• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.042 seconds

A Study on the Design of Secure Messenger Using ECC of ElGamal Method in PKI Environment (PKI환경에서 ElGamal 방식의 ECC를 이용한 안전한 메신저 설계에 관한 연구)

  • Park Su-Young;Choi Kwang-Mi;Jung Choi-Yeoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1443-1448
    • /
    • 2006
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. In the past, e-mail has been the primary choice of exchanging information but messengers are gaining popularity abroad and domestically because of their nature of getting immediate responses. Information leakage by invasion that is enemy of evil in communication of communications division Server and Agent between each agents that become burden of communication for effective administration of data for most of existing messenger is becoming an issue. In this paper, we design a secure messenger system that could be obtained maximum security. It use ECC based on ElGamal methodology using PKI for secure communication. For the message encryption and decryption between the same group non, each group is kept distinct by drawing an elliptic curve and an arbitrary point is chosen on the curve.

A Case Study on Active Usage of the Storage Space Outside Housing Unit of Residential Complex (공동주택 세대외부창고의 활성화 방안을 위한 사례 연구)

  • Song, Jihyun;Lee, Hyunsoo
    • Korean Institute of Interior Design Journal
    • /
    • v.27 no.1
    • /
    • pp.58-67
    • /
    • 2018
  • This study aims to analyze the cases of storage space outside housing unit and propose the activation plan. The issue of storage in residential complex has continued to be reported. This is more salient due to the recent preference trend for small houses, the constant increase of living goods and the limitation of the available space inside housing unit. Although more apartment houses are trying to have individual storage in the exterior space to address these issues, there is still a paucity of the related studies and more studies are required. In this study, we conducted on-site investigation and user interview of each case to propose active usage of the storage space outside housing unit. Result of this study shows that the most crucial factor to improve is 'accessibility' in order to activate the storage space. Storage room should be located close to each household or the individual parking space. The second factor is the size and the structure of the storage room. The sufficient space for keeping and taking large objects out are required. The front of the storage room should have a clogged structure to insure privacy. The third is the provision of suitable support programs such as the system that occupants can check remotely what items are in their storage rooms, garage sale, laundry service, auto cleaning system and rental program. Those programs are required for efficient management and activation of space. Another requirement is to improve environmental factors which include maintenance of optimal temperature and humidity, automatic ventilation system, control of individual lights, and security enhancement. Based on the results of the survey, we provide basic data which can be used for practical space planning to activate exterior storage space of the housing unit. Further surveys are required to develop this study by obtaining more data for generalization.

Plan of Information System for Combined Treatment of the Oriental and the Western Medicine (한.양방 협진 정보시스템 구축방안 연구)

  • Yea, Sang-Jun;Jang, Hyun-Chul;Kim, Chul;Kim, Jin-Hyun;Kim, Sang-Kyun;Song, Mi-Young
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.13 no.3
    • /
    • pp.19-28
    • /
    • 2009
  • Background : Recently, Medical Act was amended to encourage the induction of combined treatment between Oriental Medicine doctors and Western doctors. As yet, the information infra for combined treatment has not been studied. Objectives : This study aimed to design the architecture of information system for combined treatment of the Oriental and the Western Medicine. Methods : First, we defined the information of combined treatment through the analysis of research trends from the inside and outside of the country. Because the data compatibility is very important, the definition of information must be ahead of anything else. Second, we designed the architecture of information system based on the prior definition. Results : We classified the information for combined treatment by subject such as law, clinic, research, manpower, facilities, and education. In this paper information system examined in three aspects. First the infra layer is organized as hardware, netware, and security. Second is data warehouse layer for the storing, filtering, and extraction of data. Third is service layer which is related to data transmission. And Finally all information for combined treatment is provided through the portal system for medical consumer, political planner, and R&D researcher. Conclusion : In this paper, we studied the essential factors of combined treatment information in the view point of information system. But the detailed design and implementation of information system must be followed to effect this results.

  • PDF

A Design of Group Authentication by using ECDH based Group Key on VANET (VANET에서 ECDH 기반 그룹키를 이용한 그룹간 인증 설계)

  • Lee, Byung Kwan;Jung, Yong Sik;Jeong, Eun Hee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.7
    • /
    • pp.51-57
    • /
    • 2012
  • This paper proposes a group key design based on ECDH(Elliptic Curve Diffie Hellman) which guarantees secure V2V and V2I communication. The group key based on ECDH generates the VGK(Vehicular Group key) which is a group key between vehicles, the GGK(Global Group Key) which is a group key between vehicle groups, and the VRGK(Vehicular and RSU Group key) which is a group key between vehicle and RSUs with ECDH algorithm without an AAA server being used. As the VRGK encrypted with RGK(RSU Group Key) is transferred from the current RSU to the next RSU through a secure channel, a perfect forward secret security is provided. In addition, a Sybil attack is detected by checking whether the vehicular that transferred a message is a member of the group with a group key. And the transmission time of messages and the overhead of a server can be reduced because an unnecessary network traffic doesn't happen by means of the secure communication between groups.

System Design of IDS for DDoS Detect and Defense (DDoS공격감지 및 방어를 위한 침입방지 시스템의 설계)

  • Hong, Seong-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6845-6848
    • /
    • 2014
  • This paper proposes a system design of IDS for detecting and defending against DDoS attacks on a network. The proposed system has three parts; the Alert, Attack Analyzer and Defense agent. When the server resource was reduced too much by incoming traffic, the Alert Agent sends message and traffic information to the Attack Analyzer. The message and traffic to the Attack analyzer include only the sender & receiver address and packet numbers for minimizing the overload of Attack Analyzer. Message Received Attack Analyzer investigates the Message. If the pattern of traffic is the same as the DDoS Style, the Analyzer sends a message to the Defense Agent to block that traffic. In this system, at the serious state of the server-down, the Attack analyzer uncovers the DDoS Attacker and send a message to the Defense Agent to block that traffic. This works for server reactivation as soon as possible.

Design of Learning Model using Triz for PBL(Project-based Learning) in IoT Environment (사물인터넷환경에서 프로젝트중심학습에 Triz를 이용한 학습 모델 설계)

  • Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.2
    • /
    • pp.81-87
    • /
    • 2019
  • It is changing to the 4th Industrial Revolution rapidly as the information age through the Internet is changing, and it is rapidly changing to the era of the IoT using all things. In education, with the change to the Internet of Things, interest in education for the 4th Industrial Revolution is increasing. It is necessary to change from NetPBL method using Internet to T-PBL using Triz. In this paper, we focus on the task-based learning (T-PBL) method using Triz and examine the necessity and importance of its use. We propose a teaching model using Triz as a tool for T-PBL. Triz is being used as a tool to solve problems in creative ways. We will design a model applying Triz to the blockchain system security class related to the IoT.

A Study of Web Forensics Algorithm that used Log History Analysis (로그 히스토리 분석을 사용한 웹 포렌식 알고리즘 연구)

  • Jeung, Jeung-Ki;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.245-254
    • /
    • 2006
  • Web Forensics algorithm used to an extraction of technical Web Forensics data to be adopted to proof data regarding a crime cyber a computer at data of a great number of log History is an essential element. Propose Web Forensics algorithm, and design at these papers, and try to implement in a Web server system of an actual company. And make the Web dispatch Loging system configuration experiment that applied integrity regarding Web log History information or authentication regarding an information source. Design Web Forensics algorithm and the Flow which used for Web log History analyses at server of e-mail, webmail, HTTP (Web BBS, Blog etc.), FTP, Telnet and messengers (MSN, NateOn, Yahoo, DaumTouch. BuddyBuddy, MsLee, AOL, SoftMe) of a company, and implement through coding. Therefore have a purpose of these paper to will contribute in scientific technical development regarding a crime cyber a computer through Web Forensics.

  • PDF

Design Technique of Rainwater Utilizing System (우수이용 시스템의 설계기법)

  • Jeon, In-Bae;Song, Si-Hun;Ji, Hong-Gi;Lee, Sun-Tak
    • Journal of Korea Water Resources Association
    • /
    • v.34 no.6
    • /
    • pp.587-596
    • /
    • 2001
  • The purpose of this study is to improve inefficient use of rainwater in island area where it uses rainwater to supply the domestic water and to propose rainwater utilizing system that is most appropriate to the characteristics of precipitation in Korea. To accomplish these purposes, Cheju island was chosen as a study area and the design for the roof area and tank size of rainwater utilizing system was based on the result of the relationship between the actual precipitation and domestic water data which was used in the analysis by run theory to use run theory. Since the result of the analysis indicated that the designed rainwater catchment system was operated stably in Cheju island, the same result is expected in other island too. Therefore, if this system is executed together with the roof rehabilitation work of island area, it will bring positive effects on broth the improvement of residental environment and the security of domestic water.

  • PDF

A design of compact and high-performance AES processor using composite field based S-Box and hardware sharing (합성체 기반의 S-Box와 하드웨어 공유를 이용한 저면적/고성능 AES 프로세서 설계)

  • Yang, Hyun-Chang;Shin, Kyung-Wook
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.8
    • /
    • pp.67-74
    • /
    • 2008
  • A compact and high-performance AES(Advanced Encryption Standard) encryption/decryption processor is designed by applying various hardware sharing and optimization techniques. In order to achieve minimized hardware complexity, sharing the S-Boxes for round transformation with the key scheduler, as well as merging and reusing datapaths for encryption and decryption are utilized, thus the area of S-Boxes is reduced by 25%. Also, the S-Boxes which require the largest hardware in AES processor is designed by applying composite field arithmetic on $GF(((2^2)^2)^2)$, thus it further reduces the area of S-Boxes when compared to the design based on $GF(2^8)$ or $GF((2^4)^2)$. By optimizing the operation of the 64-bit round transformation and round key scheduling, the round transformation is processed in 3 clock cycles and an encryption of 128-bit data block is performed in 31 clock cycles. The designed AES processor has about 15,870 gates, and the estimated throughput is 412.9 Mbps at 100 MHz clock frequency.

A Study of Supply Patterns and Residential Characteristics of Urban-type Housing in Seoul (도시형생활주택의 공급현황 및 거주특성 연구 - 서울시 공급사례를 중심으로 -)

  • Lee, Jae-Su;Seong, Su-Youn;Lee, Dong-Hoon
    • Journal of the Korean housing association
    • /
    • v.25 no.2
    • /
    • pp.1-9
    • /
    • 2014
  • This study investigates supply patterns and residential characteristics of the Urban-type Housing in Seoul. There have been 3,336 buildings and 71,790 housing units approved until the end of 2012. One-room apartments and small units less than 30 $m^2$ of residential area amount to 81% and 82% of total units, respectively. Major findings are as follows. First, single- and two-person households less than 30 years of age are mostly lived in the housing. Respondents are mainly professional and white-collar (43%) and service and sales workers (27%). Most of them are mid-income classes (67%), which is twice more than that of single- and two-person households in Seoul. They pay 672 thousand won in rent more than average rent of mid-income class. The rent to income ratios are 29.9% for single households and 24.5% for two-person households, which are higher than that of mid-income bracket. Third, their satisfaction level is relatively high in internal environment and access to public service facilities, but not in external environment and community service facilities. They are satisfied with security and daylight, walking and safety, access to public transport and parking space, but not with noise and vibration, natural environment, access to park and cultural and sports facilities, and most community service facilities. It is necessary to reexamine the articles of deregulation and prepare design standards while considering different housing and locational types.