• Title/Summary/Keyword: Security design

Search Result 3,415, Processing Time 0.024 seconds

Dragon-MAC: Securing Wireless Sensor Network with Authenticated Encryption (Dragon-MAC: 인증 암호를 이용한 효율적인 무선센서네크워크 보안)

  • Lim, Shu-Yun;Pu, Chuan-Chin;Lim, Hyo-Taek;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1519-1527
    • /
    • 2007
  • In order to combat the security threats that sensor networks are exposed to, a cryptography protocol is implemented at sensor nodes for point-to-point encryption between nodes. Given that nodes have limited resources, symmetric cryptography that is proven to be efficient for low power devices is implemented. Data protection is integrated into a sensor's packet by the means of symmetric encryption with the Dragon stream cipher and incorporating the newly designed Dragon-MAC Message Authentication Code. The proposed algorithm was designed to employ some of the data already computed by the underlying Dragon stream cipher for the purpose of minimizing the computational cost of the operations required by the MAC algorithm. In view that Dragon is a word based stream cipher with a fast key stream generation, it is very suitable for a constrained environment. Our protocol regarded the entity authentication and message authentication through the implementation of authenticated encryption scheme in wireless sensor nodes.

Contemporary Management of University's Strategic Development: the Case Study on Ukrainian Universities

  • Kovtun, Olena;Lutsiak, Vitalii;Ostapchuk, Anatolii;Lavinska, Daria;Sieriebriak, Kseniia;Kononenko, Anna;Bebko, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.269-279
    • /
    • 2021
  • In the current conditions of world socio-economic development, the strategic support of the process of managing the development of universities has become a particularly important area. Strategic management requires reliable information and analytical support in the form of sound descriptions of strategic directions of development, assumptions, and forecasts. The purpose of the study is to substantiate and elaborate the crucial causes in the strategic management of university's development and to suggest the coherent prospects for advancements. The data analysis was performed using descriptive methods to identify the most significant causes that affect the university's strategic development; the expert assessment was used to rank the factors, ultimately to assess each factor that affects to some extent the university's strategic development; the abstract-logical method was used to ground the positive impact of computer technologies and e-learning on the strategic development of a university and to formulate proposals for its further progress. The main results provided in the given paper showed that significant and most important strategic cause of university's development lies in the field of improving the quality of education, expanding access to educational services based on computer technology and its functionality. In turn, its widespread use at all stages of the educational process allows providing a number of advancements for universities in strategic prospects.

Development of Integrated Computational Fluid Dynamics(CFD) Environment using Opensource Code (오픈소스 코드를 이용한 통합 전산유체역학 환경 구축)

  • Kang, Seunghoon;Son, Sungman;Oh, Se-Hong;Park, Wonman;Choi, Choengryul
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.33-42
    • /
    • 2018
  • CFD analysis is an analytical technique that applies a computer to the design and development of products across the entire industry for heat or fluid flow. This technology is used to shorten the development period and reduce costs through computerized simulation. However, the software used for CFD analysis is now required to use expensive foreign software. The Opensource CFD analysis software used in the proposed system has reliability of commercial CFD analysis software and has various user groups. However, for users who have expert knowledge, Opensource CFD software which supports only text interface environment, We have developed an environment that enables the construction of a CFD analysis environment for beginners as well as professionals. In addition, the proposed system supports the pre-processing (design and meshing) environment for CFD analysis and the environment for post-processing (result analysis & visualization), enabling the integrated CFD analysis process in one platform.

  • PDF

A Study of System Design for Management the Confidential Records (비밀기록을 관리하기 위한 시스템 설계 연구)

  • Hong, Deok-Yong
    • The Korean Journal of Archival Studies
    • /
    • no.52
    • /
    • pp.277-313
    • /
    • 2017
  • With the enactment of regulations on confidential records management, the management of confidential records has become more important than ever. However, there remains no management method in the field of records management that takes the feature and values of confidential records into consideration. For this, this study processed electronically confidential records managed in a non-electronic environment. In addition, we developed a system that will allow public institutions to manage confidential records independently, that will prevent loss of information because of loss of or damage to the confidential records, and that can be used conveniently in the digital security environment of authorized users to establish a foundation for commercial management. In this study, we analyzed the system configuration requirements according to the international standard for the records management of a confidential records management system and system-related issues such as system design based on the analyzed requirements, system security and encryption, and metadata, the overall process of establishing and outputting secret management records and standard management.

Analysis of the Influence of Domestic Open Banking Quality Factors on Intention to Use (국내 오픈뱅킹 품질요소가 사용자 이용의도에 미치는 영향분석)

  • Jung, Bo-chun;Hong, Suk-ki
    • Journal of Internet Computing and Services
    • /
    • v.22 no.5
    • /
    • pp.69-77
    • /
    • 2021
  • The main channels of the financial industry are rapidly changing to mobile. In this environment, banks are focusing on information and communication technology to secure their competitiveness, and rapid innovation is being pursued especially in the payment settlement sector. In October 2019, Korea also introduced open banking services to accelerate the financial innovation, such as the open conversion of financial settlement networks and the expansion of the use of simple payments. In this paper, an empirical study was conducted on the effect of domestic open banking quality factors on usage intention. The service quality factors for open banking were classified into interface design, innovation, security, and data sharing, and the technology acceptance model (TAM) was used to verify whether it has a significant effect on perceived convenience, usefulness and intention to use. According to the analysis results, while innovation and security did not have a significant effect on convenience and usefulness, interface design and data sharing were found to have an effect on perceived convenience. The results would provide implications for some quality issues for companies seeking to introduce open banking services as well as for the related academic arena.

Design of Cryptographic Processor for Rijndael Algorithm (Rijndael 암호 알고리즘을 구현한 암호 프로세서의 설계)

  • 전신우;정용진;권오준
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.6
    • /
    • pp.77-87
    • /
    • 2001
  • This paper describes a design of cryptographic processor that implements the Rijndael cipher algorithm, the Advanced Encryption Standard algorithm. It can execute both encryption and decryption, and supports only 128-bit block and 128-bit keys. As the processor is implemented only one round, it must iterate 11 times to perform an encryption/decryption. We implemented the ByteSub and InvByteSub transformation using the algorithm for minimizing the increase of area which is caused by different encryption and decryption. It could reduce the memory size by half than implementing, with only ROM. We estimate that the cryptographic processor consists of about 15,000 gates, 32K-bit ROM and 1408-bit RAM, and has a throughput of 1.28 Gbps at 110 MHz clock based on Samsung 0.5um CMOS standard cell library. To our knowledge, this offers more reduced memory size compared to previously reported implementations with the same performance.

Design of AES Cryptographic Processor with Modular Round Key Generator (모듈화된 라운드 키 생성회로를 갖는 AES 암호 프로세서의 설계)

  • 최병윤;박영수;전성익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.5
    • /
    • pp.15-25
    • /
    • 2002
  • In this paper a design of high performance cryptographic processor which implements AES Rijndael algorithm is described. To eliminate performance degradation due to round-key computation delay of conventional processor, the on-the-fly precomputation of round key based on modified round structure is adopted. And on-the-fly round key generator which supports 128, 192, and 256-bit key has modular structure. The designed processor has iterative structure which uses 1 clock cycle per round and supports three operation modes, such as ECB, CBC, and CTR mode which is a candidate for new AES modes of operation. The cryptographic processor designed in Verilog-HDL and synthesized using 0.251$\mu\textrm{m}$ CMOS cell library consists of about 51,000 gates. Simulation results show that the critical path delay is about 7.5ns and it can operate up to 125Mhz clock frequency at 2.5V supply. Its peak performance is about 1.45Gbps encryption or decryption rate under 128-bit key ECB mode.

Design and implementation of Jini-based secure event service using SPKI/SDSI certificate (SPKI/SDSI 인증서를 이용한 Jini 기반의 안전한 이벤트 서비스 설계 및 구현)

  • Park, Hee-Man;Kim, In-Su;Lee, Young-Lok;Lee, Hyung-Hyo;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.3-13
    • /
    • 2006
  • As computing devices become ubiquitous and increasingly mobile, it becomes obvious that a synchronous and direct peer-to-peer communication model is not sufficient in distributed computing environment. Using an indirect event service instead of other traditional communication model has an advantage of decreasing the coupling of applications in a distributed environment and removing the need for many static dependencies. In this paper, we design and implement the secure event service for providing secure ubiquitous computing environment. The Secure Event Service implemented enables users to perform content-based event retrieval, and supports only eligible event comsumer and event producer can publish and receive events through the secure event service. SPKI/SDSI certificate is used for supporting authentication and authorization in the secure event service. In order to provide a content-based event retrieval, an asynchronous communication between event producers and consumers, and a disconnectedness support for mobile devices, we modify and expand the Javaspace package.

Privacy Leakage Monitoring System Design for Privacy Protection (개인정보보호를 위한 개인정보 유출 모니터링 시스템의 설계)

  • Cho, Sung-Kyu;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.99-106
    • /
    • 2012
  • Numerous private corporations and public institutions are collecting personal information through the diverse methods for the purpose of sales, promotion and civil services, and using personal information for the profits of the organizations and services. However, due to immaturity of the technical, managerial measures and internal control for the collected personal information, the misuse, abuse and the leaks of personal information are emerged as major social issues, and the government also is promoting implementation of the act on the privacy protection by recognizing the importance of the personal information protection. This research describes on the measures to detect the anomaly by analyzing personal information treatment patterns managed by the organizations, and on the measures to coup with the leaks, misuse, and abuse of personal information. Particularly, this research is intended to suggest privacy leakage monitoring system design, which can be managed by making the elements related to personal information leaks to numeric core risk indexes to be measured objectively.

Optimized DES Core Implementation for Commercial FPGA Cluster System (상용 FPGA 클러스터 시스템 기반의 최적화된 DES 코어 설계)

  • Jung, Eun-Gu;Park, Il-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.131-138
    • /
    • 2011
  • The previous FPGA cluster systems for a brute force search of DES keyspace have showed cost efficient performance, but the research on optimized implementation of the DES algorithm on a single FPGA has been insufficient. In this paper, the optimized DES implementation for a single FPGA of the commercial FPGA cluster system with 77 Xilinx Virtex5-LX50 FPGAs is proposed. Design space exploration using the number of pipeline stages in a DES core, the number of DES cores and the maximum clock frequency of a DES core is performed which leads to integrating 16 DES cores running at 333MHz. Also low power design is applied to reduce the loss of performance caused by limitation of power supply on each FPGA which results in fitting 8 DES cores running at 333MHz. When the proposed DES implementations would be used in the FPGA cluster system, it is estimated that the DES key would be found at most 2.03 days and 4.06 days respectively.