• Title/Summary/Keyword: 공격각

Search Result 603, Processing Time 0.026 seconds

Proposal and Analysis of Primality and Safe Primality test using Sieve of Euler (오일러체를 적용한 소수와 안전소수의 생성법 제안과 분석)

  • Jo, Hosung;Lee, Jiho;Park, Heejin
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.438-447
    • /
    • 2019
  • As the IoT-based hyper-connected society grows, public-key cryptosystem such as RSA is frequently used for encryption, authentication, and digital signature. Public-key cryptosystem use very large (safe) prime numbers to ensure security against malicious attacks. Even though the performance of the device has greatly improved, the generation of a large (safe)prime is time-consuming or memory-intensive. In this paper, we propose ET-MR and ET-MR-MR using Euler sieve so it runs faster while using less memory. We present a running time prediction model by probabilistic analysis and compare time and memory of our method with conventional methods. Experimental results show that the difference between the expected running time and the measured running time is less than 4%. In addition, the fastest running time of ET-MR is 36% faster than that of TD-MR, 8.5% faster than that of DT-MR and the fastest running time of ET-MR-MR is 65.3% faster than that of TD-MR-MR and similar to that of DT-MR-MR. When k=12,381, the memory usage of ET-MR is 2.7 times more than that of DT-MR but 98.5% less than that of TD-MR and when k=65,536, the memory usage of ET-MR-MR is 98.48% less than that of TD-MR-MR and 92.8% less than that of DT-MR-MR.

A Study on the Kindergarten Teacher's Experience in the Child Violence (아동폭력에 대한 유치원 교사의 경험에 관한 연구)

  • Seo, Young-Min;Shin, Nam-Joo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.362-371
    • /
    • 2019
  • The purpose of this study is to recognize kindergarten teachers' experiences of child violence for identifying the site's needs for the implementation of preventive education in early childhood and to provide basic data on child violence. To this end, nine teachers were interviewed in-depth. From the study results, first, child violence-related child behavior, which usually occurs in kindergartens, includes physical assault, aggression, verbal violence, threats and threats, and bullying. Second, teachers usually use direct intervention laws in cases of child violence, but were finding it difficult to intervene properly with many tasks or high teacher-to-child ratios. Teachers recognized the need for lower teacher-to-child ratios and placement of each class burden. Third, teachers were aware of the need for prevention education for child violence targeting infants, and instigated the following appropriate interactions immediately after problem behavior occurred: large group activities, specific multimedia education data and parent education. Fourth, teachers are concerned about the possibility of problem behavior being learned and imitated through education in the implementation of prevention education for children's violence. Therefore, this study proposed the need to develop various teaching methods that could be applied to infant education sites, focusing on the types of child violence-related problem behaviors that occur in kindergartens.

Non-Contact Injury Risk in Lower Extremity depending on Global Positioning System Variables among Female Field Hockey Players (여자필드하키선수의 Global Positioning System 변인에 따른 비접촉성 하지부상 발생위험도)

  • Choi, Hokyung;Kim, Eunkuk;Park, Jong-Chul;Kim, Taegyu
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.9
    • /
    • pp.273-281
    • /
    • 2019
  • This study aimed to qualify the amount of movement during game-based training and competition by using a GPS and to identify the non-contact injury risk in lower extremities for female field hockey enrolled in Korean national team. A total of 52 players were participated in this study and their GPS data collected during training and competition were averaged for 1 week and 4 weeks. And then, an injury risk in lower extremities was calculated for each category of the amount of movement in GPS variables that were related to non-contact injury. In forwards, the injury risk was the lowest in the moderate-low category of total distance covered and repeated high-intensity effort bout and the high category of high intensity distance for 1 week, but the risk decreased as the amount of high intensity distance increased for 4 weeks. In midfielders, the injury risk was the lowest in the low category of total distance covered, high intensity distance, repeated high-intensity effort bout and deceleration bout for 1 week.

A study on national cybersecurity policy agenda in Korea using national cyber capability assessment model (국가 사이버 역량평가 모델을 활용한 국내 사이버안보 정책 의제 도출 연구)

  • Song, Minkyoung;Bae, Sunha;Kim, So-Jeong
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.89-100
    • /
    • 2021
  • The National Cyber Capability Assessment(NCCA) could be used as meaningful information for improving national cyber security policy because it provides information on the elements necessary for strengthening national cyber capabilities and the level of each country. However, there were few studies on improving cyber capabilities using the NCCA result in Korea. Therefore, we analyzed the result of National Cyber Power Index(NCPI) conducted by Belfer Center of Harvard Univ. by applying modified-IPA method to derive cybersecurity policy agendas for Korea. As a result, the need to set agendas on surveillance and offensive cyber capability and improve the effectiveness of policy implementation for intelligence and defense was drawn. Moreover, we suggested need for in-depth study of each policy agenda deduced from preceding research data as a future tasks. And it is expected to increase practical use of NCCA for domestic policy analysis by developing and using our own NCCA model which considered analysis framework proposed in this study.

Key Exchange Protocols for Domestic Broadband Satellite Access Network (광대역 위성 엑세스 방을 위한 키 교환 프로토콜 제안)

  • 오흥룡;염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.13-25
    • /
    • 2004
  • The key exchange protocols are very crucial tools to provide the secure communication in the broadband satellite access network. They should be required to satisfy various requirements such as security, key confirmation, and key freshness. In this paper, we present the guideline of security functions in BSAN(Broadband Satellite Access Network), and analyze the specification of the security primitives and the hey exchange Protocols for the authenticated key agreement between RCST(Return Channel Satellite Terminal) and NCC(fretwork Control Centre). In addition, we propose the security specification for a domestic broad satellite network based on the analysis on the analysis profile of ETSI(European Telecommunications Standards Institute) standards. The key exchange protocols proposed in ETSI standard are vulnerable to man-in-the-middle attack and they don't provide key confirmation. To overcome this shortcoming, we propose the 4 types of the key exchange protocols which have the resistant to man-in-the-middle-attack, key freshness, and key confirmation, These proposed protocols can be used as a key exchange protocol between RCST and NCC in domestic BSAN. These proposed protocols are based on DH key exchange protocol, MTI(Matsumoto, Takashima, Imai) key exchange protocol, and ECDH(Elliptic Curve Diffie-Hellman).

Comprehensive Study on Security and Privacy Requirements for Retrieval System over Encrypted Database (암호화된 데이터베이스 검색 시스템의 보안 요구사항에 대한 통합적 관점에서의 연구)

  • Park, Hyun-A;Lee, Dong-Hoon;Chung, Taik-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.621-635
    • /
    • 2012
  • Although most proposed security schemes have scrutinized their own security models for protecting different types of threats and attacks, this naturally causes a problem as follows-- if a security analysis tool would fit a certain scheme, it may not be proper to other schemes. In order to address this problem, this paper analyzes how security requirements of each paper could be different by comparing with two schemes: Agrawal et al.'s scheme OPES (Order Preserving Encryption Scheme) and Zdonik et al.'s FCE (Fast Comparison Encryption). Zdonik et al. have formally disproved the security of Agrawal et al.'s scheme OPES. Thereafter, some scholars have wondered whether the OPES can guarantee its applicability in a real world for its insecurity or not. However, the analysis by Zdonik et al. does not have valid objectivity because they used the security model INFO-CPA-DB for their scheme FCE to analyze Agrawal et al.'s scheme OPES, in spite of the differences between two schemes. In order to analyze any scheme correctly and apply it to a real world properly, the analysis tool should be comprehensively standardized. We re-analyze Zdonik et al.'s analysis for OPES and then propose general formalizations of security and privacy for all of the encrypted retrieval systems. Finally, we recommend the minimum level of security requirements under our formal definitions. Additional considerations should be also supplemented in accordance with the conditions of each system.

An Efficient ECU Analysis Technology through Non-Random CAN Fuzzing (Non-Random CAN Fuzzing을 통한 효율적인 ECU 분석 기술)

  • Kim, Hyunghoon;Jeong, Yeonseon;Choi, Wonsuk;Jo, Hyo Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1115-1130
    • /
    • 2020
  • Modern vehicles are equipped with a number of ECUs(Electronic Control Units), and ECUs can control vehicles efficiently by communicating each other through CAN(Controller Area Network). However, CAN bus is known to be vulnerable to cyber attacks because of the lack of message authentication and message encryption, and access control. To find these security issues related to vehicle hacking, CAN Fuzzing methods, that analyze the vulnerabilities of ECUs, have been studied. In the existing CAN Fuzzing methods, fuzzing inputs are randomly generated without considering the structure of CAN messages transmitted by ECUs, which results in the non-negligible fuzzing time. In addition, the existing fuzzing solutions have limitations in how to monitor fuzzing results. To deal with the limitations of CAN Fuzzing, in this paper, we propose a Non-Random CAN Fuzzing, which consider the structure of CAN messages and systematically generates fuzzing input values that can cause malfunctions to ECUs. The proposed Non-Random CAN Fuzzing takes less time than the existing CAN Fuzzing solutions, so it can quickly find CAN messages related to malfunctions of ECUs that could be originated from SW implementation errors or CAN DBC(Database CAN) design errors. We evaluated the performance of Non-Random CAN Fuzzing by conducting an experiment in a real vehicle, and proved that the proposed method can find CAN messages related to malfunctions faster than the existing fuzzing solutions.

Recidivism prediction of sex offender risk assessment tools: STATIC-99 and HAGSOR-Dynamic (교정시설내 성범죄자 재범위험성 평가도구의 재범 예측: STATIC-99와 HAGSOR-동적요인을 중심으로)

  • Yoon, Jeongsook
    • Korean Journal of Forensic Psychology
    • /
    • v.13 no.2
    • /
    • pp.99-119
    • /
    • 2022
  • Research on sex offense has shown that sex offenders are very heterogeneous. Sex offenders are heterogeneous in their probability of risk of recidivism. Some sex offenders are known to be much higher in their tendencies to reactivate than others. The study examined the predictive and explanatory power of static and dynamic risk factors in STATIC-99 and HAGSOR-Dynamic which have been used in Korean correctional facilities since 2014. STATIC-99 and HAGSOR-Dynamic showed moderate predictive accuracy for all crimes(AUC = .737, AUC = .597, respectively, ps < .001). However, when examining sex crime alone, only STATIC-99 predicted recidivism significantly(AUC = .743, p < .001). The incremental predictive power of HAGSOR-Dynamic was confirmed; the explanatory power of Model 2 comprising both static and dynamic risk factors were significant beyond Model 1 comprising only static factors(∆χ2= 12.721, p < .001), but this tendency was only applied to the model of all crimes. These findings were discussed with implications of practicing the sex offender assessment and treatment.

Contract-based Access Control Method for NFT Use Rights

  • Jeong, Yoonsung;Ko, Deokyoon;Seo, Jungwon;Park, Sooyong;Kim, Seong-Jin;Kim, Bum-Soo;Kim, Do-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.1-11
    • /
    • 2022
  • In this paper, we propose an NFT(Non-Fungible Token)-based access control method for safely sharing data between users in blockchain environment. Since all data stored in the blockchain can be accessed by anyone due to the nature of the technology, it is necessary to control access except for authorized users when sharing sensitive data. For that, we generate each data as NFT and controls access to the data through the smart contract. In addition, in order to overcome the limitations of single ownership of the existing NFT, we separated the NFT into ownership and use rights, so that data can be safely shared between users. Ownership is represented as an original NFT, use rights is represented as a copied NFT, and all data generated as NFT is encrypted and uploaded, so data can be shared only through the smart contract with access control. To verify this approach, we set up a hypothetical scenario called Building Information Modeling (BIM) data trade, and deployed a smart contract that satisfies 32 function call scenarios that require access control. Also, we evaluated the stability in consideration of the possibility of decryption through brute-force attack. Through our approach, we confirmed that the data can be safely shared between users in blockchain environment.

Analysis of the affiliated department and the name trend of the department of beauty department of a university located in the central region (중부권역 소재 대학 뷰티학과의 소속 계열과 학과 명칭 동향에 관한 분석)

  • Oh, Jeong-Sun;lee, Sook-ja;Park, Jang-Soon
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.5
    • /
    • pp.327-332
    • /
    • 2022
  • In the age of population cliff, an aggressive entrance exam strategy for the development of excellent human resources for beauty is very important for the survival of beauty departments and universities. Therefore, for the purpose of in-depth trend analysis of department names and affiliated departments that reflect department characteristics as well as external department promotion tools, we investigated and analyzed department affiliated departments and department titles in 2020 targeting the Beauty Department of Central University. As a result of the study, the departments belonging to each of the four regions had the most beauty arts department (28.57%) and health department (50.00%). In Daejeon, beauty design (37.5%) was the most, and in Chungcheong, beauty care, beauty cosmetics, and medical beauty care (11.11%) were the most. Through this study, it will be possible to analyze the overall characterization trend of the Department of Beauty, and it will be used as an important basic data to suggest the future direction of the department when the departments are merged or separated in the future. In addition, I believe that it will provide a foothold for follow-up research on the curriculum for each department or the change of department name by year.