• Title/Summary/Keyword: Full security

Search Result 298, Processing Time 0.022 seconds

Side-Channel Attacks on LEA with reduced masked rounds (축소 마스킹이 적용된 경량 블록 암호 LEA-128에 대한 부채널 공격)

  • Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.253-260
    • /
    • 2015
  • The side-channel attack is widely known as an attack on implementations of cryptographic algorithms using additional side-channel information such as power traces, electromagnetic waves and sounds. As a countermeasure of side channel attack, the masking method is usually used, however full-round masking makes the efficiency of ciphers dramatically decreased. In order to avoid such a loss of efficiency, one can use reduced-round masking. In this paper, we describe a side channel attack on the lightweight block cipher LEA with the first one~six rounds masked. Our attack is based on differentials and power traces which provide knowledge of Hamming weight for the intermediate data computed during the enciphering of plaintexts. According to our experimental result, it is possible to recover 25 bits of the first round key in LEA-128.

Seismic performance of precast joint in assembled monolithic station: effect of assembled seam shape and position

  • Liu, Hongtao;Du, Xiuli
    • Earthquakes and Structures
    • /
    • v.17 no.6
    • /
    • pp.611-621
    • /
    • 2019
  • Precast concrete structure has many advantages, but the assembled seam will affect potentially the overall seismic performance of structure. Based on the sidewall joint located in the bottom of assembled monolithic subway station, the main objectives of this study are, on one hand to present an experimental campaign on the seismic behavior of precast sidewall joint (PWJ) and cast-in-place sidewall joint (CWJ) subjected to low-cycle repeated loading, and on the other hand to explore the effect of shape and position of assembled seam on load carrying capacity and crack width of precast sidewall joint. Two full-scale specimens were designed and tested. The important index of failure pattern, loading carrying capacity, deformation performance and crack width were evaluated and compared. Based on the test results, a series of different height and variably-shape of assembled seam of precast sidewall joint were considered. The test and numerical investigations indicate that, (1) the carrying capacity and deformation capacity of precast sidewall and cast-in-place sidewall were very similar, but the crack failure pattern, bending deformation and shearing deformation in the plastic hinge zone were different obviously; (2) the influence of the assembled seam should be considered when precast underground structures located in the aquifer water-bearing stratum; (3) the optimal assembled seam shape and position can be suggested for the design of precast underground concrete structures according to the analysis results.

The Effective Policy for the Establishment of Disaster Management System in Korea (우리나라의 효과적(效果的)인 재난관리체제(災難管理體制) 구책방안(構策方案)에 관한 연구(硏究))

  • Park, Dong-Kyun
    • Korean Security Journal
    • /
    • no.3
    • /
    • pp.83-116
    • /
    • 2000
  • Many concerns have been raised for importance of disaster management after 1990's numerous urban disasters in Korea. When the primary function of government is to protect lives and property of citizens, disaster management should be included in the mainstream of public administration and many hazard countermeasures should be carried out for that purpose. The principal purpose of this research is to establish ways and means needed to improve the disaster management system in Korea. This paper is split into five chapters. Chapter I is the introduction part. Chapter II introduces the reader to a disaster management theory, and deals with various disaster management systems of foreign countries such as the U.S.A. and Japan, Chapter III describes and characterizes the Korea's current disaster management system. The Korean disaster management system has been reestablished through the enactment of the Disaster Management Act of 1995 and the full revision of Natural Hazards Management Act of 1995 after series of catastrophic man-made disasters since 1993. Chapter IV is devoted to the establishment of an effective disaster management system in Korea. In this chapter, I discusses measures needed to improve the quality of CDMB(Central Disaster Management Bureau)'s service to the people. I strongly reemphasize the effectiveness of a comprehensive risk-based, all-hazard national emergency management system that addresses preparedness, mitigation, response, and recovery. To that end the Administration should develop legislation, new policies, and organizational plans to invigorate the agency with a refocussed mission. Chapter V is a conclusion. As the demand for citizens'welfare has been continuously increased in the localization, the importance of disaster management is emerging subject in the public sector. The disaster management carries out complicated affairs and manages diverse objects, the cooperation/connection system of the central-local government and citizens, and non-governmental organization should be established.

  • PDF

Hetero-core Spliced Fiber Optic Sensing System for Environmental Monitoring (환경정보 모니터링을 위한 헤테로코어형 광파이버 센싱 시스템)

  • Kim, Young Bok;Kim, Young Bae;Lee, Hwan Woo
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.3
    • /
    • pp.77-81
    • /
    • 2008
  • In this paper, we introduce a multi purpose environmental monitoring system developed as a commercially available standard using the technique of hetero-core spliced fiber optic sensor. The monitoring system has been tested and evaluated in a possible outdoor condition in view of the full scaled operation at actual sites to be monitored. Additionally, the developed system in this work conveniently provides us with various options of sensor modules intended for monitoring such physical quantities as displacement, distortion, pressure, binary states, and liquid adhesion. Two channels of optical fiber line were monitored, in each of which three displacement sensor modules were connected in series, in order to examine the performance to a pseudo-cracking experiment in the outdoor situation, and to clarify temperature influences to the system in terms of the coupling of optical connectors and the OTDR stability. The pseudo-cracking experiment successfully observed the actually given cracks by means of calculation based on the detected displacement values and their geometrical arrangement of the used sensor modules. And the robustness to the temperature is verified in the various temperature change.

  • PDF

A Study on the Autonomy of the Autonomous Weapon Systems (자율 무기체계의 자율성에 대한 연구)

  • Kim, Jong Ryul
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.101-111
    • /
    • 2018
  • The autonomous weapon systems are being developed with a global competition due to the 4th industrial revolution technologies such as artificial intelligence. This theses analyzes on the technologies related to the autonomy of the new weapons, the new changes in war fighting regime that will be brought by such autonomous weapons, the level of autonomy in a autonomous weapon system, and also the definition and functions of the autonomy. The advanced artificial intelligence for the civilian commercial sectors would be similar to the required military autonomous systems. The future war fighting regime would be the war with autonomous weapon systems without any human casualties. The level of autonomy in the future weapons would be fully autonomous without any human supervision or involvement in the decision making processes. The functions of the autonomous weapon would be to sense, to decide, and to act with a full autonomy in order to accomplish desired purposes.

  • PDF

A DDoS Attack Detection Technique through CNN Model in Software Define Network (소프트웨어-정의 네트워크에서 CNN 모델을 이용한 DDoS 공격 탐지 기술)

  • Ko, Kwang-Man
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.605-610
    • /
    • 2020
  • Software Defined Networking (SDN) is setting the standard for the management of networks due to its scalability, flexibility and functionality to program the network. The Distributed Denial of Service (DDoS) attack is most widely used to attack the SDN controller to bring down the network. Different methodologies have been utilized to detect DDoS attack previously. In this paper, first the dataset is obtained by Kaggle with 84 features, and then according to the rank, the 20 highest rank features are selected using Permutation Importance Algorithm. Then, the datasets are trained and tested with Convolution Neural Network (CNN) classifier model by utilizing deep learning techniques. Our proposed solution has achieved the best results, which will allow the critical systems which need more security to adopt and take full advantage of the SDN paradigm without compromising their security.

Development and Limitation of Income Maintenance Policy after the Financial Crisis (외환위기 20년, 소득보장정책의 발전과 한계)

  • Kim, Kyo-seong
    • 한국사회정책
    • /
    • v.24 no.4
    • /
    • pp.151-184
    • /
    • 2017
  • The purpose of this study is to investigate the development process and current status of income maintenance policies after the financial crisis, to sort out key issues or problems, and to explore future plans or directions that can overcome the limitation. In order to develop intensive argument, the scope of research is limited to the National Pension, Basic Pension, and the National Basic Livelihood Security System. The research also focused on two values of the 'universalism' and the 'adequacy' based on the 'SPF(social protection floor)' in the overall narrative process. Additionally, this paper briefly summarized the related contents released by the Moon Jae-in Government and presented an affirmative strategy and a transformational strategy centered on social allowance and basic income respectively, to establish an integrated income guarantee scheme. Although some improvements to the present system are also required, it is an effort to expand the practical effect of social benefits through the full and comprehensive reform of benefit structure and method.

Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98 (PKC'98에 제안된 해쉬 함수의 Original Version에 대한 전체 라운드 차분 공격)

  • 장동훈;성재철;이상진;임종인;성수학
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.65-76
    • /
    • 2002
  • Shin et al. proposed the new hash function with 160-bit output length at PKC'98. This hash function is based on the advantages of the existing hash functions, such as SHA-1, RIPEMD-160, HAVAL, and etc.$^{[1]}$ Recently, Han et al. cryptanalyzed the hash function proposed at PKC'98 and proposed the method finding a collision pair with $2^{-30}$ probability at FSE 2002, supposing that boolean functions satisfy SAC(Strict Avalanche Criterian).$^{[2]}$ This paper improves the method and shows that we can find a collision pair from the original version of the hash function with $2^{-37.13}$ probability through the improved method. And we point out that the problem of the function comes from shift values dependent on message.

Implementation of RSA Exponentiator Based on Radix-$2^k$ Modular Multiplication Algorithm (Radix-$2^k$ 모듈라 곱셈 알고리즘 기반의 RSA 지수승 연산기 설계)

  • 권택원;최준림
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.35-44
    • /
    • 2002
  • In this paper, an implementation method of RSA exponentiator based on Radix-$2^k$ modular multiplication algorithm is presented and verified. We use Booth receding algorithm to implement Radix-$2^k$ modular multiplication and implement radix-16 modular multiplier using 2K-byte memory and CSA(carry-save adder) array - with two full adder and three half adder delays. For high speed final addition we use a reduced carry generation and propagation scheme called pseudo carry look-ahead adder. Furthermore, the optimum value of the radix is presented through the trade-off between the operating frequency and the throughput for given Silicon technology. We have verified 1,024-bit RSA processor using Altera FPGA EP2K1500E device and Samsung 0.3$\mu\textrm{m}$ technology. In case of the radix-16 modular multiplication algorithm, (n+4+1)/4 clock cycles are needed and the 1,024-bit modular exponentiation is performed in 5.38ms at 50MHz.

Advanced ICMP Traceback Mechanism Against DDoS Attack in Router (DDoS 공격에 대한 개선된 라우터 기반 ICMP Traceback iT법)

  • 이형우
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.173-186
    • /
    • 2003
  • Distributed Denial-of-Service(DDoS) attack prevent users from accessing services on the target network by spoofing its origin source address with a large volume of traffic. The objective of IP Traceback is to determine the real attack sources, as well as the full path taken by the attack packets. Existing IP Traceback methods can be categorized as proactive or reactive dating. Proactive tracing(such as packet marking and messaging) prepares information for tracing when packets are in transit. Reactive tracing starts tracing after an attack is detected. In this paper, we propose a 'advanced ICW Traceback' mechanism, which is based on the modified pushback system with secure router mechanism. Proposed mechanism can detect and control DDoS traffic on router and can generate ICMP Traceback message for reconstructing origin attack source, by which we can diminish network overload and enhance Traceback performance.