DOI QR코드

DOI QR Code

A Study on Countermeasures using Moire Recognition and Vulnerability of Cryptographic Transaction Protocol

암호화폐 거래 프로토콜의 취약점과 무아레 인식을 이용한 대응방안에 관한 연구

  • Kim, Jin-Woo (Division of Information Communication, Baek-seok University) ;
  • Lee, Keun-Ho (Division of Information Communication, Baek-seok University) ;
  • Yun, Sunghyun (Division of Information Communication, Baek-seok University)
  • 김진우 (백석대학교 정보통신학부) ;
  • 이근호 (백석대학교 정보통신학부) ;
  • 윤성현 (백석대학교 정보통신학부)
  • Received : 2018.11.22
  • Accepted : 2019.01.20
  • Published : 2019.01.28

Abstract

Block chains began by recognizing the danger of centralized control of financial systems after the 2008 financial crisis. From the beginning of 2008, blockchain has been developing a lot of attention and technology, starting with a tremendous innovation called cryptographic destruction based on technology, a block chain called Bitcoin. However, the vulnerability has also been discovered over time and the damage has been repeated. But in the fourth industry of the 21st century, many advances and technologies based on them are expected to emerge. Therefore, this paper proposes new analytical transaction protocols for vulnerabilities in cryptographic currency transactions. The proposed transaction protocol is a way to authenticate once again at the end of the transaction and the transaction is concluded with this authentication. It presents countermeasures by adding security elements between users to the transaction process rather than internal security to transaction vulnerabilities.

2008년 금융위기 사태가 발생한 이후 금융 시스템의 중앙집권의 위험성을 인지하면서 시작된 것이 블록체인이다. 2008년 시작점으로부터 지금까지 블록체인은 비트코인이라는 블록체인 기술 기반 암호화폐란 엄청난 혁신을 시작으로 많은 관심과 기술의 발전이 이루어지고 있는 상황이다. 하지만 이 또한 시간이 지나면서 취약점이 발견되었고 피해 사례 또한 자주 일어나고 있다. 그러나 현재 21세기 4차 산업에 있어 핵심 기술이며 앞으로도 많은 발전과 이를 기반으로 한 기술들이 다수 출현할 것으로 예상된다. 따라서 본 논문은 암호화폐 거래에서의 취약점을 분석하고 새로운 거래 프로토콜을 제안한다. 제안하는 거래 프로토콜은 거래가 끝나는 시점에서 한 번 더 인증을 하게 되고 이러한 인증으로 거래가 성사되는 방식이다. 거래 취약점에 대한 내부적 보안이 아닌 거래 과정에서 사용자들 간의 보안요소를 추가하여 대응방안을 제안한다.

Keywords

JKOHBZ_2019_v9n1_86_f0001.png 이미지

Fig. 1. Moire Pattern

JKOHBZ_2019_v9n1_86_f0002.png 이미지

Fig. 2. a picture of a mozzarean with the thumb of both hands overlapped

JKOHBZ_2019_v9n1_86_f0003.png 이미지

Fig. 3. How to create an electronic wallet for a virtual currency exchange

JKOHBZ_2019_v9n1_86_f0004.png 이미지

Fig. 4. Proposed security protocol when creating an electronic wallet

JKOHBZ_2019_v9n1_86_f0005.png 이미지

Fig. 5. Transactional Authentication Protocol

Table 1. Vulnerabilities

JKOHBZ_2019_v9n1_86_t0001.png 이미지

Table 2. Proposed protocol comparison table

JKOHBZ_2019_v9n1_86_t0002.png 이미지

References

  1. S. Nakamoto. (2018, Apr). Bitcoin: A Peer-to-Peer Eletronic Cash System. https://bitcoin.org/bitcoin.pdf.
  2. F. A Petitcolas, R. J. Anderson & M. G. Kuhn. (1999). Information Hidden ? A Survey. Proceedings of the IEEE, special issue on protection of multimedia content.
  3. N. F. Johnson & S. Jajodia. (1998). Exploring steganography: Seeing the unseen. Computer, 31(2). https://doi.org/10.1109/2.652905
  4. H. O. Kang & J. Y. Choi. (2003). Key Generation Method using the Moire Patterns for Security. KOREA INFORMATION SCIENCE SOCIETY, 766-768.
  5. B. Schneier. (1996). Applied Cryptography. New York, USA : John wiley & Sons.
  6. I. H. Kim, K. C. Yook & J. H. Jang. (1992). Measurement of Rotation Angle using Moire Interference Pattern of Two Circular Gratings. New Physics, 32, 674-678.
  7. doopedia. https://terms.naver.com/entry.nhn?docId=1261281&cid=40942&categoryId=32235
  8. S. G. Kang, H. J. Bae, S. H. Lim & Y. S. Lee. (2017). A Study on the Vulnerability and Countermeasures of Bitcoin. Proceedings of the Korean Society of Computer Information Conference, 25(2), 124-127.
  9. Financial Security Institute. (2017). BlockChain Technology and Security Considerations.
  10. S. J. Seong. (2017). Legal challenges for activating blockchain - negative regulation discussion. BUSINESS LAW REVIEW, 31(2), 325-352. https://doi.org/10.24886/BLR.2017.06.31.2.325
  11. J. S. Kim. (2018). Service Status and Problem Analysis Based on Blockchain. The Society of Convergence Knowledge Transactions, 6(1), 135-140. https://doi.org/10.22716/SCKT.2018.6.1.019
  12. J. Y. Lee. (2017). Block Chain Technology Trends and Implications. Science and Technology Policy Institute, 1-21.
  13. B. K. Min, Y. J. Sung & W. I. Park. (2018). Is sues and Policy Implications of Bitcoin and Block Chain. Gyeonggi Research Institute, 1-27.
  14. Y. D. Hwan. (2003). A Study on Development of High-Speed 3D Shape Measuring System Using Moire Measurement Technology. Industrial Technology Development Project.
  15. Y. S. Chung & J. S. Cha. (2018). The Security Risk and Countermeasures of Blockchain based Virtual Currency Trading. Korea Information Electron Communication Technology.
  16. The Kyunghyang Shinmun. http://biz.khan.co.kr/khan_art_view.html?artid=201707031758001&%3Bcode=9 20100