• Title/Summary/Keyword: strength of security

Search Result 282, Processing Time 0.024 seconds

Comparative analysis of blockchain trilemma

  • Soonduck Yoo
    • International journal of advanced smart convergence
    • /
    • v.12 no.1
    • /
    • pp.41-52
    • /
    • 2023
  • The purpose of this study is to review the proposed solutions to the Blockchain trilemma put forward by various research scholars and to draw conclusions by comparing the findings of each study. We found that the models so far developed either compromise scalability, decentralization, or security. The first model compromises decentralization. By partially centralizing the network, transaction processing speed can be improved, but security strength is weakened. Examples of this include Algorand and EOS. Because Algorand randomly selects the node that decides the consensus, the security of Algorand is better than EOS, wherein a designated selector decides. The second model recognizes that scalability causes a delay in speed when transactions are included in a block, reducing the system's efficiency. Compromising scalability makes it possible to increase decentralization. Representative examples include Bitcoin and Ethereum. Bitcoin is more vital than Ethereum in terms of security, but in terms of scalability, Ethereum is superior to Bitcoin. In the third model, information is stored and managed through various procedures at the expense of security. The application case is to weaken security by applying a layer 1 or 2 solution that stores and reroutes information. The expected effect of this study is to provide a new perspective on the trilemma debate and to stimulate interest in continued research into the problem.

Quantum Cryptanalysis for DES Through Attack Cost Estimation of Grover's Algorithm (Grover 알고리즘 공격 비용 추정을 통한 DES에 대한 양자 암호 분석)

  • Jang, Kyung-bae;Kim, Hyun-Ji;Song, Gyeong-Ju;Sim, Min-Ju;Woo, Eum-Si;Seo, Hwa-Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1149-1156
    • /
    • 2021
  • The Grover algorithm, which accelerates the brute force attack, is applicable to key recovery of symmetric key cryptography, and NIST uses the Grover attack cost for symmetric key cryptography to estimate the post-quantum security strength. In this paper, we estimate the attack cost of Grover's algorithm by implementing DES as a quantum circuit. NIST estimates the post-quantum security strength based on the attack cost of AES for symmetric key cryptography using 128, 192, and 256-bit keys. The estimated attack cost for DES can be analyzed to see how resistant DES is to attacks from quantum computers. Currently, since there is no post-quantum security index for symmetric key ciphers using 64-bit keys, the Grover attack cost for DES using 64-bit keys estimated in this paper can be used as a standard. ProjectQ, a quantum programming tool, was used to analyze the suitability and attack cost of the quantum circuit implementation of the proposed DES.

A Study on a Countermeasure Program using the Martial Arts for a Security Guard Caused by an Accidental Situation (우발상황시 경호무도 대응방안)

  • Park, Jun-Seok;Kang, Young-Gil
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.327-340
    • /
    • 2003
  • As a countermeasure under accidental occurrence situation, First, as application form of martial arts, A security guard foster ability that can protect a target person of guard and own body under accidental occurrence situation through incessant martial arts practice. To achieve this purpose, incessant training mental power and physical strength reinforcement should be kept on to prevent, therefore make a safety control function for such as weapon, small arms, explosive, vehicles terror etc. happened under accidental occurrence situation. Second, according to the contents of training based on the classification category of martial arts for security guard under accidental situation, a security guard must keep safety distance necessarily lest a target person of gurad should be attacked by attacker, therefore, intercept an attack opportunity if a safety distance between a target person of guard and attacker is not kept. Third, It is to practice confrontation techniques based on the type of attack. A security guard must develp situation disposal ability that can cope properly with the attack using empty hands, murderous weapon, small arms, explosive by case or individual or mass of threat that impose danger and injury in a target person's body of guard.

  • PDF

Security-intensified SSL VPN and WLCAPT Virtual Server Design (SSL VPN의 보안 강화와 WLCAPT 가상 서버 설계)

  • Jeong Eun-Hee;Choi Eun-Sil;Lee Byung-Kwan
    • Journal of Internet Computing and Services
    • /
    • v.5 no.6
    • /
    • pp.45-58
    • /
    • 2004
  • This paper consists of two parts, One is the ECC( GF(2/sup m/)) algorithm to improve the security strength and the processing time of SSL VPN and the other is the WLCAPT algorithm instead of LSNAT for the security strength of virtual server. In general when corporates use SSL protocol in order to build VPN, they use RSA algorithm with the problem of security and processing time about authentication and confidentiality, In this paper, a shared public key is generated with ECSPK which uses ECC( GF(2/sup m/)) algorithm to improve the security and processing time instead of RSA In addition, WLCAPT algorithm proposed in this paper is applied to virtual server which resides in the server side and then after NAT translation, the actual server of headquarter is securely communicated with it.

  • PDF

Study of thin film transition liquid crystal display (TFT-LCD) optical waste glass applied in early-high-strength controlled low strength materials

  • Wang, Her-Yung;Chen, Jyun-Sheng
    • Computers and Concrete
    • /
    • v.5 no.5
    • /
    • pp.491-501
    • /
    • 2008
  • The present study verifies compressive strength, ultrasonic pulse velocity, electrical resistance,permeable ratio, and shrinkage from waste glass controlled low strength materials (WGCLSM) and early-high-strength WGCSLM specimens, by replacing the sand with waste glass percentages of 0%, 10%,20%, and 30%. This study reveals that increasing amounts of waste LCD glass incorporated into concrete increases WGCLSM fluidity and reduces the setting time, resulting in good working properties. By increasing the glass to sand replacement ratio, the compressive strength decreases to achieve low-strength effects. Furthermore, the electrical resistance also rises as a result of increasing the glass to sand replacement ratio. Early-high-strength WGCSLM aged 28 days has twice the electrical resistance compared to general WGCSLM. Early-high-strength WGCSLM aged 7 days has a higher ultrasonic pulse velocity similar to WGCSLM aged 28 days. The variation of length with age of different compositions is all within the tolerance range of 0.025%. This study demonstrates that the proper composition ratio of waste LCD glass to sand in early-high-strength WGCSLM can be determined by using different amounts of glass-sand. A mechanism for LCD optical waste glass usage can be established to achieve industrial waste minimization, resource recycling, and economic security.

Privacy-Preserving NFC-Based Authentication Protocol for Mobile Payment System

  • Ali M. Allam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1471-1483
    • /
    • 2023
  • One of the fastest-growing mobile services accessible today is mobile payments. For the safety of this service, the Near Field Communication (NFC) technology is used. However, NFC standard protocol has prioritized transmission rate over authentication feature due to the proximity of communicated devices. Unfortunately, an adversary can exploit this vulnerability with an antenna that can eavesdrop or alter the exchanged messages between NFC-enabled devices. Many researchers have proposed authentication methods for NFC connections to mitigate this challenge. However, the security and privacy of payment transactions remain insufficient. We offer a privacy-preserving, anonymity-based, safe, and efficient authentication protocol to protect users from tracking and replay attacks to guarantee secure transactions. To improve transaction security and, more importantly, to make our protocol lightweight while ensuring privacy, the proposed protocol employs a secure offline session key generation mechanism. Formal security verification is performed to assess the proposed protocol's security strength. When comparing the performance of current protocols, the suggested protocol outperforms the others.

The com.mit.ted unit, the strength, The Organization, and The battle formation of the Silla Force During the Silla-Baekche War at 660 A.D (신라가 대백제전시(서기 660년) 투입하였던 부대수, 병력수, 부대편제, 전투대형)

  • Yoon, Il-Young
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.393-599
    • /
    • 2007
  • In order to restore the Hwangsanbeol Combat at present, it is necessary to make a close examination on the name of the military cops, the number of units, and the numerical strength, an unit organization, and a combat formation. Based on Samguksagi, Samgukyusa, other historical documents and military history information, I tried to restore the Hwansanbeol Combat as follow. The Shilla, at the 7 year of Mooyeol Dynasty, AD. 660, maintained 35 military units. The Shilla committed18 military units from among 35 units to battle against Baekje at the 7 Year of Mooyeol Danasty. The names ofmilitary units are as follow: 1) Daedang, 2) Sangjoojeong, 3) Hajoojeong, 4) Seodang, 5) Nangdang, 6) Eumlihwajeong, 7) Samryanghwajeong, 8) Sosarnjeong, 9) Namcheonjeong, 10) Leehwahaejeong, 11) Kaegeumdang, 12) Geupdang, 13) Nodang, 14) Woonjaednag, 15) Chungdang, 16) Suktoodang, 17) Gwidang, and 18) Soogun. The numerical strength, which the Shilla maintained at the year of A.D. 660, was total 106,353 persons from 35 military units. Shilla committed 57,433 military personnel to combats against the Great Baekche. Ground Forces from the 57,433 personnel were 58,343 persons, and the naval forces were 9,100 persons. Finally, 2,602 persons from among the 9,100 naval forces were only combating forces, and non-combat forces were 6498 persons.

  • PDF

Police Officers' Perception Concerning the Roles of Private Security (민간경비의 역할에 대한 경찰관의 인식연구)

  • Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.101-118
    • /
    • 2009
  • Despite large increases in the growth of the private security industry in the last few decades, very little empirically based information has been collected on the roles of private security within current Korean literature. Attempting to address this gap, this study examined perceptions of the roles of private security by surveying 212 police officers. In order to measure the strength of police officers' perception, not only quantitative but also qualitative methods were adopted. Overall, results of the study indicate that police officers considered private security as an adjunct to the police. However, they also believed that private security industry would grow to get square with the police in the near future. Concerning the specific roles of private security, police officers rated the roles of loss prevention and protection more highly than those of crime prevention and order maintenance. This result reveals that police officers thought private security had focused more on the roles related to the pursuit of profits than on the roles tied to its public functions.

  • PDF

Development of Cyber Security Assessment Methodology for the Instrumentation & Control Systems in Nuclear Power Plants (원전 계측제어시스템에 대한 사이버보안성 평가 방법론 개발)

  • Kang, Young-Doo;Chong, Kil-To
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.9
    • /
    • pp.3451-3457
    • /
    • 2010
  • Cyber security assessment is the process of determining how effectively an entity being assessed meets specific cyber security objectives. Cyber security assessment helps to measure the degree of confidence one has and to identify that the managerial, technical and operational measures work as intended to protect the I&C systems and the information it processes. Recently, needs for cyber security on digitalized nuclear I&C systems are increased. However the overall cyber security program, including cyber security assessment, is not established on those systems. This paper presents the methodology of cyber security assessment which is appropriate for nuclear I&C systems. This methodology provides the qualitative assessments that may formulate recommendations to bridge the security risk gap through the incorporated criteria. This methodology may be useful to the nuclear organizations for assessing the weakness and strength of cyber security on nuclear I&C systems. It may be useful as an index to the developers, auditors, and regulators for reviewing the managerial, operational and technical cyber security controls, also.

Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems (UHF 수동형 RFID 시스템에 적합한 경량 고속의 보안 프로토콜 설계 및 구현)

  • Kang, You-Sung;Choi, Yong-Je;Choi, Doo-Ho;Lee, Sang-Yeoun;Lee, Heyung-Sup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.117-134
    • /
    • 2010
  • A passive RFID tag which received attention as a future technology for automatic and quick identification faces some difficulties about security problems such as tag authentication, reader authentication, data protection, and untraceability in addition to cost and reliable identification. A representative passive RFID technology is the ISO/IEC 18000-6 Type C which is an international standard for 900 MHz UHF-band. This standard has some difficulties in applying to the security services such as originality verification, tag's internal information protection, and untraceability, because it does not provide high-level security solution. In this paper, we summarize security requirements of ISO/IEC ITC 1/SC 31 international standardization group, propose security protocols suitable for the UHF-band passive RFID system using a crypto engine, and analyze its security strength. In addition, we verify that it is possible to implement a tag conforming with the proposed security protocols by presenting concrete command/response pairs and cryptographic method.