• Title/Summary/Keyword: security window

Search Result 118, Processing Time 0.021 seconds

A Web Based Error Manager for Societal Security Service (웹 기반 사회 안전 서비스를 위한 오류 관리기)

  • Ko, Eung-Nam;Hong, Sung-Ryong
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.87-91
    • /
    • 2014
  • This paper suggested a web based error manager for societal security service. This is a system that is suitable for detecting, sharing and recovering software error based on multimedia CSCW(Computer Supportes Cooperated Work). With error sharing system, a group cooperating users can share error applications. Our a web based error manager for societal security service enables user to share error objects through interaction awareness. This method has a file sharing, a window copy, a window overlay, or a window sharing. We implemented the web based error manager for societal security service so that the users participated in collaborative work may refer shared error objects as the same view to others.

A Fast Exponentiation Algorithm Using A Window Method and a Factor Method (윈도우 방법과 인수 방법을 혼합한 빠른 멱승 알고리즘)

  • 박희진;박근수;조유근
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.73-79
    • /
    • 2000
  • We show how to reduce the number of multiplications required for an exponentiation by using a window method and a factor method. This method requires 599 multiplications for a 512-bit integer exponent while the window method with window size 5 requires 607 multiplications. This method requires fewest multiplications among practical exponentiation algo- rithms.

A Study on the Establishing of Single Window System for Simplification of Trade Procedures (무역절차 간소화를 위한 Single Window 구축에 대한 연구)

  • Song, Seon-Uk
    • International Commerce and Information Review
    • /
    • v.7 no.4
    • /
    • pp.157-177
    • /
    • 2005
  • In many countries, a Single Window system for simplifications is establishing in order to reduce works submitted double data and compliance costs. A Single Window is defined as a facility that allows parties involved in trade and transport to lodge standardized information and documents with a single entry point to fulfil all import, export, and transit-related regulatory requirements. A Single window can bring improved level of security, faster clearance and reduced compliance costs. UN/CEFACT released "Recommendation and Guidelines on establishing a Single Window to enhance the efficient exchange of information between trade and government". Also, WCO has made progress several projects to assist effective establishing a single window, i.e. CDM, UCR, ICT. Korea has being established a single window system, "e-trade platform" connected with trade, clearance, logistics, marketing and payment system. Some suggestions to establish a effective single window system in Korea are as follows. Firstly, it is necessary to clearly define roles and responsibilities of a lead agency in a single window system and form a organic relationship with PGA. Secondly, a single window system has to be progressed by stages, namely, customs clearance portal system should be established first, and later established e-trade platform. Lastly, the Korean government has to take part in CDM project to gain an advantage over other countries.

  • PDF

Design of Window Applicable Blind-type Frequency Selective Surface

  • Lee, In-Gon;Hong, Ic-Pyo
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.2
    • /
    • pp.682-685
    • /
    • 2014
  • In this paper, we presented the window applicable blind-type frequency selective surface to control the coverage area of wireless communication in secure building or conference room. The proposed frequency selective structure has the reconfigurable frequency range depends on its blind rotation angle. To verify the proposed structure, we fabricated the window blind-type frequency selective surface with four-legged loaded element and ring-type element as a unit cell and performed measurements of the transmission characteristics for different blind rotation angles to prove the feasibility. The measurement results show good agreements with the simulation results. One of the advantages is that the proposed structure does not need to have a bias circuit, so it is very easy to implement at low cost and also can be applied to any planar surface for wireless security applications.

A Study on the Improvements of Security and Quality for Analog Speech Scrambler (아날로그 음성 비화기의 비도 및 음질 향상에 관한 연구)

  • 공병구;조동호
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.30B no.9
    • /
    • pp.27-35
    • /
    • 1993
  • In this paper, a new algorithm for high level security and quality of speech is proposed. The algorithm is based on the rearrangement of the fast fourier transform (FFT) coefficients with pre and post filter process, hamming window and adaptive pseudo spectrum insertion. Then, the pre and post filters are used for the whitening of speech spectrum and the adaptive pseudo spectrum is inserted for the unclassification of silence/speech. Also, the hamming window technique is applied for the robustness to the syncronization error in the telephone line. According to the simulation results, it can be seen that the security of scrambled signal and the quality of descrambled signal have been improved fairly in both subjective and objective performance test and the new FFT scrambler is robust to the synchronization error.

  • PDF

Security Evaluation Against Collision-based Power Analysis on RSA Algorithm Adopted Exponent Splitting Method (지수 분할 기법이 적용된 RSA 알고리듬에 대한 충돌 전력 분석 공격 안전성 평가)

  • Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.985-991
    • /
    • 2015
  • The user's secret key can be retrieved by various side channel leakage informations occurred during the execution of cryptographic RSA exponentiation algorithm which is embedded on a security device. The collision-based power analysis attack known as a serious side channel threat can be accomplished by finding some collision pairs on a RSA power consumption trace. Recently, an RSA exponentiation algorithm was proposed as a countermeasure which is based on the window method adopted combination of message blinding and exponent splitting. In this paper, we show that this countermeasure provides approximately $2^{53}$ attack complexity, much lower than $2^{98}$ insisted in the original article, when the window size is two.

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.313-319
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.

Elliptic Curve Scalar Multiplication Resistant against Side Channel Attacks (부채널 공격에 안전한 타원곡선 스칼라 곱셈 알고리즘)

  • Kim Tae Hyun;Jang Sang-Woon;Kim Woong Hee;Park Young-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.125-134
    • /
    • 2004
  • When cryptosystem designers implement devices that computing power or memory is limited such as smart cards, PDAs and so on, not only he/she has to be careful side channel attacks(SCA) but also the cryptographic algorithms within the device has to be efficient using small memory. For this purpose, countermeasures such as Moiler's method, Okeya-Takagi's one and overlapping window method, based on window method to prevent SCA were proposed. However, Moiler's method and Okeya-Talngi's one require additional cost to prevent other SCA such as DPA, Second-Order DPA, Address-DPA, and so on since they are immune to only SPA. Also, overlapping window method has a drawback that requires big memory. In this paper, we analyze existing countermeasures and propose an efficient and secure countermeasure that is immune to all existing SCA using advantages of each countermeasure. Moreover, the proposed countermeasure can enhance the efficiency using mixed coordinate systems.

Numerical investigation of glass windows under near-field blast

  • Chiara Bedon;Damijan Markovic;Vasilis Karlos;Martin Larcher
    • Coupled systems mechanics
    • /
    • v.12 no.2
    • /
    • pp.167-181
    • /
    • 2023
  • The determination of the blast protection level and the corresponding minimum load-bearing capacity for a laminated glass (LG) window is of crucial importance for safety and security design purposes. In this paper, the focus is given to the window response under near-field blast loading, i.e., where relatively small explosives would be activated close to the target, representative of attack scenarios using small commercial drones. In general, the assessment of the load-bearing capacity of a window is based on complex and expensive experiments, which can be conducted for a small number of configurations. On the other hand, nowadays, validated numerical simulations tools based on the Finite Element Method (FEM) are available to partially substitute the physical tests for the assessment of the performance of various LG systems, especially for the far-field blast loading. However, very little literature is available on the LG window performance under near-field blast loads, which differs from far-field situations in two points: i) the duration of the load is very short, since the blast wavelength tends to increase with the distance and ii) the load distribution is not uniform over the window surface, as opposed to the almost plane wave configuration for far-field configurations. Therefore, the current study focuses on the performance assessment and structural behaviour of LG windows under near-field blasts. Typical behavioural trends are investigated, by taking into account possible relevant damage mechanisms in the LG window components, while size effects for target LG windows are also addressed under a multitude of blast loading configurations.

Group Key Management with Self-healing Applying the Concept of Sliding-window for Wireless Sensor Networks (무선 센서 네트워크에서 슬라이딩 윈도우 개념이 적용된 Self-healing을 사용하는 그룹키 관리)

  • Lee Jae-Won;Kim Hyung-Chan;Ramakrishna R.S.
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.604-607
    • /
    • 2006
  • Self-heating 키 분배 기법은 불안정한 네트워크 환경에서 그룹 키를 설정할 수 있게 하며, 그룹을 가입하거나 탈퇴하는 멤버 노드들에 의한 공모 공격에 대한 안전성으로 인하여, 센서 네트워크 환경에 적합한 방식이다. 하지만 기존에 제안된 Self-healing 키 분배 기법들은 브로드캐스트 되는 메시지의 통신량과 그룹 멤버의 그룹 키 복원을 위한 정보 저장량 측면에서 비효율적인 문제가 있다. 본 논문에서는 슬라이딩 윈도우(Sliding Window) 개념을 도입함으로써 향상된 Self-healing 키 분배 기법을 제안하여, 브로드캐스트 되는 메시지의 크기를 줄이고 멤버 노드 단위의 메모리에 대한 효율성을 향상시킨다.

  • PDF