• Title/Summary/Keyword: 암호 분석

Search Result 1,059, Processing Time 0.028 seconds

A Proactive Secret Image Sharing Scheme over GF(28) (유한 체상에서의 사전 비밀이미지 공유 기법)

  • Hyun, Suhng-Ill;Shin, Sang-Ho;Yoo, Kee-Young
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.5
    • /
    • pp.577-590
    • /
    • 2013
  • Shamir's (k,n)-threshold secret sharing scheme is not secure against cheating by attacker because the signature of participants is omitted. To prevent cheating, many schemes have been proposed, and a proactive secret sharing is one of those. The proactive secret sharing is a method to update shares in the secret sharing scheme at irregular intervals. In this paper, a proactive image secret sharing scheme over $GF(2^8)$ is proposed for the first time. For the past 30 years, Galois field operation is widely used in order to perform the efficient and secure bit operation in cryptography, and the proposed scheme with update phase of shadow image over $GF(2^8)$) at irregular intervals provides the lossless and non-compromising of secret image. To evaluate security and efficiency of images (i.e. cover and shadow images) distortion between the proposed scheme and the previous schemes, embedding capacity and PSNR are compared in experiments. The experimental results show that the performances of the embedding capacity and image distortion ratio of the proposed scheme are superior to the previous schemes.

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (익명적 비대칭 핑거프린팅 기법의 보안 취약성 분석 및 개선 방안)

  • Kwon, Sae-Ran
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.396-403
    • /
    • 2009
  • An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.

Characteristics of Photosynthesis of Dwarf and Street Tree Cultivars of Hibiscus syriacus L. (분화용 및 가로수형 무궁화 품종의 광합성 특성)

  • Cho, Yoon-Jin;Park, Hyung-Soon;Chang, Yong-Seock;Shin, Man-Yong;Chung, Dong-Jun
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.9 no.1
    • /
    • pp.55-60
    • /
    • 2007
  • This study was conducted to find characteristics of photosynthesis for dwarf and street tree cultivars of Hibiscus syriacus L. Characteristics of growth and flowering on some cultivars were investigated. The photosynthetic capacity for the cultivars was also measured. Bulsae showed the best height increase; Soyang represented the lowest growth. Baektanshim ${\times}$ Kyungbuk1 had the largest number of branches and leaves. Sundeok and Bulsae were the best in terms of height and width of flower, Soyang showed the smallest flowers. According to the analysis of chlorophyll content (chlorophyll a, b, total) for the cultivars, there was little difference between Sundeok and Bulsae. Based on light response curves for cultivars, it was found that Baektanshim ${\times}$ Kyungbuk1 and Soyang had lower light compensation and light saturation points than Bulsae and Sundeok. Cultivars Baektanshim ${\times}$ Kyungbuk1 and Soyang were also low in dark respiration, photosynthetic capacity, and net apparent quantum yield. In conclusion, it is recommended that cultivars Baektanshim ${\times}$ Kyungbuk1 and Soyang might be used as a dwarf type due to photosynthetic capacity.

On Information Theoretical Research of the Korean Language (한국어의 정보이론적 연구 방향)

  • Lee, Jae-Hong;Yi, Chae-Hag
    • Annual Conference on Human and Language Technology
    • /
    • 1992.10a
    • /
    • pp.367-375
    • /
    • 1992
  • 한국어는 다른 언어와는 달리 초성, 중성, 종성의 자소가 모여서 한 음절을 이룬다. 음절을 이루는 자소는 그 발생의 확률적 성질에 따라 확률변수로 간주된다. 음절 안에서 자소간의 발생의 상관관계는 자소간 조건부 확률 및 엔트로피로 표시된다. 음절이 모여서 단어를 이루고 단어를 이루는 음절은 그 발생의 확률적 성질에 따라 확률변수로 간주된다. 한국어 단어안에서 음절간의 발생의 상관관계는 음절간 조건부 확률 및 엔트로피로 표시된다. 수 있다. 그런데 가능한 음절의 종류가 매우 많기 때문에 음절 발생의 상관관계를 표시하는 지표로서 음절간 조건부 확률 대신 초성, 중성, 종성 단위의 조건부 확률을 사용하는 것이 음절간의 발생의 상관관계를 표시하는데 효과적이다. 이러한 한국어의 정보이론적 연구를 위하여서는 기초자료로서 한국어 단어의 빈도분포가 필요하다. 한국어 단어의 빈도분포의 포괄적인 조사는 1956년의 "우리말 말수 사용의 잦기 조사"가 유일한 실정이다. 시간 경과에 따른 한국어의 정보이론적 특성 변화의 분석을 위하여서는 한국어 단어 빈도의 주기적인 조사가 필요하다. 한국어에서 초성, 중성, 종성단위의 정보이론적 연구결과는 한국어 음성인식 및 함성, 자연언어처리, 암호법, 언어학, 음성학, 한국어부호 표준화 연구등에 이용될 것으로 기대된다. 남북한의 언어는 분단이 지속됨에 따라 상호 이질화가 진행되고 있다. 이러한 이질화를 극복하려는 부분적인 노력으로 남북한 언어의 한국어 영문표기의 단일화 등이 있었다. 이러한 노력에 병행하여 남한과 북한의 언어에 대한 정보이론적 비교 연구도 있어야 할 것이다. 정보를 효과적으로 캐싱할 수 있도록 인접한 데이터를 클러스터링해서 브로드캐스팅하여 이동 호스트의 구성 시간(setup time)을 최소화하였다. 그리고, 맨하탄거리(Manhattan Distance)를 사용해서 위치 의존 질의에서 사용하는 데이타를 캐싱하고 질의를 처리하는 방법을 제안한다. 맨하탄 거리를 이용해서 캐싱하면 도로에 인접해서 위치한 데이타를 효과적으로 캐싱할 수 있다. 또한, 거리 계산 방법으로 맨하탄 거리를 사용하면 도심에서 실제 이동 거리와 비슷한 값을 알 수 있고, 직선 거리 계산식에 비해서 계산식도 간단하기 때문에 시스템 계산량도 줄일 수 있다. 기준으로 라이신 부산물은 어분 단백질을 40%까지 대체가 가능하였으며, 아울러 높은 라이신 부산물의 대체 수준에 있어서 사료효율과 단백질 전환효율을 고려한다면 아미노산 첨가(라이신과 아르지닌)와 중화 효과에 좋은 결과가 있을 것으로 사료된다.의한 적정 양성수용밀도는 각고 5~6cm 크기의 경우 10~15개체가 적합하였다. 수증별 성장은 15~20 m 수층에서 빨랐으며, 성장촉진과 폐사를 줄이기 위해서는 고수온이 지속되는 7~10월에는 20~30m수층으로 채롱을 내려 양성하고 그 외 시기에는 15 m층 내외가 좋은 것으로 나타났다. 상품으로 출하 가능한 크기 인 각고 10 cm이상, 전중량 140 g 내외로 성장시 키기까지는 채묘후 22개월이 소요되었고, 출하시기는 전중량 증가가 최대에 이르는 3월에서 4월 중순이 경제적일 것으로 판단된다.er 90 % of good relative dynamic modulus of elasticity due

  • PDF

Sequence analysis and expression of groE gene encoding heat shock proteins of Brucella abortus isolates (Brucella abortus 국내 분리주의 Heat Shock Protein 암호 groE 유전자의 염기서열 분석과 발현)

  • Kim, Tae-Yong;Kim, Ji-Young;Chang, Kyung-Soo;Kim, Myung-Cheol;Park, Chang-Sik;Han, Hong-Ryul;Jun, Moo-Hyung
    • Korean Journal of Veterinary Research
    • /
    • v.45 no.1
    • /
    • pp.45-53
    • /
    • 2005
  • GroE that is a heat shock protein composed of GroEL and GroES is known as an immunodominant target of both the humoral and cellular immune responses in bovine brucellosis. This study was carried out to characterize groE gene encoding heat shock proteins of B. abortus isolated in Korea and to evaluate the immunogenicity of the GroE protein expressed in E. coli system. In PCR the specific signals with the size of 2,077 bp were detected in five strains isolated from the mammary lymphnodes of the dairy cattle that were serologically positive and the reference strains. In comparison of the sequences of nucleotides and amino acids among the strains, GroES showed 100% identity in both sequences. GroEL was evaluated 99.0~99.9% in nucleotides and 98.0~100% homology in amino acids. The groE gene including groES and groEL was inserted into pET29a vector and constructed pET29a-GroE recombinant plasmids. The inserted groE was confirmed by digestion with Nco1 and EcoR1 endonucleases and nucleotide sequencing. E. coli BL (DE3) was transformed with pET29a-GroE, named as E. coli BL (DE3)/pET29a-GroE. In SDS-PAGE, it was evident that the recombinant plasmid effectively expressed the polypeptides for GroES (10 kDa) and GroEL (60 kDa) in 0.5, 1 and 2 hours after IPTG induction. The immuno-reactivity of the expressed proteins were proved in mouse inoculation and Western blot analysis.

A mechanism for end-to-end secure communication in heterogeneous tactical networks (이기종 전술통신망 종단간 암호화 통신을 위한 메커니즘)

  • Park, Cheol-Yong;Kim, Ki-Hong;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.625-634
    • /
    • 2014
  • Tactical networks is being operated in configuration that consisting of a variety of characteristics communication equipments and heterogeneous networks. In this configurations, end-to-end communication can be achieved using interworking gateway for converting the data format of the network and using encryption algorithm of the networks. The use of mechanism results in a problem that secure data cannot be transferred directly, reprocessing and processing delay of communication in heterogeneous tactical networks. That is, for encoding and decoding of data, the decryption of encrypted data and re-encryption processing must be required at the gateway between different networks. In this paper proposes to mechanism for end-to-end secure communication in heterogeneous tactical networks. Using the proposed method, end-to-end secure communication between heterogeneous tactical networks(PSTN-UHF networks) which removes the necessity of a gateway for converting data into data formats suitable for network to remove a transmission delay factor and enable real-time voice and data communication and achieve end-to-end security for heterogeneous tactical networks. we propose a novel mechanism for end-to-end secure communication over PSTN and UHF networks and evaluate against the performance of conventional mechanism. Our proposal is confirmed removal of security vulnerabilities, end-to-end secure communication in heterogeneous tactical networks.

A comparative study on the priorities between perceived importance and investment of the areas for Information Security Management System (정보보호관리체계(ISMS) 항목의 중요도 인식과 투자의 우선순위 비교 연구)

  • Lee, Choong-Cheang;Kim, Jin;Lee, Chung-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.919-929
    • /
    • 2014
  • Recently, organizational efforts to adopt ISMS(Information Security Management System) have been increasingly mandated and demanded due to the rising threat and the heavier cost of security failure. However there is a serious gap between awareness and investment of information security in a company, hence it is very important for the company to control effectively a variety of information security threats within a tight budget. To phase the ISMS, this study suggests the priorities based on evaluating the Importance of 13 areas for the ISMS by the information security experts and then we attempt to see the difference between importance and investment through the assessment of the actual investment in each area. The research findings show that intrusion incident handling is most important and IT disaster recovery is the area that is invested the most. Then, information security areas with the considerable difference between priorities of importance and investment are cryptography control, information security policies, education and training on information security and personnel security. The study results are expected to be used in making a decision for the effective investment of information security when companies with a limited budget are considering to introduce ISMS or operating it.

Bitcoin(Gold)'s Hedge·Safe-Haven·Equity·Taxation (비트코인(금)의 헷지·안전처·공평성·세제 소고)

  • Hwang, Y.
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.13-32
    • /
    • 2018
  • Btcoin has made a big progress through anonymity, decentralized authority, sharing economy, multi-ledger book-keeping, block-technology and the convenient financial vehicle. Bitcoin has the characteristics of mining and supply by decentralized suppliers, limited supply quantity and the partial money-like function as well as gold. The paper studies the hedge and safe-haven of Bitcoin and gold on daily frequency data over the period of July 20, 2010-Dec. 27, 2017 employing Asymmetric Vector GARCH. It finds that gold has the hedge and safe-haven against inflation and capital markets while Bitcoin has the weak hedge and the weak safe-haven. It shows insignificant effects of inflations of US and Korea on the volatilities of Bitcoin and gold. It also suggests the necessity of clearing of vagueness behind the anonymity for fair and transparent trade through the law application in the absence or fault in law (Lucken im Recht). following the spirit of the living constitution (lebendige gutes Recht oder Vorschrift). The relevant institutions are hoped to be given some of obligations such as registration, minimum required capital. report, disclosure, explanation, compliance and governance with autonomous corresponding rights. The study also suggests the reestablishment of the relevant financial law and taxation law. The hedge would not be successfully accomplished without the vigilant cautions of investors.

Characteristic Polynomials of 90/150 CA <10 ⋯ 0> (90/150 CA <10 ⋯ 0>의 특성다항식)

  • Kim, Jin-Gyoung;Cho, Sung-Jin;Choi, Un-Sook;Kim, Han-Doo;Kang, Sung-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.6
    • /
    • pp.1301-1308
    • /
    • 2018
  • 90/150 CA which are used as key generators of the cipher system have more randomness than LFSRs, but synthesis methods of 90/150 CA are difficult. Therefore, 90/150 CA synthesis methods have been studied by many researchers. In order to synthesize a suitable CA, the analysis of the characteristic polynomial of 90/150 CA should be preceded. In general, the characteristic of polynomial ${\Delta}_n$ of n cell 90/150 CA is obtained by using ${\Delta}_{n-1}$ and ${\Delta}_{n-2}$. Choi et al. analyzed $H_{2^n}(x)$ and $H_{2^n-1}(x)$, where $H_k(x)$ is the characteristic polynomial of k cell 90/150 CA with state transition rule <$10{\cdots}0$>. In this paper, we propose an efficient method to obtain $H_n(x)$ from $H_{n-1}(x)$ and an efficient algorithm to obtain $H_{2^n+i}(x)$ and $H_{2^n-i}(x)$ ($1{\leq}i{\leq}2^{n-1}$) from $H_{2^n}(x)$ by using this method.

Derivation of Anti-Tamper System Requirements Based on CMVP Standard for Technology Protection of Weapon Systems (무기 시스템의 기술 보호를 위한 CMVP 표준 기반의 Anti-Tamper 시스템 요구사항 도출)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.470-478
    • /
    • 2019
  • As the growth of the domestic defense industry is remarkable regarding technology level and export size, technology protection is necessary. Particularly, there is a need to apply anti-tamper measures to prevent critical technologies from illegally being taken out of weapon systems. However, there is no security protection strategy and system built yet in ROK. Precedent studies discussed the trend analysis and technical research for specific protective techniques, and the application of anti-tamper using limited procedures was provided. Recently, methods of how to select the technology for protection were studied based on risk management. Nonetheless, these studies cannot be associated with the acquisition process for the whole life-cycle, having difficulty with actual development and evaluation of the weapon systems. The objective of our study is to derive the system requirements of the weapon system for which anti-tamper measures have been determined to apply. Specifically, requirements items suitable for the development of anti-tamper weapon systems were derived based on ISO/IEC 19790, the CMVP standard for the development and verification of cryptographic modules. Also, its utilization in technical reviews and test & evaluations was presented. The usefulness of the research results was confirmed through inductive inference and comparative evaluation. The result can be expected to play a role in initiating extensive activities needed for technology protection of the weapon systems.