• Title/Summary/Keyword: Key-Recovery

Search Result 451, Processing Time 0.027 seconds

Authentication Technology of Public Key Infrastructure for Electronic Commerce (전자상거래를 위한 공개키 기반 하부구조의 인증 기술)

  • 유창열;임신영;송유진;함호상
    • Proceedings of the CALSEC Conference
    • /
    • 1997.11a
    • /
    • pp.167-184
    • /
    • 1997
  • 암호화 기술의 확장성과 비도 측면에서 우수한 공개키 기반 하부구조(Public Key Infrastructure)는 공개키를 보증하는 기반 기술과 인증서의 안전한 사용 기술로 구성되어있으며, 전자상거래의 기본 기술중 하나이다. 이러한 기본 기술 중에는 키 복구(Key Recovery) 및 비밀 분산(Secret Sharing) 기술등이 포함되며, 인증기관(Certificate Authority: CA)을 통한 키 관리 효율성 및 인중 기관과 사용자 간 안전한 정보 교환 기술이 요구된다. 본 논문에서는 인터넷 기반의 전자 상거래 시 사용되는 공개키 기반 하부구조에 대하여 검토 분석한다.

  • PDF

Key Recovery Mechanism in Public Key Infrastructure (공개키 기반 구조에서의 키 복구 지원 메커니즘)

  • 이용호;이임영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.766-768
    • /
    • 2002
  • 암호 사용이 증가하는 현 시점에서 키 복구 기능은 PKI(Public Key Infructure)의 부가 서비스로써 제공되어야 한다. 그러나 현재 제안된 키 복구 시스템들은 PKI에서 이용하기에는 부적절한 면을 많이 가지고 있다. 본 논문에서는 공개키 기반 구조에서 인증서를 발행하는 일련의 순서를 따라 진행하면서 키 복구를 지원하는 시스템을 제안한다. 제안된 시스템에서 사용자의 공개키는 인증기관에 의해서 생성되고, 사용자의 비밀키는 자신이 안전하게 생성하게 된다. 인증기관은 사용자의 비밀키를 모르면서 사용자의 인증서를 발행하게 된다.

  • PDF

Public Key-based Authentication Technology for Electronic Commerce (전자 상거래를 위한 공개키 기반 인증 기술)

  • 임신영;유창열;송유진;함호상;박상봉
    • Review of KIISC
    • /
    • v.7 no.3
    • /
    • pp.77-98
    • /
    • 1997
  • 암호화 기술의 확장성 측면에서 우수한 공개키 기반 하부구조(Public Key Infrastructure)는 전자 상거래 서비스에서 필요한 제반 인증 기술을 제공하고 있다. 공개키를 보증하는 기반 기술과 인증서의 안전한 사용 기술은 공개키 기반 전자 상거래의 기본 기술이다. 이러한 기본 기술 중에는 키 복구(Key Recovery) 및 비밀 분산(Secret Sharing) 기술이 포함되며 인증기관(Certificate Authority : CA)을 통한 키 관리 효율성 및 인증기관과 서비스 사용자간의 안전한 정보 교환 기술이 또한 요구된다. 본 논문에서는 인터넷 기반의 전자 상거래 시 사용되는 공개키 기반의 인증구조에 대하여 검토 분석한다.

  • PDF

Study on the distribution law and influencing factors of pressure field distribution before exploitation in heavy oilfield

  • Zhang, Xing;Jiang, Ting T.;Zhang, Jian H.;Li, Bo;Li, Yu B.;Zhang, Chun Y.;Xu, Bing B.;Qi, Peng
    • Geomechanics and Engineering
    • /
    • v.18 no.2
    • /
    • pp.205-213
    • /
    • 2019
  • A calculation model of reservoir pressure field distribution around multiple production wells in a heavy oil reservoir is established, which can overcome the unreasonable uniform-pressure value calculated by the traditional mathematical model in the multiwell mining areas. A calculating program is developed based on the deduced equations by using Visual Basic computer language. Based on the proposed mathematical model, the effects of drainage rate and formation permeability on the distribution of reservoir pressure are studied. Results show that the reservoir pressure drops most at the wellbore. The farther the distance away from the borehole, the sparser the isobaric lines distribute. Increasing drainage rate results in decreasing reservoir pressure and bottom-hole pressure, especially the latter. The permeability has a significant effect on bottom hole pressure. The study provides a reference basis for studying the dynamic pressure field distribution before thermal recovery technology in heavy oilfield and optimizing construction parameters.

Assessment Module Formulation for the Trapped-Oil Recovery Operations from Sunken Vessels (침몰선 잔존유 회수작업 평가모듈 개발에 관한 연구)

  • Kang, Kwang-gu;Lee, Eun-bang
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.1
    • /
    • pp.88-96
    • /
    • 2021
  • When oil tankers, large passenger ships and cargo ships sink under the sea owing to various maritime accidents, the residual cargo oil or fuel oil in the such vessels could pose direct risk to factor for the marine environment and it require safe and rapid removal. Although domestic and foreign salvage companies are adopting various recovery methods and technologies with customizations according to each site during recovery operations studies on reasonable assessment modules for the operation process are relatively insufficient. In this study, the data from trapped-oil recovery operations performed at different site conditions were collected and analyzed in order to designed an operation assessment module, define the operational process steps in terms of preparation, implementation and completion, and derive key factors for each detailed process. Subsequently, the module was designed in such a way as to construct performance indicators to assess these key factors. In order to exclude subjective opinions from the assessment as much as possible, the assessment each item was constructed with indicators based on data that could be evaluated quantitatively and its usefulness was verified by applying the module to the trapped-oil recovery operation cases. We expect this the method and the technology assessment module for the trapped-oil recovery operation on sunken vessels will help to verify the adequacy of the trapped-oil recovery such operation before or after. Furthermore, it is expected that the continuous accumulation of assessment data and feedback from past or future operation cases will contribute toward enhancing the overall safety, efficiency and field applicability of trapped-oil recovery operation.

Digital Forensics Investigation of Redis Database (Redis 데이터베이스에 대한 디지털 포렌식 조사 기법 연구)

  • Choi, Jae Mun;Jeong, Doo Won;Yoon, Jong Seong;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.5
    • /
    • pp.117-126
    • /
    • 2016
  • Recently, increasing utilization of Big Data or Social Network Service involves the increases in demand for NoSQL Database that overcomes the limitations of existing relational database. A forensic examination of Relational Database has steadily researched in terms of Digital Forensics. In contrast, the forensic examination of NoSQL Database is rarely studied. In this paper, We introduce Redis (which is) based on Key-Value Store NoSQL Database, and research the collection and analysis of forensic artifacts then propose recovery method of deleted data. Also we developed a recovery tool, it will be verified our recovery algorithm.

The Related-Key Attack on Grain-v1 (스트림 암호 Grain-v1에 대한 연관키 공격)

  • Lee, Yu-Seop;Jung, Ki-Tae;Sung, Jae-Chul;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.45-52
    • /
    • 2008
  • The slide resynchronization attack on Grain-v1 was proposed in [5]. Given the keystream sequence, this attack can generate the 1-bit shifted keystream sequence generated by Grain-v1. In this paper, extending the attack proposed in [5], we propose the key recovery attack on Grain-v1 using the related-key. Using the weakness of the initialization procedure of Grain-v1, this attack recover the master key with $2^{25.02}$ Ⅳs and $2^{56}$ time complexity. This attack is the first known key recovery attack on Grain-v1.

Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability

  • Qin, Chuan;Chang, Chin-Chen;Hsu, Tai-Jung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2941-2956
    • /
    • 2013
  • In this paper, we propose an effective fragile image watermarking scheme for tampering detection and content recovery. Cover image is divided into a series of non-overlapping blocks and a block mapping relationship is constructed by the secret key. Several DCT coefficients with direct current and lower frequencies of the MSBs for each block are used to generate the reference bits, and different coefficients are assigned with different bit numbers for representation according to their importance. To enhance recovery performance, authentication bits are generated by the MSBs and the reference bits, respectively. After LSB substitution hiding, the embedded watermark bits in each block consist of the information of itself and its mapping blocks. On the receiver side, all blocks with tampered MSBs can be detected and recovered using the valid extracted reference bits. Experimental results demonstrate the effectiveness of the proposed scheme.

A Cross-cultural Analysis of Online Satisfaction, Service Failure and Recovery: An E-A-S-QUAL Approach

  • Park, Min-Jung;Kim, Min-Jeong
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.35 no.6
    • /
    • pp.700-711
    • /
    • 2011
  • The purposes of the study were to identify the online service attributes that contribute to online consumer experiences of satisfaction, service failure, and service recovery and to examine whether differences exist in these attributes between U.S. and Korea. E-A-S-QUAL provided a useful framework for the study. Focus group interviews and web surveys were conducted by utilizing college students in both countries. No significant cultural differences were found in online service dimensions of service satisfaction. Personalization was the most frequently mentioned online service dimension of service satisfaction both in the U.S. and Korea. The findings showed significant cultural differences in terms of online service dimensions responsible for service failure and recovery. For Korean consumers, merchandising was one of the key online service dimensions of service failure, while efficiency was the important service dimension resulting in service failure for the U.S. consumers. In addition, for U.S. consumers, efficiency and personalization were the two most frequently mentioned service dimension for service recovery, while Korean consumers put more importance on the contact and information dimensions for service recovery. This study provided a comprehensive list of online service attributes important to online apparel retailing.

Investigation of a Hybrid HVDC System with DC Fault Ride-Through and Commutation Failure Mitigation Capability

  • Guo, Chunyi;Zhao, Chengyong;Peng, Maolan;Liu, Wei
    • Journal of Power Electronics
    • /
    • v.15 no.5
    • /
    • pp.1367-1379
    • /
    • 2015
  • A hybrid HVDC system that is composed of line commutated converter (LCC) at the rectifier side and voltage source converter (VSC) in series with LCC at the inverter side is studied in this paper. The start-up strategy, DC fault ride-through capability, and fault recovery strategy for the hybrid HVDC system are proposed. The steady state and dynamic performances under start-up, AC fault, and DC fault scenarios are analyzed based on a bipolar hybrid HVDC system. Furthermore, the immunity of the LCC inverter in hybrid HVDC to commutation failure is investigated. The simulation results in PSCAD/EMTDC show that the hybrid HVDC system exhibits favorable steady state and dynamic performances, in particular, low susceptibility to commutation failure, excellent DC fault ride-through, and fast fault recovery capability. Results also indicate that the hybrid HVDC system can be a good alternative for large-capacity power transmission over a long distance byoverhead line.