• Title/Summary/Keyword: A key technique

Search Result 1,732, Processing Time 0.028 seconds

Privilege Management Technique for Unreliable Network Environments based on Tree Structure (신뢰도가 낮은 네트워크 환경을 위한 트리 구조 기반의 권한 관리 기법)

  • Yang, Soo-Mi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.83-91
    • /
    • 2008
  • IISO/IEC 9594-8 defines the public key framework and attribute certificate framework. Attribute certificate framework deals with privilege management infrastructure(PMI). In PMI, for privilege management using attribute certificates, role assignment certificates and role specification certificates are used to assign and specify privileges independently. Role specification certificates includes privilege specifications and the details far privilege management of network environments. Privilege management of unreliable network environment tries to enhance the reliability and efficiency of privilege information transmission forwarding over unreliable routes in the presence of potentially faulty nodes and edges. Each node forms a role specification tree based on role specification relationship data collected from the network. In this paper privilege management cost with the role specification certificates tree structure is evaluated trying to reduce the overhead incurred by role creation and modification of privileges. The multicasting of packets are used for scalability. We establish management cost model taking into account the packet loss and node reliability which continuously join and leave for network. We present quantitative results which demonstrate the effectiveness of the proposed privilege management scheme.

Area Efficient Implementation of 32-bit Architecture of ARIA Block Cipher Using Light Weight Diffusion Layer (경량화된 확산계층을 이용한 32-비트 구조의 소형 ARIA 연산기 구현)

  • Ryu, Gwon-Ho;Koo, Bon-Seok;Yang, Sang-Woon;Chang, Tae-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.15-24
    • /
    • 2006
  • Recently, the importance of the area efficient implementation of cryptographic algorithm for the portable device is increasing. Previous ARIA(Academy, Research Institute, Agency) implementation styles that usually concentrate upon speed, we not suitable for mobile devices in area and power aspects. Thus in this paper, we present an area efficient AR processor which use 32-bit architecture. Using new implementation technique of diffusion layer, the proposed processor has 11301 gates chip area. For 128-bit master key, the ARIA processor needs 87 clock cycles to generate initial round keys, n8 clock cycles to encrypt, and 256 clock cycles to decrypt a 128-bit block of data. Also the processor supports 192-bit and 256-bit master keys. These performances are 7% in area and 13% in speed improved results from previous cases.

Social Media Bigdata Analysis Based on Information Security Keyword Using Text Mining (텍스트마이닝을 활용한 정보보호 키워드 기반 소셜미디어 빅데이터 분석)

  • Chung, JinMyeong;Park, YoungHo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.5
    • /
    • pp.37-48
    • /
    • 2022
  • With development of Digital Technology, social issues are communicated through digital-based platform such as SNS and form public opinion. This study attempted to analyze big data from Twitter, a world-renowned social network service, and find out the public opinion. After collecting Twitter data based on 14 keywords for 1 year in 2021, analyzed the term-frequency and relationship among keyword documents with pearson correlation coefficient using Data-mining Technology. Furthermore, the 6 main topics that on the center of information security field in 2021 were derived through topic modeling using the LDA(Latent Dirichlet Allocation) technique. These results are expected to be used as basic data especially finding key agenda when establishing strategies for the next step related industries or establishing government policies.

3-Step Security Vulnerability Risk Scoring considering CVE Trends (CVE 동향을 반영한 3-Step 보안 취약점 위험도 스코어링)

  • Jihye, Lim;Jaewoo, Lee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.87-96
    • /
    • 2023
  • As the number of security vulnerabilities increases yearly, security threats continue to occur, and the vulnerability risk is also important. We devise a security threat score calculation reflecting trends to determine the risk of security vulnerabilities. The three stages considered key elements such as attack type, supplier, vulnerability trend, and current attack methods and techniques. First, it reflects the results of checking the relevance of the attack type, supplier, and CVE. Secondly, it considers the characteristics of the topic group and CVE identified through the LDA algorithm by the Jaccard similarity technique. Third, the latest version of the MITER ATT&CK framework attack method, technology trend, and relevance between CVE are considered. We used the data within overseas sites provide reliable security information to review the usability of the proposed final formula CTRS. The scoring formula makes it possible to fast patch and respond to related information by identifying vulnerabilities with high relevance and risk only with some particular phrase.

Analsis Of Outliers In Real Estate Prices Using Autoencoder (Autoencoder 기법을 활용한 부동산 가격 이상치 분석)

  • Kim, Yoonseo;Park, Jongchan;Oh, Hayoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1739-1748
    • /
    • 2021
  • Real estate prices affect countries, businesses, and households, and many studies have been conducted on the real estate bubble in recent soaring real estate prices. However, if the real estate bubble prediction simply compares the real estate price, or if it does not reflect key psychological variables in real estate sales, it can be judged that the accuracy of the bubble prediction model is poor. The purpose of this study is to design a predictive model that can explain the real estate bubble situation by region using the autoencoder technique. Existing real estate bubble analysis studies failed to set various types of variables that affect prices, and most of them were conducted based on linear models. Thus, this study suggests the possibility of introducing techniques and variables that have not been used in existing real estate bubble studies.

Matrix Character Relocation Technique for Improving Data Privacy in Shard-Based Private Blockchain Environments (샤드 기반 프라이빗 블록체인 환경에서 데이터 프라이버시 개선을 위한 매트릭스 문자 재배치 기법)

  • Lee, Yeol Kook;Seo, Jung Won;Park, Soo Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.2
    • /
    • pp.51-58
    • /
    • 2022
  • Blockchain technology is a system in which data from users participating in blockchain networks is distributed and stored. Bitcoin and Ethereum are attracting global attention, and the utilization of blockchain is expected to be endless. However, the need for blockchain data privacy protection is emerging in various financial, medical, and real estate sectors that process personal information due to the transparency of disclosing all data in the blockchain to network participants. Although studies using smart contracts, homomorphic encryption, and cryptographic key methods have been mainly conducted to protect existing blockchain data privacy, this paper proposes data privacy using matrix character relocation techniques differentiated from existing papers. The approach proposed in this paper consists largely of two methods: how to relocate the original data to matrix characters, how to return the deployed data to the original. Through qualitative experiments, we evaluate the safety of the approach proposed in this paper, and demonstrate that matrix character relocation will be sufficiently applicable in private blockchain environments by measuring the time it takes to revert applied data to original data.

Discovery of Porous Materials for H2/CO2 Gas Separation and High-Throughput Computational Screening (수소/이산화탄소 가스분리용 다공성 물질 탐색 및 고속전산스크리닝 연구동향)

  • Byung Chul Yeo
    • Korean Chemical Engineering Research
    • /
    • v.61 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • Gas separation technology becomes more useful because key gases such as H2 and CO2 regarding renewable energy resources and environmental pollutant can be effectively extracted in mixed gases. For reducing energy consumption on gas separation, membrane and adsorption processes are widely used. In both processes, porous materials are needed as membrane and adsorbent. In particular, metal-organic frameworks (MOFs), one class of the porous materials, have been developed for the purpose of gas adsorption and separation. While the number of the MOF structures is increasing due to chemical and structural tunability, good MOF membranes and adsorbents have been rarely reported by trial-and-error experiments. To accelerate the discovery of high-performing porous materials that can separate H2 and CO2, a high-throughput computational screening technique was used as efficient skill. This review introduces crucial studies of porous materials and the high-throughput computational screening works focusing on gas separation of H2 and CO2.

Checkmeat: A Review on the Applicability of Conventional Meat Authentication Techniques to Cultured Meat

  • Ermie Jr. Mariano;Da Young Lee;Seung Hyeon Yun;Juhyun Lee;Seung Yun Lee;Sun Jin Hur
    • Food Science of Animal Resources
    • /
    • v.43 no.6
    • /
    • pp.1055-1066
    • /
    • 2023
  • The cultured meat industry is continuously evolving due to the collective efforts of cultured meat companies and academics worldwide. Though still technologically limited, recent reports of regulatory approvals for cultured meat companies have initiated the standards-based approach towards cultured meat production. Incidents of deception in the meat industry call for fool-proof authentication methods to ensure consumer safety, product quality, and traceability. The cultured meat industry is not exempt from the threats of food fraud. Meat authentication techniques based on DNA, protein, and metabolite fingerprints of animal meat species needs to be evaluated for their applicability to cultured meat. Technique-based categorization of cultured meat products could ease the identification of appropriate authentication methods. The combination of methods with high sensitivity and specificity is key to increasing the accuracy and precision of meat authentication. The identification of markers (both physical and biochemical) to differentiate conventional meat from cultured meat needs to be established to ensure overall product traceability. The current review briefly discusses some areas in the cultured meat industry that are vulnerable to food fraud. Specifically, it targets the current meat and meat product authentication tests to emphasize the need for ensuring the traceability of cultured meat.

Radiologic Evaluation and Structured Reporting Form for Extrahepatic Bile Duct Cancer: 2019 Consensus Recommendations from the Korean Society of Abdominal Radiology

  • Dong Ho Lee;Bohyun Kim;Eun Sun Lee;Hyoung Jung Kim;Ji Hye Min;Jeong Min Lee;Moon Hyung Choi;Nieun Seo;Sang Hyun Choi;Seong Hyun Kim;Seung Soo Lee;Yang Shin Park;Yong Eun Chung;The Korean Society of Abdominal Radiology
    • Korean Journal of Radiology
    • /
    • v.22 no.1
    • /
    • pp.41-62
    • /
    • 2021
  • Radiologic imaging is important for evaluating extrahepatic bile duct (EHD) cancers; it is used for staging tumors and evaluating the suitability of surgical resection, as surgery may be contraindicated in some cases regardless of tumor stage. However, the published general recommendations for EHD cancer and recommendations guided by the perspectives of radiologists are limited. The Korean Society of Abdominal Radiology (KSAR) study group for EHD cancer developed key questions and corresponding recommendations for the radiologic evaluation of EHD cancer and organized them into 4 sections: nomenclature and definition, imaging technique, cancer evaluation, and tumor response. A structured reporting form was also developed to allow the progressive accumulation of standardized data, which will facilitate multicenter studies and contribute more evidence for the development of recommendations.

IPsec VPN Encrypted Packet Analysis Method for Contents Auditing (콘텐츠 감사를 위한 IPsec VPN 패킷 분석 기술 연구)

  • Junghyung Park;Jaenam Yoon;Jaecheol Ryou
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.41-52
    • /
    • 2024
  • Security audits of IPsec VPNs are crucial for identifying vulnerabilities caused by implementation flaws or misconfigurations, as well as investigating incidents. Nevertheless, auditing IPsec VPN presents noteworthy challenge due to the encryptiong of network contents which ensere confidentiality, integrity, authentications and more. Some researchers have suggested using man-in-the-middle(MITM) techniques to overcome this challenge. MITM techniques require direct participation in the network and prior knowledge of the pre-shared key for authentication. This causes temporary network disconnection for security audits, and it is impossible to analyse data collected before the audit. In this paper, we present an analysis technique aimed at ensuring network continuity without relying on a specific IPsec VPN topologies or authentication method. Therefore, it is anticipated that this approach will be effective, practical and adaptable for conducting IPsec VPN security