• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.028 seconds

Cryptanalysis of Two Block Ciphers based on Cellular Automata (셀룰러 오토마타 기반 블록 암호에 대한 안전성 분석)

  • Ryu, Han-Seong;Lee, Je-Sang;Lee, Chang-Hoon;Hong, Seok-Hie
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.8
    • /
    • pp.1111-1120
    • /
    • 2008
  • Cellular automata(CA) is often applied to design cryptosystems because it has good diffusion and local interaction effects. Recently, a 128-bit CA-based block cipher, called CAB1, and a 64-bit reversible CA-based block cipher, called CAB2, were proposed in KMMS'02 and CEC'04, respectively. In this paper, we introduce cryptanalytic results on CAB1 and CAB2. Firstly, we propose a differential attack on CAB1, which requires $2^{31.41}$ chosen plaintexts with about $2^{13.41}$ encryptions. Secondly, we show that CAB2 has a security of 184 bits using the statistical weakness. Note that the designers of CAB2 insist that it has a security of 224 bits. These are the first known cryptanalytic results on them.

  • PDF

A DDMPF(Distributed Data Management Protocol using FAT) Design of Self-organized Storage for Negotiation among a Client and Servers based on Clouding (클라우딩 기반에서 클라이언트와 서버간 협상을 위한 자가 조직 저장매체의 DDMPF(Distributed Data Management Protocol using FAT) 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee;Yang, Seung-Hae
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.8
    • /
    • pp.1048-1058
    • /
    • 2012
  • This paper proposes the DDMPF(Distributed Data Management Protocol using FAT) which prevents data loss and keeps the security of self-organized storages by comprising a client, a storage server, and a verification server in clouding environment. The DDMPF builds a self-organized storage server, solves data loss by decentralizing the partitioned data in it in contrast to the centralized problem and the data loss caused by the storage server problems of existing clouding storages, and improves the efficiency of distributed data management with FAT(File Allocation Table). And, the DDMPF improves the reliability of data by a verification server's verifying the data integrity of a storage server, and strengthens the security in double encryption with a client's private key and the system's master key using EC-DH algorithm. Additionally, the DDMPF limits the number of verification servers and detects the flooding attack by setting the TS(Time Stamp) for a verification request message and the replay attack by using the nonce value generated newly, whenever the verification is requested.

A Design of Permission Management System Based on Group Key in Hadoop Distributed File System (하둡 분산 파일 시스템에서 그룹키 기반 Permission Management 시스템 설계)

  • Kim, Hyungjoo;Kang, Jungho;You, Hanna;Jun, Moonseog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.4
    • /
    • pp.141-146
    • /
    • 2015
  • Data have been increased enormously due to the development of IT technology such as recent smart equipments, social network services and streaming services. To meet these environments the technologies that can treat mass data have received attention, and the typical one is Hadoop. Hadoop is on the basis of open source, and it has been designed to be used at general purpose computers on the basis of Linux. To initial Hadoop nearly no security was introduced, but as the number of users increased data that need security increased and there appeared new version that introduced Kerberos and Token system in 2009. But in this method there was a problem that only one secret key can be used and access permission to blocks cannot be authenticated to each user, and there were weak points that replay attack and spoofing attack were possible. Hence, to supplement these weak points and to maintain efficiency a protocol on the basis of group key, in which users are authenticated in logical group and then this is reflected to token, is proposed in this paper. The result shows that it has solved the weak points and there is no big overhead in terms of efficiency.

The Strategy and Prospects of CPTED for Sustainable Urban Development (지속 가능한(Sustainable) 도시발전을 위한 방범환경설계(CPTED)의 전략과 향후 과제)

  • Park, Hyeon-Ho;Kim, Young-Jea
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.173-193
    • /
    • 2008
  • This paper discusses how the strategies for crime prevention are interrelated to sustainable urban development. The sustainable urban development for healthy and safe cities implies regulations or legal, lawful control to reduce fear of crime and prevent substantial threats to health and safety of individual persons as well as of the community. City planners attempt to apply to the strategies for crime prevention their perception of what the sustainable urban development should be with respect to urban environment. Many planners have studied on the possibility of reduction in fear of crime and actual crimes through environmental improvement. The results of their preliminary studies provide specific suggestions to reduce crimes and fear of crime by application of CPTED. This study proposes alternatives in policy necessary for CPTED, which is one of the strategies for crime prevention, to take its place as a useful strategy for making the urban societies safe and sustainable.

  • PDF

A Study on Quantitative Risk Assessment Method and Risk Reduction Measures for Rail Hazardous Material Transportation (철도위험물수송에 관한 위험도 정량화방안 및 경감대책 연구)

  • Lee, Sang Gon;Cho, Woncheol;Lee, Tae Sik
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.3
    • /
    • pp.69-76
    • /
    • 2008
  • The object of this study is to develop a tool for quantifying risks related to the rail transportation of hazardous commodities and to present mitigation measures. In this study, the Quantitative Risk Assessment (QRA) is used as a risk analysis tool. Based on the previous explosion history (Iri explosion) and consideration of its high risk, Iksan-si is selected as a model city. The result, expressed as average individual risk for exposed people with various distance, indicates that the model city is considered to be safe according to the nuclear energy standard. Also, the mitigation measures are provided since Societal risk of Iksan-si is set within ALARP. Risk reduction measures include rail car design, rail transportation operation, demage spread control as well as derail prevention and alternative routes for reducing accident frequencies. Finally, it is expected to achieve high level of public safety by appling the risk reduction measures.

  • PDF

A Study on the Disaster Prevention Plan to minimize the School Damage in the Earthquake Disaster (학교 지진피해 최소화를 위한 방재대책 개선에 관한 연구)

  • Lee, Byoungho;Cho, Woncheol
    • Journal of Korean Society of societal Security
    • /
    • v.3 no.1
    • /
    • pp.67-73
    • /
    • 2010
  • School is a place to be done the education of Disaster Prevention and to be established the function of Disaster Prevention and seismic performance to secure the safety of children as well as emergency evacuation facilities for local communities in case of disaster. To improve the ability of Earthquake Disaster Prevention for students and teachers schools have to put the Earthquake Disaster Prevention on the subjects, for an example ethics, social study, science and gym and make a plan to efficiently manage school disaster prevention facilities. Seismic retrofitting on school facilities have to be established with the method of construction for steel bracings and seismic shear walls choosing old architectures first which is not the design with the seismic performance considering educational environmental aspects, and reconstruction of old architectures to get the agreement of societies. Furthermore, there is great demand for the effective, efficient and systematic improvement of school facilities for the use of shelters to be disaster prevention facilities.

  • PDF

Development of 3-D Flow Model for Porous Media with Scenario-based Ground Excavation (지반굴착 시나리오 기반의 다공성 매질에 대한 3차원 유동해석모델 구축)

  • Cha, Jang-Hwan;Lee, Jae-Young;Kim, Woo-Seok
    • Journal of Korean Society of Disaster and Security
    • /
    • v.10 no.1
    • /
    • pp.19-27
    • /
    • 2017
  • In recent years, ground subsidence has been frequently occurred by underground cavities due to the excessive groundwater inflow, caused by poor construction and management, during tunnel excavation and underground structure construction. In this study, a numerical model (SEEFLOW3D) was developed to estimate groundwater fluctuations for saturated-unsaturated poros media, evaluates the impact on ground excavation with open cut and non-open cut scenarios. In addition, the visual MODFLOW was applied to demonstrate the verification of the model compared with both results. Our results indicated that the RMSE and NRMSE was obtained to range over -3.95~5.7% and 0.56~4.62%, respectively. The developed model was expected to estimate groundwater discharges and apply analysis tool for optimum design of waterproof wall in future.

Authentication and Session Management based on Ajax (Ajax를 기반으로 한 인증 및 세션 관리)

  • Nam Sang-On;Daguil Rolyn C;Kim Gi-Weon;Song Jung-Gil
    • Journal of Internet Computing and Services
    • /
    • v.7 no.6
    • /
    • pp.157-174
    • /
    • 2006
  • Ajax interaction model changes the posture of web application to become a stateful over HTTP. Ajax applications are long-lived inthe browser. XMLHTTPRequest (XHR) is used to facilitate the data exchange. Using HTTPS over this interaction is not viable because of the frequency of data exchange. Moreover, switching of protocols form HTTP to HTTPS for sensitive information is prohibited because of server-of-origin policy. The longevity, constraint, and asynchronous features of Ajax application need to hove a different authentication and session fondling mechanism that invoke re-authentication. This paper presents an authentication and session management scheme using Ajax. The scheme is design lo invoke periodic and event based re-authentication in the background using digest authentication with auto-generated password similar to OTP (One Time Password). The authentication and session management are wrapped into a framework called AWASec (Ajax Web Application Security) for coupling to avoid broken authentication and session management.

  • PDF

Design and Implementation of Malicious Application Detection System Using Event Aggregation on Android based Mobile Devices (안드로이드 모바일 단말에서의 이벤트 수집을 통한 악성 앱 탐지 시스템 설계 및 구현)

  • Ham, You Joung;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.35-46
    • /
    • 2013
  • As mobile terminal environment gets matured, the use of Android platform based mobile terminals has been growing high. Recently, the number of attacks by malicious application is also increasing as Android platform is vulnerable to private information leakage in nature. Most of these malicious applications are easily distributed to general users through open market or internet and an attacker inserts malicious code into malicious app which could be harmful tool to steal private data and banking data such as SMS, contacts list, and public key certificate to a remote server. To cope with these security threats more actively, it is necessary to develop countermeasure system that enables to detect security vulnerability existing in mobile device and take an appropriate action to protect the system against malicious attacks. In this sense, this paper aggregates diverse system events from multiple mobile devices and also implements a system to detect attacks by malicious application.

A Study on the Performance of VPN based on MPLS Networks (MPLS 망을 기반으로 하는 VPN의 성능에 관한 연구)

  • Shin, Tae-Sam;Kim, Young-Beom
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.8 no.1
    • /
    • pp.51-57
    • /
    • 2007
  • In this paper we introduce the concept of MPLS-based VPN and propose a scheme for providing VPN services in MPLS networks. Furthermore, we design the control components and the operational procedures and evaluated the performance of traditional VPN implementation methods and MPLS-based VPN. In this scheme it is possible to solve several problems that IP-based VPN pertains via the allocation of VPN ID and virtual space without tunneling, thereby providing effective VPN services. In other words, the MPLS-based VPN scheme uses MPLS networking technology together with the PSTN which can achieve a perfect segregation of user traffic on per-customer basis in a physical link and can guarantee high reliability and security levels. Specially, in the perspective of customers, it can save networking facilities installation and maintenance costs considerably. On the contrary, it possesses some shortcomings in that its deployment tends to be restricted within an ISP's network boundary and it is vulnerable to external security break-ins when going through public networks such as the Internet due to its lack of data encryption capability.

  • PDF