• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.028 seconds

Application of Crime Prevention Design based on Public Data Analysis: Focusing on Seoul (공공데이터분석 기반 범죄예방환경설계 적용 : 서울시 중심으로)

  • Kim, Sung-Jun
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.91-111
    • /
    • 2019
  • Violent crimes have increased continuously due to the development of urban society and have become a threatening factor against the residential safety of citizens. The prevention of these crimes is always a major topic in human society and one of the fundamental elements of the quality of life and safety of citizens. In recent years, much attention has been paid to environmental design through the Crime Prevention Through Environmental Design (CPTED) as a preventive measure. Currently, South Korea is promoting the openness and utilization of public data, and crime prevention is one of the fields that can utilize public data actively. This approach to crime prevention utilizing public data will be helpful for the proposal of policies from new viewpoints departing from the general utilization measures of CPTED that improve streetlights and closed-circuit television (CCTV) installations, whose limitations have been pointed out as they are only mechanical surveillance. Thus, this study sets the research scope based on the statistics of the status of five criminal offenses by administrative district in recent years provided by the data portal in Seoul City, the capital of South Korea, as the utilization data and concentrates on the analysis. Based on the analysis results, this study proposes a method to utilize classical music as a new policy for regions where the improvements are most needed. The open-source Python analysis program was employed as the main data analysis and visualization method.

K-Defense Cloud Computing System Design through Cloud Modeling and Analysis of Social Network Service Application (소셜 네트워크 서비스 어플리케이션의 클라우드 모델링 및 분석을 통한 국방 클라우드 컴퓨탱 시스템 설계)

  • Lee, Sung-Tae;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.37-43
    • /
    • 2013
  • In 2010, the Ministry of National Defense decided to build a MegaCenter including the cloud computing technology by 2014, as part of the '2012 Information Service Plan', which is now underway. The Cloud computing system environment should be designed applying cloud computing technology and policy for an efficient infrastructure that many IT resources are available in the data center as a concentrated form. That is, the system should be designed in such a way that clouding services will be efficiently provided to meet the needs of users and there will not be unnecessary waste of resources. However, in order to build an optimal system, it should be possible to predict the service performance and the resource availability at the initial phase of system design. In this paper, using the CloudAnalyst simulator to predict availability of the K-defence cloud computing system service, conducts cloud modeling and analysis of the 'Facebook', one of the most famous social network service applications with most users in the world. An Optimal K-Defense cloud computing design model is proposed through simulation results.

Design and Implementation of Path Computation Element Protocol (PCEP) - FSM and Interfaces (Path Computation Element 프로토콜 (PCEP)의 설계 및 구현 - FSM과 인터페이스)

  • Lee, Wonhyuk;Kang, Seungae;Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.19-25
    • /
    • 2013
  • The increasing demand for fast, flexible and guaranteed Quality of Service (QoS) in core networks has caused to deploy MultiProtocol Label Switching (MPLS) and Generalized MPLS (GMPLS) control plane. In GMPLS control plane, path computation and cooperation processes are one of the crucial element to maintain an acceptable level of service. The Internet Engineering Task Force (IETF) has proposed the Path Computation Element (PCE) architecture. The PCE is a dedicated network element devoted to path computation process and communications between Path Computation Clients (PCC) and PCEs is realized through the PCE Protocol (PCEP). This paper examines the PCE-based path computation architecture to include the design and implementation of PCEP. The functional modules including Finite State Machine (FSM) and related key design issues of each state are presented. In particular we also discuss internal/external protocol interfaces that efficiently control the communication channels.

High-speed Design of 8-bit Architecture of AES Encryption (AES 암호 알고리즘을 위한 고속 8-비트 구조 설계)

  • Lee, Je-Hoon;Lim, Duk-Gyu
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.15-22
    • /
    • 2017
  • This paper presents new 8-bit implementation of AES. Most typical 8-bit AES designs are to reduce the circuit area by sacrificing its throughput. The presented AES architecture employs two separated S-box to perform round operation and key generation in parallel. From the simulation results of the proposed AES-128, the maximum critical path delay is 13.0ns. It can be operated in 77MHz and the throughput is 15.2 Mbps. Consequently, the throughput of the proposed AES has 1.54 times higher throughput than the other counterpart although the area increasement is limited in 1.17 times. The proposed AES design enables very low-area design without sacrificing its performance. Thereby, it can be suitable for the various IoT applications that need high speed communication.

An Study on the Analysis of Design Criteria for S-Box Based on Deep Learning (딥러닝 기반 S-Box 설계정보 분석 방법 연구)

  • Kim, Dong-hoon;Kim, Seonggyeom;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.337-347
    • /
    • 2020
  • In CRYPTO 2019, Gohr presents that Deep-learning can be used for cryptanalysis. In this paper, we verify whether Deep-learning can identify the structures of S-box. To this end, we conducted two experiments. First, we use DDT and LAT of S-boxes as the learning data, whose structure is one of mainly used S-box structures including Feistel, MISTY, SPN, and multiplicative inverse. Surprisingly, our Deep-learning algorithms can identify not only the structures but also the number of used rounds. The second application verifies the pseudo-randomness of and structures by increasing the nuber of rounds in each structure. Our Deep-learning algorithms outperform the theoretical distinguisher in terms of the number of rounds. In general, the design rationale of ciphers used for high level of confidentiality, such as for military purposes, tends to be concealed in order to interfere cryptanalysis. The methods presented in this paper show that Deep-learning can be utilized as a tool for analyzing such undisclosed design rationale.

Design of the Certificate-based Authorization Policy Module in a PKI Environment (PKI 환경에서 인증서 기반 권한 정책 모듈 설계)

  • Shin, Myeong-Sook;Song, Gi-Beom;Lee, Jeong-Gi;Lee, Cheol-Seung;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.898-901
    • /
    • 2005
  • In this paper, we design an authorization policy module which provides the safty and reliable authorization of the user to provide the resolution for authorization in distributed environments. PKI have been utilized much by an information security-based structure for Internet electronic commerce, it is developing X.509-based in various application field such as a network security. Especially, it provides good resolution for the authentication of the user in the situation not to meet each other, but it is not enough to provide the resolution of the authorization in distributed computing environments. In this paper, We provide AAS model, which can be used distributed resources by distributed users, and design AAS model which is an authorization policy module in the Linux-based Apache Web server.

  • PDF

Cyber-attack and Cybersecurity Design for a Smart Work System (스마트워크 시스템을 위한 사이버 공격 및 사이버 보안 설계)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.207-214
    • /
    • 2019
  • The speed of technological development is increasing, and high-performance digital devices are spreading. Wired digital devices such as PCs have been optimized for existing wired environments, but needs are shifting away from the constraints of space and space to smart work that enables efficient work anywhere and anytime. The Smart Work System security design is needed to secure integrity and availability in the face of various security threats including physical threats (lost, stolen, and damaged terminals), technical threats (data theft, DoS: denial of service), and unauthorized access outside the wired environment. In this study, we analyzed smart work network systems, wired / wireless link systems, and digital smart devices. We also studied cyber-attack analysis and cybersecurity design methods for a Smart Work wired system and a future wireless system. This study will be used as basic data for building a secure Smart Work system.

Design of RSA cryptographic circuit for small chip area using refined Montgomery algorithm (개선된 몽고메리 알고리즘을 이용한 저면적용 RSA 암호 회로 설계)

  • 김무섭;최용제;김호원;정교일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.5
    • /
    • pp.95-105
    • /
    • 2002
  • This paper describes an efficient method to implement a hardware circuit of RSA public key cryptographic algorithm, which is important to public-key cryptographic system for an authentication, a key exchange and a digital signature. The RSA algorithm needs a modular exponential for its cryptographic operation, and the modular exponential operation is consists of repeated modular multiplication. In a numerous algorithm to compute a modular multiplication, the Montgomery algorithm is one of the most widely used algorithms for its conspicuous efficiency on hardware implementation. Over the past a few decades a considerable number of studies have been conducted on the efficient hardware design of modular multiplication for RSA cryptographic system. But many of those studies focused on the decrease of operating time for its higher performance. The most important thing to design a hardware circuit, which has a limit on a circuit area, is a trade off between a small circuit area and a feasible operating time. For these reasons, we modified the Montgomery algorithm for its efficient hardware structure for a system having a limit in its circuit area and implemented the refined algorithm in the IESA system developed for ETRI's smart card emulating system.

Simulator Design and Performance Analysis of BADA Distributed Consensus Algorithm (BADA 분산합의 알고리즘 시뮬레이터 설계 및 성능 분석)

  • Kim, Young Chang;Kim, Kiyoung;Oh, Jintae;Kim, Do Gyun;Choi, Jin Young
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.4
    • /
    • pp.168-177
    • /
    • 2020
  • In recent years, importance of blockchain systems has been grown after success of bitcoin. Distributed consensus algorithm is used to achieve an agreement, which means the same information is recorded in all nodes participating in blockchain network. Various algorithms were suggested to resolve blockchain trilemma, which refers conflict between decentralization, scalability, security. An algorithm based on Byzantine Agreement among Decentralized Agents (BADA) were designed for the same manner, and it used limited committee that enables an efficient consensus among considerable number of nodes. In addition, election of committee based on Proof-of-Nonce guarantees decentralization and security. In spite of such prominence, application of BADA in actual blockchain system requires further researches about performance and essential features affecting on the performance. However, performance assessment committed in real systems takes a long time and costs a great deal of budget. Based on this motivation, we designed and implemented a simulator for measuring performance of BADA. Specifically, we defined a simulation framework including three components named simulator Command Line Interface, transaction generator, BADA nodes. Furthermore, we carried out response surface analysis for revealing latent relationship between performance measure and design parameters. By using obtained response surface models, we could find an optimal configuration of design parameters for achieving a given desirable performance level.

Analysis of 3D Building Construction Applications in Augmented Reality

  • Khan, Humera Mehfooz;Waseemullah, Waseemullah;Bhutto, Muhammad Aslam;Khan, Shariq Mahmood;Baig, Mirza Adnan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.340-346
    • /
    • 2022
  • Construction industry is considered as one of the oldest industries in the world since human came into being and the need of their own space is realized. All this led to make the world a space of many beautiful constructive ventures. As per the requirements of today's world, every industry is recognizing the need for use and adoption of modern as well as innovative technologies due to their benefits and timely production. Now construction industry has also started adopting the use of modern and innovative technologies during their projects but still the rate of adoption is so slow. From design to completion, construction projects take a lot to manage for which technology based solutions have continuously been proposed. These include Computer Aided Design (CAD), building information modeling (BIM) and cloud computing have been proved to be much successful until now. The construction projects are high budgeted, and direly require timely and successful completion with quality, resource and other constraints. So, the researchers observe the need of more clear and technology based communication between the construction projects and its constructors and other stakeholders is required before and during the construction to take timely precautions for expected issues. This study has analyzed the use of Augmented Reality (AR) technology adopting GammaAR, and ARki applications in construction industry. It has been found that both applications are light-weighted, upgradable, provide offline availability and collaborative environment as well as fulfil most of the requirements of the construction industry except the cost. These applications also support different screen size for better visualization and deep understanding. Both applications are analyzed, based on construction's application requirements, usability of AR and ratings of applications user collected from application's platform. The purpose of this research is to provide a detail insight of construction applications which are using AR to facilitate both the future developers and consumers.