• Title/Summary/Keyword: Security Verification

Search Result 688, Processing Time 0.024 seconds

Digital Watermark Verification with Zero Knowledge Proofs (디지털 워터마크에 대한 영지식 검증)

  • 이형우;김태윤
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.877-881
    • /
    • 2002
  • Digital contents such as image need both secure proving and publicly verification scheme on embedded digital watermark for contents distribution and copyright protection. Specially, we must provide publicly verification mechanism on digital watermark without revealing any of the secret information hidden on digital contents. In this paper, we review on the existing zero knowledge proofs and digital watermarking system, and propose advanced interactive zero knowledge proofs mechanism for enhancing the performance and security of watermark verification process. And it Provides a new watermark verification scheme without revealing any secret on the contents owner's copyright in formation.

  • PDF

OSS (Open Source Software) Usage Considerations and Verification Method (OSS 활용 고려사항과 검증 방법)

  • Park, J.H.;Park, Y.S;Kim, H.K.;Kim, Y.K.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.1
    • /
    • pp.142-153
    • /
    • 2019
  • In this paper, we focus on the process of using open source software (OSS) and factors that should be considered when using project-based OSS. We also elaborate on how to avoid using OSS licenses in an OSS-based technology development process, why dual OSS licenses and security threats should be avoided, and the method of notification after use. In addition, the OSS license verification method and environment are described in the course of project development. In the verification method, the OSS license used for technology development in the course of project execution is validated in advance by the person who decides whether or not to use the OSS, and then additional verification using the tool after technology development. It is expected that this paper will be helpful for establishing the OSS usage consideration and the license verification procedure, and environment in the future.

Frame Design for Security Policy Design and Verification (보안정책 설계 및 검증을 위한 프레임 설계)

  • 이용석;최웅철;정광수;남택용;오승희
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.113-117
    • /
    • 2003
  • 네트워크에서 보안 기능을 전개하는데 있어 정책 기반 전개 방법이 널리 사용되고 있다. 본 논문에서는 정책 기반 보안 기능 전개에 있어 정책을 설정하고 검증하기 위한 프레임을 제시한다 정책 기반 기능 전개에 있어 중요하고도 어려운 문제는 설정한 정책의 정확성(correctness)과 완전성(completeness)을 검증하는 것이지만 이에 관한 기존의 방법은 주로 경험이나 혹은 감시에 의한 끊임없는 정책 갱신이다. 본 연구에서는 기존의 제안된 여러 보안 모델들을 검토해보고 이 모델들로부터 공통적으로 적용할 수 있는 정책의 정확성과 완전성을 위한 제어 프레임을 설계한다.

  • PDF

Formal Modeling for Security System and the Development of Formal Verification Tool for Safety Property (보안시스템의 정형화설계 및 안전성 검증 도구 개발)

  • ;;;;;Dmitry P. Zegzhda
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.533-537
    • /
    • 2003
  • 보안 시스템의 안전성을 분석하기 위해서는, 정형적 방법론을 사용하여 보안 시스템에 대한 이론적인 수학적 모델을 정형적으로 설계하고, 보안 속성을 정확히 기술해야만 한다. 본 논문에서는 보안 시스템의 안전성을 검증하기 위한 보안모델의 구성요소와 안전성 검증방법을 설명한다. 그리고 보안모델을 설계하고 안전성을 분석하기 위한 SEW(Safety Evaluation Workshop)의 전체 구조와 SPR(Safety Problem Resolver) 정형검증도구의 검증방법 및 기능에 대해 소개하고자 한다.

  • PDF

Secure Direct Communication protocol Using Entanglement Swapping (Entanglement Swapping을 이용한 안전한 직접 통신 프로토콜)

  • Hong Chang-ho;Lee Hwa-yean;Kim Ji-in;Lim Jong-in;Yang Hyung-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.3-12
    • /
    • 2006
  • We propose a direct communication protocol using entanglement swapping. The safety of this protocol is guaranteed by the basic properties of entanglement swapping. This protocol is efficient to transmit two classical bits of information per one session. This efficiency is better than that of ping-pong protocol suggested by Bostrom and Felbinger. Even if an eavesdropper intervenes in midway, the eavesdropper will be detected with the probability of $75\%$ in the verification process of one bit. Therefore the perfect security is guaranteed if we use enough amount of bits for the verification process.

Verification Algorithm for the Duplicate Verification Data with Multiple Verifiers and Multiple Verification Challenges

  • Xu, Guangwei;Lai, Miaolin;Feng, Xiangyang;Huang, Qiubo;Luo, Xin;Li, Li;Li, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.558-579
    • /
    • 2021
  • The cloud storage provides flexible data storage services for data owners to remotely outsource their data, and reduces data storage operations and management costs for data owners. These outsourced data bring data security concerns to the data owner due to malicious deletion or corruption by the cloud service provider. Data integrity verification is an important way to check outsourced data integrity. However, the existing data verification schemes only consider the case that a verifier launches multiple data verification challenges, and neglect the verification overhead of multiple data verification challenges launched by multiple verifiers at a similar time. In this case, the duplicate data in multiple challenges are verified repeatedly so that verification resources are consumed in vain. We propose a duplicate data verification algorithm based on multiple verifiers and multiple challenges to reduce the verification overhead. The algorithm dynamically schedules the multiple verifiers' challenges based on verification time and the frequent itemsets of duplicate verification data in challenge sets by applying FP-Growth algorithm, and computes the batch proofs of frequent itemsets. Then the challenges are split into two parts, i.e., duplicate data and unique data according to the results of data extraction. Finally, the proofs of duplicate data and unique data are computed and combined to generate a complete proof of every original challenge. Theoretical analysis and experiment evaluation show that the algorithm reduces the verification cost and ensures the correctness of the data integrity verification by flexible batch data verification.

A Study on the Establishment of a Security and Customs Cooperation System for Reinforcement of the International Air Cargo Supply Chain Security (국제항공화물 공급망 보안 강화를 위한 보안과 세관의 협조체계 구축방안에 관한 연구)

  • Park, Man-Hui;Hwang, Ho-Won
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.4
    • /
    • pp.142-152
    • /
    • 2021
  • The International Civil Aviation Organization (ICAO) and the World Customs Organization (WCO) emphasize securing supply chain security through mutual cooperation between aviation security and customs by establishing a standardized security system by regulations, procedures and practices of international air cargo. Accordingly, in accordance with the Aviation Security Act, the known consignors system aims to secure cargo security before loading air cargo into the aircraft, while the customs AEO system is a public-private cooperation program that focuses on simplification of customs clearance procedures. These systems basically have the same purpose of effectively identifying high-risk cargo through a risk-based approach in international air cargo transportation and preventing risks in advance, and the content that a common basic standard for cargo security must be established is also similar. Therefore, it is necessary to establish a cooperation system by simplifying problems such as cumbersome and redundant authentication procedures and on-site verification through coordination of security requirements for mutual recognition between the two systems. As a result, it is necessary to establish a process for coordinating security and customs' supply chain security program and maximize the effect of harmonizing supply chain security by strengthening the linkage between known consignors and AEO.

Wireless PKI Based Certificate Verification Using Virtual Identifier (무선 PKI 기반의 가상 식별자를 이용한 인증서 검증)

  • Choi Seung-Kwon;Shin Jung-Won;Shin Dong-Hwa;Kim Sun-Chul;Lee Byong-Rok;Cho Young-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.8A
    • /
    • pp.804-813
    • /
    • 2006
  • In wireless Internet environment that demand of wireless Internet service increase steadily, wireless PKI(Public Key Infrastructure) service is appearing on stage as necessary essential base technology for information protection service offer, In this paper, we propose the method for verification to reduce the communication overload using VID to CSMP made with a goal of the performance guarantee for security and use in a real time and examine the existent certificate verification methods. The performance of security and the use in a real time is guaranteed by managing the note of authentification by the person who verifies and reducing the amount of the data transmission using VID.

A Practical Implementation of Fuzzy Fingerprint Vault

  • Lee, Sun-Gju;Chung, Yong-Wha;Moon, Dae-Sung;Pan, Sung-Bum;Seo, Chang-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.10
    • /
    • pp.1783-1798
    • /
    • 2011
  • Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by hiding the fingerprint features. In this paper, we implement the fuzzy fingerprint vault, combining fingerprint verification and fuzzy vault scheme to protect fingerprint templates. To implement the fuzzy fingerprint vault as a complete system, we have to consider several practical issues such as automatic fingerprint alignment, verification accuracy, execution time, error correcting code, etc. In addition, to protect the fuzzy fingerprint vault from the correlation attack, we propose an approach to insert chaffs in a structured way such that distinguishing the fingerprint minutiae and the chaff points obtained from two applications is computationally hard. Based on the experimental results, we confirm that the proposed approach provides higher security than inserting chaffs randomly without a significant degradation of the verification accuracy, and our implementation can be used for real applications.

A direction of warfighting experiments for a scientific combat Development (과학적 전투발전을 위한 전투실험 발전 방향)

  • Chung, Choon-Il;Lee, Myeong-Woo
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.351-392
    • /
    • 2007
  • Combat Development is process of studying and developing concept, doctrine, weapon systems, organization and training for the improvement of combat capability to be ready present and future warfare. The combat development domain consists of 6 fields Doctrine, Organization, Material, Training, Personnel, and Facilities. The cornerstones of combat development are "How to prepare" and "How to fight" in the future warfare. ROK- TRADOC(Republic of Korea Army Training and Doctrine Command) has implemented combat development that applies CBRS (Concept-Based Requirements System) and "Vision - Capstone concept - operating and functional concept - FOC(Future Operational Capabilities) Requirements". To prepare for the possibility or new types or wars in the future, the creation of new concept and system is essential. Though verification with various instruments, combat power can be secured and exhibited. Combat development by empirical mind estimation means that is no longer relevant.To prepare combat development based on scientific analysis, there is a need for powerful engineering analysis and verification, in order to prepare for uncertain and diverse future battlefield environments. In this thesis, warfighting experiment is essential ways and means to pursue the scientific combat development ; investigated tendency of combat development environment, and analyzed diversification aspects of possible future warfare. In conclusion, concept of campaign experiment and role is the conerstone of scientific combat development; and lays out the roadmap of all affecting components to its development.

  • PDF