• Title/Summary/Keyword: 정보보호지수

Search Result 131, Processing Time 0.02 seconds

The Public Key Polynomial Cryptosystem for Data Security in Communication Networks (통신 네트워크의 정보보호를 위한 공개키 다항식 암호시스템)

  • Yang, Tae-Kyu
    • The Journal of Information Technology
    • /
    • v.6 no.4
    • /
    • pp.59-68
    • /
    • 2003
  • In this paper, a public key kanpsack cryptosystem algorithm is based on the security to a difficulty of polynomial factorization in computer communication is proposed. For the proposed public key kanpsack cryptosystem, a polynomial vector B(x,y,z) is formed by transform of superincreasing vector A, a polynomial f(x,y,z) is selected. Next then, the two polynomials B(x,y,z) and f(x,y,z) is decided on the public key. Therefore a public key knapsack cryptosystem is based on the security to a difficulty of factorization of a polynomial f(x,y,z)=0 with three variables. In this paper, a public key encryption algorithm for data security of computer network is proposed. This is based on the security to a difficulty of factorization. For the proposed public key encryption, the public key generation algorithm selects two polynomials f(x,y,z) and g(x,y,z). The propriety of the proposed public key cryptosystem algorithm is verified with the computer simulation.

  • PDF

Fast Detection Scheme for Broadband Network Using Traffic Analysis (트래픽 분석에 의한 광대역 네트워크 조기 경보 기법)

  • 권기훈;한영구;정석봉;김세헌;이수형;나중찬
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.111-121
    • /
    • 2004
  • With rapid growth of the Internet, network intrusions have greatly increased and damage of attacks has become more serious. Recently some kinds of Internet attacks cause significant damage to overall network performance. Current Intrusion Detection Systems are not capable of performing the real-time detection on the backbone network In this paper, we propose the broadband network intrusion detection system using the exponential smoothing method. We made an experiment with real backbone traffic data for 8 days. The results show that our proposed system detects big jumps of traffic volume well.

A Study on the Distribution Estimation of Personal Data Leak Incidents (개인정보유출 사고의 분포 추정에 관한 연구)

  • Hwang, Yoon-hee;Yoo, Jinho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.799-808
    • /
    • 2016
  • To find the pattern of personal data leak incidents and confirm which distribution is suitable for, this paper searched the personal data leak incidents reported by the media from 2011 to 2014. Based on result, this research estimated the statistical distribution using the 'K-S Statistics' and tested the 'Goodness-of-Fit'. As a result, the fact that in 95% significance level, the Poisson & Exponential distribution have high 'Goodness-of-Fit' has been proven quantitatively and, this could find it for major personal data leak incidents to occur 12 times in a year on average. This study can be useful for organizations to predict a loss of personal data leak incidents and information security investments and furthermore, this study can be a data for requirements of the cyber-insurance.

A Study on the Evaluation of the Media Diversity Index of Korea (미디어다양성 지수에 대한 평가와 정책 제언)

  • Jung, In-Sook
    • Korean journal of communication and information
    • /
    • v.61
    • /
    • pp.98-117
    • /
    • 2013
  • In 2009, Korea Communications Commission(KCC) added a new clause which regulates the protection of the media diversity to the Broadcasting Act. Specifically, the provision, Article 35-4, contains the creation of the Media Diversity Committee which is responsible for (1) the measure of TV audience share by media company; and (2) the development of summing up index of the different media influence by the end of 2012. Although the Korean version of diversity index as German KEK was made after a careful consideration based on the necessity to devise a criterion to determine the appropriate level of ownership regulation for the media companies, several issues including the measurement method have been raising the consistent controversy among experts. This study focuses on the evaluation of the media diversity policy by indicating the problems of the devised index and showing the concrete issues of the contention. As the result of the policy delphi-analysis targeted 10 media experts, this study suggest that the Article 35-4 of Broadcasting Act needs to be amend into the realistic and rational directions in well with the tenets of the law.

  • PDF

Conceptual Study of Reliability Level Service for Maritime PNT Information (해상 PNT 정보의 신뢰도 서비스 개념)

  • Seo, Ki-Yeol;Kim, Young-Ki;Park, Sang-Hyun;Shin, Mi-Young;Jang, Won-Seok
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2014.06a
    • /
    • pp.163-164
    • /
    • 2014
  • 본 논문에서는 항만 입출항시 선박의 안전 강화를 위하여, 항만 PNT(Position, Navigation, and Timing) 수신 모듈의 예상 측위 정확도와 그 오차수준을 평가하여 사용자에게 제공하기 위한 해상 PNT 정보의 신뢰도 서비스 개념에 대해 다룬다. 국제해사기구(IMO)에서 요구하는 해양항법성능인 항만 입출항시의 측위정확도(Accuracy)와 무결성(Integrity), 그리고 가용성(Availability)을 충족하기 위한 성능 평가기법과 성능 검증방법에 대해 제시한다. 사용자 관점에서의 GPS 오차수준을 분석하기 위하여, 신뢰도 측정 및 평가를 위한 수평보호수준(HPL, Horizontal Protection Level)과 스탠포드 다이어그램 분석을 통한 평가를 실시하여, 신뢰도 측정지수를 기반으로 사용자에게 신뢰성 수준을 제공하기 위한 방안을 제시한다.

  • PDF

Efficient security mechanism in 3GPP-WLAN interworking (3GPP-WLAN interworking에서의 효율적인 보안 메커니즘)

  • 신상욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.137-144
    • /
    • 2004
  • 3GPP(3rd Generation Project Partnership)-WLAN(Wireless Local Area Network) interworking refers to the utilization of resources and access to services within the 3GPP system by the WLAN UE(User Equipment) and user respectively. The intent of 3GPP-WLAN Interworking is to extend 3GPP services and functionality to the WALN access environment. We propose an efficient mechanism for the setup of UE-initiated tunnels in 3GPP-WLAN interworking. The proposed mechanism is based on a secret key which is pre-distributed in the process of authentication and key agreement between UE and 3GPP AAA(Authentication, Authorization Accounting) server. Therefore it can avoid modular exponentiation and public key signature which need a large amount of computation in UE. Also the proposed scheme provides mutual authentication and session key establishment between UE and PDGW(Packet Data Gateway).

Proposal of SMPC Biometric Authentication System Based on Public Blockchain (퍼블릭 블록체인 기반 SMPC 생체인증 시스템 제안)

  • Ji-Su Doo;Hyeok Kang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.2
    • /
    • pp.77-82
    • /
    • 2023
  • As the method of collecting and utilizing structured and unstructured data develops due to the influence of the Fourth Industrial Revolution, unwanted personal information data is also being collected and utilized, and hackers are attempting various attacks to steal information. As a result, the importance of information protection has increased, and various protection techniques have emerged, among which many studies have been conducted using decentralized techniques of blockchain and various algorithms to strengthen the security of biometric authentication techniques. This paper proposed a public blockchain biometric authentication system that allows users to protect their data in a safer biometric authentication method in the public blockchain and use it in the blockchain through signature with authenticated information.

A Search Category Recommendation System Using Client-based Deep Learning (클라이언트 기반 딥러닝을 이용한 검색 카테고리 추천 시스템)

  • Ahn, Cheol-Yong;Park, JiSu;Shon, Jin Gon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.687-690
    • /
    • 2019
  • 웹 사이트 사용자들은 자신의 취향에 맞춘 웹 사이트 개인화 서비스를 원한다. 이에 따라 관련 기업들은 웹 사이트의 회원가입을 통해 사용자들의 개인 정보를 관리하여 개인화 서비스를 지원하고 있다. 하지만 기업들의 개인 정보 유출 사고와 잘못된 기업 간 공유로 개인 정보보호 관리에 어려움이 있다는 문제점이 있다. 본 논문에서는 클라이언트 기반 딥러닝(Client-based Deep Learning)과 웹 브라우저 표준 데이터베이스 IndexedDB를 사용하여 검색 카테고리 추천 시스템을 구현한다.

A Methodological Approaches on the Global Green Growth (글로벌 녹색성장의 연구방법론적 고찰)

  • Choi, Yong-Rok
    • International Commerce and Information Review
    • /
    • v.14 no.2
    • /
    • pp.349-367
    • /
    • 2012
  • Recently, the global paradigm on the economic structure has been changed from the price-oriented borderless competition toward the sustainable quality movement due to the ever-increasing global warming and environmental issues. Since Korea hosted the global 20 summit in 2010, it has promoted the green growth policies and asked for the other countries to participate in. Unfortunately, it is not easy to figure out the green growth or green productivity because the economic performance has a side effect of environmental pollution such as CO2 emission. This paper aims to analyzes the methodological comparison for all the related issues with green productivity and suggests the new paradigm of global Malmquist-Lundberger index (GML) as the most flexible field and performance-oriented criteria to measure the green productivity.

  • PDF

Montgomery Multiplier Base on Modified RBA and Hardware Architecture (변형된 RBA를 이용한 몽고메리 곱셈기와 하드웨어 구조)

  • Ji Sung-Yeon;Lim Dae-Sung;Jang Nam-Su;Kim Chang-Han;Lee Sang-Jin
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.351-355
    • /
    • 2006
  • RSA 암호 시스템은 IC카드, 모바일 및 WPKI, 전자화폐, SET, SSL 시스템 등에 많이 사용된다. RSA는 모듈러 지수승 연산을 통하여 수행되며, Montgomery 곱셈기를 사용하는 것이 효율적이라고 알려져 있다. Montgomery 곱셈기에서 임계 경로 지연 시간(Critical Path Delay)은 세 피연산자의 덧셈에 의존하고 캐리 전파를 효율적으로 처리하는 문제는 Montgomery 곱셈기의 효율성에 큰 영향을 미친다. 최근 캐리 전파를 제거하는 방법으로 캐리 저장 덧셈기(Carry Save Adder, CSA)를 사용하는 연구가 계속 되고 있다. McIvor외 세 명은 지수승 연산에 최적인 CSA 3단계로 구성된 Montgomery 곱셈기와 CSA 2단계로 구성된 Montgomery 곱셈기를 제안했다. 시간 복잡도 측면에서 후자는 전자에 비해 효율적이다. 본 논문에서는 후자보다 빠른 연산을 수행하기 위해 캐리 전파 제거 특성을 가진 이진 부호 자리(Signed-Digit, SD) 수 체계를 사용한다. 두 이진 SD 수의 덧셈을 수행하는 잉여 이진 덧셈기(Redundant Binary Adder, RBA)를 새로 제안하고 Montgomery 곱셈기에 적용한다. 기존의 RBA에서 사용하는 이진 SD 덧셈 규칙 대신 새로운 덧셈 규칙을 제안하고 삼성 STD130 $0.18{\mu}m$ 1.8V 표준 셀 라이브러리에서 지원하는 게이트들을 사용하여 설계하고 시뮬레이션 하였다. 그 결과 McIvor의 2 방법과 기존의 RBA보다 최소 12.46%의 속도 향상을 보였다.

  • PDF