• Title/Summary/Keyword: Point Signature

Search Result 77, Processing Time 0.019 seconds

Software Defined Perimeter(SDP) Authentication Mechanism for Zero Trust and Implementation of ECC Cryptoraphy (제로 트러스트를 위한 소프트웨어 정의 경계(SDP) 인증 메커니즘 제안 및 ECC 암호 구현)

  • Lee, Yun-kyung;Kim, Jeong-nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1069-1080
    • /
    • 2022
  • Zero trust, which means never trust anything before verifying it, is emerging as a hot issue in security field. After authenticating users, zero trust establishes network boundaries so that only networks in the trusted range can be accessed. This concept is also consistent with the concept of SDP, which performs pre-verification and creates a network boundary with a dynamic firewall so that clients can access only as many as they have permission to connect. Therefore, we recommend the SDP model as an example of how zero trust can be achieved in a zero trust architecture. In this paper, we point out the areas where SDP needs to be modified for zero trust and suggest ways to overcome them. In addition, we propose an onboarding method, which is one of the processes for becoming an SDP entity, and present performance measurement results.

Analysis of the Cryptosystem of the Korean Government Public-Key Infrastructure and Ways to Improve It (행정전자서명 암호체계 기술 현황 분석 및 고도화 방향)

  • Younghoon Jung;Dongyoung Roh;Bonwook Koo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.13-31
    • /
    • 2023
  • Korean Government-PKI (GPKI) is a public-key infrastructure which provides authentication and security functions for information system used by central government, local governments, and public institutions of the Republic of Korea to provide their own administrative and public services. The current cryptosystem of GPKI was established in the early 2000s, and more than ten years have passed since the last improvement in 2010. Over the past decade or so, the information security, including cryptography, has undergone many changes and will continue to face many changes. Therefore, for the sustainable security of GPKI, it is necessary to review the security of the cryptosystem at this point. In this paper, we analyze the current status and the security of technologies and standards used in the system. We identify cryptographic algorithms with degraded security, international standards which are obsoleted or updated, and cryptographic parameters that should be revised for the high security level. And based on this, we make several suggestions on the reorganization of cryptographic algorithms and related technologies for the security enhancement of GPKI.

Molecular Cloning and Expression Analysis of Red-spotted Grouper, Epinephelus akaara Hsp70 (수온변화에 따른 붉바리(Epinephelus akaara)의 heat shock protein (Hsp) 70 mRNA 발현)

  • Min, Byung Hwa;Hur, Jun Wook;Park, Hyung Jun
    • Journal of Life Science
    • /
    • v.28 no.6
    • /
    • pp.639-647
    • /
    • 2018
  • A new heat shock protein 70 was identified in red-spotted grouper (Epinephelus akaara) based on an expression analysis. The cDNA of red-spotted grouper Hsp70 (designated RgHsp70) was cloned by the rapid amplification of cDNA ends (RACE) techniques. The full-length of RgHsp70 cDNA was 2,152 bp, consisting of a 5'-terminal untranslated region (UTR) of 105 bp, a 3'-terminal UTR of 274 bp, and an open reading frame (ORF) of 1,773 bp that encode a polypeptide of 590 amino acids with a theoretical molecular weight of 64.9 kDa and an estimated isoelectric point of 5.2. Multiple alignment and phylogenetic analyses revealed that the RgHsp70 gene shares a high similarity with other Hsp70 fish genes. RgHsp70 contained all three classical Hsp70 family signatures. The results indicated the RgHsp70 is a member of the heat shock protein 70 family. RgHsp70 mRNA was predominately expressed in the liver, with reduced expression noted in the head-kidney tissues. The expression analysis of different water temperatures (21, 18, 15 and $12^{\circ}C$) for sampled livers revealed that expression gradually increased at $12^{\circ}C$ compared to $21^{\circ}C$. In this study, the effects of water temperature lowering on the physiological conditions were investigated, and the results revealed that novel RgHsp70 may be an important molecule involved in stress responses.

Design and Implementation of High-dimensional Index Structure for the support of Concurrency Control (필터링에 기반한 고차원 색인구조의 동시성 제어기법의 설계 및 구현)

  • Lee, Yong-Ju;Chang, Jae-Woo;Kim, Hang-Young;Kim, Myung-Joon
    • The KIPS Transactions:PartD
    • /
    • v.10D no.1
    • /
    • pp.1-12
    • /
    • 2003
  • Recently, there have been many indexing schemes for multimedia data such as image, video data. But recent database applications, for example data mining and multimedia database, are required to support multi-user environment. In order for indexing schemes to be useful in multi-user environment, a concurrency control algorithm is required to handle it. So we propose a concurrency control algorithm that can be applied to CBF (cell-based filtering method), which uses the signature of the cell for alleviating the dimensional curse problem. In addition, we extend the SHORE storage system of Wisconsin university in order to handle high-dimensional data. This extended SHORE storage system provides conventional storage manager functions, guarantees the integrity of high-dimensional data and is flexible to the large scale of feature vectors for preventing the usage of large main memory. Finally, we implement the web-based image retrieval system by using the extended SHORE storage system. The key feature of this system is platform-independent access to the high-dimensional data as well as functionality of efficient content-based queries. Lastly. We evaluate an average response time of point query, range query and k-nearest query in terms of the number of threads.

Analysis on Power Consumption Characteristics of SHA-3 Candidates and Low-Power Architecture (SHA-3 해쉬함수 소비전력 특성 분석 및 저전력 구조 기법)

  • Kim, Sung-Ho;Cho, Sung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.115-125
    • /
    • 2011
  • Cryptographic hash functions are also called one-way functions and they ensure the integrity of communication data and command by detecting or blocking forgery. Also hash functions can be used with other security protocols for signature, authentication, and key distribution. The SHA-1 was widely used until it was found to be cryptographically broken by Wang, et. al, 2005. For this reason, NIST launched the SHA-3 competition in November 2007 to develop new secure hash function by 2012. Many SHA-3 hash functions were proposed and currently in review process. To choose new SHA-3 hash function among the proposed hash functions, there have been many efforts to analyze the cryptographic secureness, hardware/software characteristics on each proposed one. However there are few research efforts on the SHA-3 from the point of power consumption, which is a crucial metric on hardware module. In this paper, we analyze the power consumption characteristics of the SHA-3 hash functions when they are made in the form of ASIC hardware module. Also we propose power efficient hardware architecture on Luffa, which is strong candidate as a new SHA-3 hash function. Our proposed low power architecture for Luffa achieves 10% less power consumption than previous Luffa hardware architecture.

RMCS Plan and the Embodiment for the Home Network Service which is Safeent (안전한 Home Network 서비스를 위한 RMCS 설계 및 구현)

  • Sun, Jae-Hoon;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.19-27
    • /
    • 2005
  • As home network is increasing to use, home network industry is developing too. Also, it is to be a popular subject in the network's topics. In this reasons, home network become a important thing because home gateway function is working between access network and home network. In the home network, it relates on the personal computer, home pad, and digital television. But, home gateway is not prepared standard point about techniques. Therefore, many kind of technique want to try for developing of home gateway's functions. Usually, we use ID/PASSWORD method in network control system. But, we found a lot of problems about classical network system while we experienced Jan/25 big trouble. We are considering about that home network system are using same network net. Therefore, seriously we have to check about security and safety at the home network's environment. This report focus on the home network's environment to control for using and efficiency and then it wants to find ways to protect from the internal and external attacks. Existing ID/PASSWORD method it used a electronic signature and the security against the approach from of external watch, the MIB structure of role base and the security of the Home network which leads the authority control which is safe even from the Home network inside it strengthened it used compared to it proposed.

  • PDF

Evaluation and Overlook on the National Archives System in the Perspective of Democracy (민주주의 관점으로 본 국가기록관리체계 평가와 전망)

  • Jo, Minji;Lee, Young-nam
    • The Korean Journal of Archival Studies
    • /
    • no.53
    • /
    • pp.5-43
    • /
    • 2017
  • This article adapts the democratic approach to the National Archives System. We must now search for a new archival landscape. Authors are agreeing that democracy is a basic principle for the new national archives model. This research looks into the direction of reform of the national record organizations in terms of individuality, integrity, and professionalism. It is, the fact that there are discussions rising on the need to reform the national records organization in the recent perspective of democracy. Democracy is a system that takes responsibility of even the results. This article describes all the discussions on what the best model for national archives system could be. In this social regulation, the archives carry out a noble mission of accountability. The discussion that suggests a clear perspective of democracy must be taken in to notice. Authors try to represent the voices of records managers. They also argue that records managers are the common wealth for our society. The national archives system is now the signature for the moral identity of national ruling powers. We argue that the new archives model should be derived from the point of the Candle Revolution.