• Title/Summary/Keyword: Security countermeasure

Search Result 377, Processing Time 0.021 seconds

Power Attacks Resistant Countermeasure using Random Separation of Scalar Multiplication Method for ECC (타원곡선 암호시스템에서 랜덤 분할 상수배를 이용한 전력 공격의 대응방법)

  • 김창균;이경근;하재철;문상재
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.580-583
    • /
    • 2002
  • 본 논문에서는 전력 공격에 대응하는 효과적인 타원곡선 상수배 알고리즘을 제안하고 기존의 여러 대응방법과 비교해 몇가지 장점을 제시하였다. 타원곡선 암호시스템에 대한 전력 공격의 대응방법으로 스칼라 정수의 랜덤 분할을 이용한 다중 상수배 알고리즘을 사용하였으며 이 방법의 계산량은 기존의 대응방법과 비교해 적은 연산량을 가지고 있다. 윈도우 크기가 4인 제안된 대응방법은 기존의 대응방법들과 비교해 약 46.6%∼83.6%가 향상되었다.

  • PDF

The Improvement Plan of a Cash Transportation Structure (현금수송구조의 개선방안)

  • Hong, Weon-Yong
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.409-423
    • /
    • 1997
  • Cash is apt to cause a accident in circulation process regardless of a time, a place and a subject due to its particularity. I propose a good service through circulation harmony by remodeling the system of the structure of cash supply and demand. And I propose accident prevention countermeasure by removing a caxh accident by the simplification, specialization and soientification of money business. I discuss the present condition and the points of cash transportation structure in Chapter 2 and the improvement plan of cash transportation structure in Chapter 3, and conclude in Chapter 4.

  • PDF

Analysis of Typical Hacking Attacks and Countermeasure to these Kinds of Attacks (최근 해킹 사고 분석 및 대비책 연구)

  • 강찬규;최상명;여돈구;염흥열
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.227-232
    • /
    • 2003
  • 인터넷이라는 거대한 네트워크 망을 통해서 다양한 정보를 손쉽게 주고받을 수 있게 되었다. 하지만 대부분의 이용자들은 네트워크의 편리한 사용에만 관심을 두고 있으며, 보안에는 별로 신경을 쓰지 않고 있는 추세이다. 인터넷 이용자가 늘어남에 따라 정보들에 대한 보호의 필요성이 증가하고 있다. 보안은 개별 인터넷 이용자 시스템에서 시작하여 인터넷 서버 관리자 시스템까지 광범위하게 적용되어야 한다. 본 논문에서는 최근 유행하는 2가지 대표적인 해킹 사고의 예를 들어 원인을 분석하고 이를 방지하기 위한 대비책을 제시하며, 추후의 해킹 기술의 동향을 제시한다.

  • PDF

A countermeasure using secret-key blinding for hardware fault cryptanalysis on elliptic curve scalar multiplication (타원곡선 스칼라 곱셈에 대한 비밀키 blinding을 적용한 hardware fault cryptanalysis 대응방법)

  • 여일연;이경근;김환구;문상재
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.132-138
    • /
    • 2001
  • 본 논문에서는 타원곡선 스칼라 곱셈에 대하여 새로운 형태의 hardware fault cryptanalysis를 적용해 보고, 이에 대한 대응방법으로서 비밀키 blinding방법을 제안하고 있다. 또한 비밀키 blinding 방법을 사용함으로써 늘어나는 연산량을 기존의 대응 방법과 비교하고, 이러한 비밀키 blinding방법이 사용될 수 있는 범위에 대해 다루고 있다.

  • PDF

A Tendency of Experiments and Hardware Countermeasure on Power Analysis Attacks (전력분석공격에 대한 실험 및 하드웨어적 대응방법의 동향)

  • 안만기;이훈재;황운희
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.169-173
    • /
    • 2003
  • 스마트카드는 내부의 암호 알고리듬이 수행될 때, 비밀키와 관련된 여러 가지 물리적인 정보가 누출될 가능성이 있다. 이러한 물리적 정보를 이용하는 전력분석공격은 현재 많은 이론적 분석, 실험 및 대응방법이 연구되어지고 있다. 본 논문에서는 국내외 하드웨어적인 전력분석공격 실험 및 대응방법에 대한 최신 연구동향을 분석하고자 한다. 연산과정과 데이터의 해밍 웨이트에 따른 실험 동향을 예측한 후 하드웨어 대응방법들에 대한 동향과 문제점들을 기술한다.

  • PDF

On the Configuration and Improvement of Security Control Systems (보안관제시스템 구성 및 개선방안 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.69-80
    • /
    • 2017
  • Due to the advanced IT environment, the role of Security Monitoring & Control becomes more important as the cyber-crime is becoming intelligent, diversified, and advanced. In contrast to the way it relied solely on security devices such as Firewall and IDS in the past, Security Monitoring & Control tasks responding to cyber attacks through real-time monitoring have become wide spread and their role is also important. In response to current cyber threats, since security equipment alone can not be guaranteed a stable defense, the task of Security Monitoring & Control became essential to operate and monitor security equipment and to respond in real time. In this study, we will discuss how to configure network security system effectively and how to improve the real-time Security Monitor & Control.

A Practical Security Risk Analysis Process and Tool for Information System

  • Chung, Yoon-Jung;Kim, In-Jung;Lee, Do-Hoon
    • Journal of Information Processing Systems
    • /
    • v.2 no.2
    • /
    • pp.95-100
    • /
    • 2006
  • While conventional business administration-based information technology management methods are applied to the risk analysis of information systems, no security risk analysis techniques have been used in relation to information protection. In particular, given the rapid diffusion of information systems and the demand for information protection, it is vital to develop security risk analysis techniques. Therefore, this paper will suggest an ideal risk analysis process for information systems. To prove the usefulness of this security risk analysis process, this paper will show the results of managed, physical and technical security risk analysis that are derived from investigating and analyzing the conventional information protection items of an information system.

A Study on Developing the Educational Program for the Emergency Response with a Railroad Fire Accident (철도화재사고 비상대응 교육프로그램 개발에 관한 연구)

  • Roh, Sam-Kew;Park, Sang-Gyu;Ham, Eun-Gu;Kim, Si-Gon
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.1511-1517
    • /
    • 2008
  • In January, 2005, "railroad security law" was presented, preparing the systematic equipment that allows several railroad operators to consider the railroad security issue, and each of railroad operative institutions accepted such situation that construct the integral railroad security system, resulting in constructing the emergent system coping with the railroad fire accident through the relevant study business to improve the railroad security efficiency against fire. This study tried to present the studying direction on developing the emergent educational program coping with the railroad fire accident, which is distributed to the spot, about the railroad worker for improving the railroad security efficiency against fire through the education of systematic and efficient emergent countermeasure procedure of emergent system against the railroad fire accident.

  • PDF

Analysis and Countermeasure of Malicious Code in Small Businesses (중소기업 환경에서 악성코드 유형 분석과 대응 방안)

  • Hong, Jun Suk;Kim, Young hee;Park, Won Hyung;Kook, Kwang Ho
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.55-62
    • /
    • 2015
  • Due to the development of various information systems and PC, usage of Internet has rapidly increaced which lead to malicious codes rapidly spreading throughout the Internet. By the increasing use of the Internet, the threat by malicious codes has become a serious problem. In particular, Small businesses which lack investments in security personnels makes it impossible to verify and measure the servers and PC infected with malicious codes. We have analized malware infection types by using malicious code detection technology of security monitoring service and proposed countermeasures in small businesses.

Study on the physical vulnerability factors in the convergence IT environment (융합 IT 환경의 물리적 취약요인에 관한 연구)

  • Jeon, Jeong Hoon;Ahn, Chang Hoon;Kim, Sang Choon
    • Convergence Security Journal
    • /
    • v.16 no.1
    • /
    • pp.59-68
    • /
    • 2016
  • Recently, many domestic and foreign industries is increasing gradually in the importance of security such as the emergence of a Convergence Information Technology(internet of things, cloud computing service, big data etc). Among these techniques, the industrial security market is expected to grow gradually and the evolution of security technologies, as well as vulnerabilities are also expected to increase. Therefore, an increase in physical vulnerability factors it is no exaggeration to standards that are determining the security of industrial security. In this paper will be analyzed to the physical security technology and case study, physical vulnerability factor. Thereby this is expected to be utilized as a basis for the countermeasure of physical corresponding infringement and attack in a future.