토마타의 생성)

  • Choi Un-Sook;Cho Sung-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.25-30
    • /
    • 2004
  • Linear cellular automata(CA) which generate maximum-length cycles, have wide applications in generation of pseudo-random patterns, signature analysis, cryptography and error correcting codes etc. Linear CA whose characteristic polynomial is primitive has been studied. In this paper Ive propose a effective method for generation of a variety of maximum-length CA(MLCA). And we show that the complemented CA's derived from a linear MLCA are all MLCA. Also we analyze the Properties of complemented MLCA. And we prove that the number of n-cell MLCA is ${\phi}(2^{n}-1)2^{n+1}$/n.

Improved Differential Attack of Seven-Round SEED (7-라운드 SEED에 대한 향상된 차분 공격)

  • Sung, Jae-Chul
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.25-30
    • /
    • 2010
  • Block Cipher SEED which was developed by KISA are not only Korea national standard algorithm of TTA but also one of standard 128-bit block ciphers of ISO/IEC. Since SEED had been developed, many analyses were tried but there was no distinguishing cryptanalysis except the 7-round differential attack in 2002. The attack used the 6-round differential characteristic with probability $2^{-124}$ and analyzed the 7-round SEED with $2^{127}$ chosen plaintexts. In this paper, we propose a new 6-round differential characteristic with probability $2^{-110}$ and analyze the 7-round SEED with $2^{113}$ chosen plaintexts.