• Title/Summary/Keyword: 보안 중요도

Search Result 2,285, Processing Time 0.027 seconds

Internet of Things and Innovative Media Firms (사물인터넷과 미디어기업의 혁신)

  • Moon, Sanghyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.6
    • /
    • pp.157-164
    • /
    • 2019
  • This research examines how IoT makes a significant contribution to the innovation of media firms. The media firms will be able to find new reveue sources and strengthen firms' competence through innovating product, process and business model. While IoT increases the experience of interactivity and immersion for consumption, it improves the way ads are exposed and its impact is measured, leading to revenue increase. For these benefits fulfilled, innovation friendly media eco-system must be established. It is the most critical that media firms should change skeptical attitude toward IoT's potential and actively invest it to employ IoT. The government should create regulatory framework to best utilize the innovative advantages of IoT.

A More Storage-Efficient Order-Revealing Encryption Scheme (우수한 공간 효율성을 제공하는 순서노출암호 기법)

  • Kim, Kee Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.503-509
    • /
    • 2019
  • Order-revealing encryption which enables a range query over encrypted data is attracting attention as one of the important security technologies in industry such as IoT, smart manufacturing, and cloud computing. In 2015, an ideally-secure order-revealing encryption whose ciphertexts reveal no additional information beyond the order of the underlying plaintexts has been proposed. However, their construction is too inefficient for practical use and some security analysis of multilinear maps, which their construction relies on, have been proposed. Recently, more practical schemes have been proposed, focusing on achieving practically usable efficiency rather than the ideal security. In this paper, we propose a more storage-efficient order-revealing encryption scheme than the Lewi et al.'s scheme most recently published by presenting an idea that can generate shorter ciphertexts without any security loss.

An Efficient Method of Test Environment Setup for Weapon System Software Reliability Test (무기체계 소프트웨어 신뢰성 시험을 위한 효율적 시험 환경 구축 방안)

  • Choi, Minkwan;Bak, Daun;Kook, Seunghak
    • Journal of Software Engineering Society
    • /
    • v.28 no.1
    • /
    • pp.7-12
    • /
    • 2019
  • Recently, as the weight of software in the weapon system increases, the quality of the software becomes a very important factor. In order to improve the quality of the weapon system software, DAPA(Defense Acquisition Program Administration) has institutionalized software reliability in Weapon System Software Development and Management Manual. The manual presents specific methods and procedures to improve the weapon system software quality. In order to meet the required reliability test standards specified in the manual, it is necessary to continuously detect and correct defects throughout the entire development period. However, it is difficult to build proper reliability test environment due to the cost of software reliability tools, setting up secured and separated network environment, and etc. Therefore, in this study, we propose an efficient environment construction method for software reliability test of defense industry field in restricted development environment and limited resources.

A Case Study on Early Childhood Coding Education Program for Convergence of Human Resources (융합인재를 위한 유아 코딩 교육 프로그램 사례 연구)

  • Lyu, Ji-Hyun;Kim, Seung-in
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.8
    • /
    • pp.129-135
    • /
    • 2019
  • The purpose of this study is to propose the future development direction of the program which can apply the fusion education in the fourth industrial revolution era to the class and achieve creative problem solving ability. As a research method, we investigated cases of overseas coding education and conducted in - depth interviews with infants and parents. The results of the case study and in-depth interviews were as follows: First, the children were able to do their own preliminary and reviewing at home. Second, to provide an interesting play program for the young children to participate. Third, It is important that parents and children learn together. In future research, it is anticipated that there will be a positive effect by concrete proposal to secure the weaknesses and to combine existing coding education with interesting education in accordance with domestic characteristics.

Design and Implementation of Side-Type Finger Vein Recognizer (측면형 지정맥 인식기 설계 및 구현)

  • Kim, Kyeong-Rae;Choi, Hong-Rak;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.159-168
    • /
    • 2021
  • As the information age enters, the use of biometrics using the body is gradually increasing because it is very important to accurately recognize and authenticate each individual's identity for information protection. Among them, finger vein authentication technology is receiving a lot of attention because it is difficult to forge and demodulate, so it has high security, high precision, and easy user acceptance. However, the accuracy may be degraded depending on the algorithm for identification or the surrounding light environment. In this paper, we designed and manufactured a side-type finger vein recognizer that is highly versatile among finger vein measuring devices, and authenticated using the deep learning model of DenseNet-201 for high accuracy and recognition rate. The performance of finger vein authentication technology according to the influence of the infrared light source used and the surrounding visible light was analyzed through simulation. The simulations used data from MMCBNU_6000 of Jeonbuk National University and finger vein images taken directly were used, and the performance were compared and analyzed using the EER.

Implementation of Validation Tool for Cryptographic Modules (암호기술 구현물 검증도구 구현)

  • 이종후;김충길;이재일;이석래;류재철
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.2
    • /
    • pp.45-58
    • /
    • 2001
  • There are relatively many research results of the validation of the cryptography. But few researches on the validation of cryptography implementations were accomplished. However, developer\`s misunderstanding the crypto-algorithm or a mistake in implementation of the crypto-a1gorithm leads to lose reliability of security products. Therefore, as validation of the crypto-algorithm itself also validation of the implementation is important. The major objective of this paper is to propose Security Products Validation Tool. Our tool validates implementation of the public key algorithm (RSA. KCDSA) and hash algorithm (SHA-1, HAS-170). The validation process is composed of several items and our tool performs validation teats for conformance to related standard.

Certificate Issuing using Proxy Signature and Threshold Signature in Self-initialized Ad Hoc Network (자기 초기화하는 Ad Hoc 네트워크에서의 대리 서명과 임계 서명 기법을 이용한 인증서 발급 기법)

  • Kang, Jeon-Il;Choi, Young-Geun;Kim, Koon-Soon;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.55-67
    • /
    • 2007
  • In ad hoc network, especially in the environment which the system authority only exists at the beginning of the network, it is very important problem how to issue the certificates in self-initialized public key scheme that a node generates its certificate with public and private key pair and is signed that by the system authority. In order to solve this problem, early works present some suggestions; remove the system authority itself and use certificate chain, or make nodes as system authorities for other nodes' certificates. In this paper, we suggest another solution, which can solve many problem still in those suggestions, using proxy signature and threshold signature, and prove its performance using simulation and analyse its security strength in many aspects.

Signature-based Broadcast Authentication for Wireless Sensor Networks (무선센서네트워크 환경에서 서명 기반 브로드캐스트 인증)

  • Koo, Woo-Kwon;Lee, Hwa-Seong;Kim, Yong-Ho;Hwang, Jung-Yeon;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.139-144
    • /
    • 2007
  • A broadcast authentication is important and fundamental consideration for security in wireless sensor networks. Perigg et al suggests ${\mu}-TESLA$ used a key chain. But it is unavoidable the delay of time to authenticate packets. so it is hard to meet the property that most application of sensor are performed in real-time. To cope with these problems we propose an efficient broadcast authentication scheme which has no delay of time and provides re-keying mechanism. we also describe an analysis of security and efficiency for this scheme.

A Study on Network Service Using Authorization Ticket in AAA system (AAA시스템의 인가 티켓을 이용한 네트워크 서비스에 관한 연구)

  • Kang, Seo-Il;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.11-19
    • /
    • 2007
  • A ubiquitous network environment is a system where the user can avail of the network's services anytime, anywhere. To establish such an environment, studies continue being conducted on wireless communication technology and mobile terminals. The company that provides such services should have an established system for authentication, authorization and charging for users. This service is referred to as Authentication, Authorization, Accounting(AAA), and its aspects have been consistently studied. On the other hand, existing studies have been promoted with regard to the authentication and efficiency of the mobile terminal. One of the method is that the mobile terminal contacts to the home authentication server through the external authentication server every time it is required and; another one is to use a medium server to provide authentication in the middle between them. Thus, this study aims to determine the best method to use ticketing, where tickets are provided through a mobile terminal, complete with authentication and authorization features. Also, as it uses ticket, it can efficiently provide mobile verification processing.

Fast Algorithm for Polynomial Reconstruction of Fuzzy Fingerprint Vault (지문 퍼지볼트의 빠른 다항식 복원 방법)

  • Choi, Woo-Yong;Lee, Sung-Ju;Chung, Yong-Wha;Moon, Ki-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.33-38
    • /
    • 2008
  • Biometric based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as compromise of the data will be permanent. Cancelable biometrics stores a non - invertible transformed version of the biometric data. Thus, even if the storage is compromised, the biometric data remains safe. Cancelable biometrics also provide a higher level of privacy by allowing many templates for the same biometric data and hence non-linkability of user's data stored in different databases. In this paper, we proposed the fast polynomial reconstruction algorithm for fuzzy fingerprint vault. The proposed method needs (k+1) real points to reconstruct the polynomial of degree (k-1). It enhances the speed, however, by $300{\sim}1500$ times according to the degree of polynomial compared with the exhaust search.