• Title/Summary/Keyword: Security element

Search Result 372, Processing Time 0.031 seconds

Legal System and Regulation Analysis by S/W Development Security (S/W 개발 분석 단계에서 식별 및 인증)

  • Shin, Seong-Yoon;Jin, Dong-Soo;Shin, Kwong-Seong;Lee, Hyun-Chang;Lee, Yang-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.211-212
    • /
    • 2014
  • This paper is to suggest the security requirements for identification and authentication in analysis step. Firstly, individual ID should be uniquely identified. The second element is to apply the length limitations, combination and periodic changes of passwords. The third should require the more reinforced authentication methods besides ID and passwords and satisfy the defined security elements on authentication process.

  • PDF

A Study on Improving Spam Management Index (스팸메일 관리지표 개선에 관한 연구)

  • Yoo, Jin-Ho;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.133-142
    • /
    • 2009
  • Although the average amount of spam users receive a day is statistically decreasing in Korea, they still complain of spam and insist there is a gap between the amount of spam users receive in reality and the amount of spam the users feel due to spam. This study analyzes the cause of the gap and suggests the way of complementing the traditional measure of the amount of spam receipt. In addition, we provide the conceptual framework of 'spam management index' that explains the overall spam counteract performances from the users' point of view. Especially, we develop the method of measuring 'spam stress' which can be used as an qualitative output element. Finally we apply the model in Korea to develop spam counteract policies.

Experimental research on the propagation of plastic hinge length for multi-scale reinforced concrete columns under cyclic loading

  • Tang, Zhenyun;Ma, Hua;Guo, Jun;Xie, Yongping;Li, Zhenbao
    • Earthquakes and Structures
    • /
    • v.11 no.5
    • /
    • pp.823-840
    • /
    • 2016
  • The plastic hinge lengths of beams and columns are a critical demand parameter in the nonlinear analysis of structures using the finite element method. The numerical model of a plastic hinge plays an important role in evaluating the response and damage of a structure to earthquakes or other loads causing the formation of plastic hinges. Previous research demonstrates that the plastic hinge length of reinforced concrete (RC) columns is closely related to section size, reinforcement ratio, reinforcement strength, concrete strength, axial compression ratio, and so on. However, because of the limitations of testing facilities, there is a lack of experimental data on columns with large section sizes and high axial compression ratios. In this work, we conducted a series of quasi-static tests for columns with large section sizes (up to 700 mm) and high axial compression ratios (up to 0.6) to explore the propagation of plastic hinge length during the whole loading process. The experimental results show that besides these parameters mentioned in previous work, the plastic hinge of RC columns is also affected by loading amplitude and size effect. Therefore, an approach toward considering the effect of these two parameters is discussed in this work.

The development of industrial secure L2 switch and introduction example for management and security improvement of supervisory control network in purification plant (정수장 감시제어망의 관리와 보안개선을 위한 산업용 보안 L2스위치 개발 및 적용사례)

  • Kim, Yunha;Yu, Chool;Oh, Eun;Kim, Chanmoon;Park, Ikdong;Kim, Yongseong;Choi, Hyunju
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.33 no.5
    • /
    • pp.329-339
    • /
    • 2019
  • Recently, the advancement of information and communication technology(ICT) is expanding the connectivity through Internet of Things(IoT), and the media of connection is also expanding from wire/cable transmission to broadband wireless communication, which has significantly improved mobility. This hyperconnectivity has become a key element of the fourth industrial revolution, whereas the supervisory control network of purification plants in korea is operated as a communication network separated from the outside, thereby lagging in terms of connectivity. This is considered the best way to ensure security, and thus there is hardly any consideration of establishing alternatives to operate an efficient and stable communication network. Moreover, security for management of a commercialized communication network and network management solution may be accompanied by immense costs, making it more difficult to make new attempts. Therefore, to improve the conditions for the current supervisory control network of purification plants, this study developed a industrial security L2 switch that supports modbus TCP(Transmission Control Protocol) communication and encryption function of the transmission section. As a result, the communication security performance improved significantly, and the cost for implementing the network management system using Historical Trend and information of HMI(Human Machine Interface) could be reduced by approximately KRW 200 million. The results of this study may be applied to systems for gas, electricity and social safety nets that are infrastructure communication networks that are similar to purification plants.

A Study on primitive polynomial in stream cipher (스트림암호에서 원시다항식에 대한 고찰)

  • Yang, Jeong-mo
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.27-33
    • /
    • 2018
  • Stream cipher is an one-time-pad type encryption algorithm that encrypt plaintext using simple operation such as XOR with random stream of bits (or characters) as symmetric key and its security depends on the randomness of used stream. Therefore we can design more secure stream cipher algorithm by using mathematical analysis of the stream such as period, linear complexity, non-linearity, correlation-immunity, etc. The key stream in stream cipher is generated in linear feedback shift register(LFSR) having characteristic polynomial. The primitive polynomial is the characteristic polynomial which has the best security property. It is used widely not only in stream cipher but also in SEED, a block cipher using 8-degree primitive polynomial, and in Chor-Rivest(CR) cipher, a public-key cryptosystem using 24-degree primitive polynomial. In this paper we present the concept and various properties of primitive polynomials in Galois field and prove the theorem finding the number of irreducible polynomials and primitive polynomials over $F_p$ when p is larger than 2. This kind of research can be the foundation of finding primitive polynomials of higher security and developing new cipher algorithms using them.

  • PDF

Secure Scheme Between Nodes in Cloud Robotics Platform (Cloud Robotics Platform 환경에서 Node간 안전한 통신 기법)

  • Kim, Hyungjoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.12
    • /
    • pp.595-602
    • /
    • 2021
  • The robot is developing into a software-oriented shape that recognizes the surrounding situation and is given a task. Cloud Robotics Platform is a method to support Service Oriented Architecture shape for robots, and it is a cloud-based method to provide necessary tasks and motion controllers depending on the situation. As it evolves into a humanoid robot, the robot will be used to help humans in generalized daily life according to the three robot principles. Therefore, in addition to robots for specific individuals, robots as public goods that can help all humans depending on the situation will be universal. Therefore, the importance of information security in the Cloud Robotics Computing environment is analyzed to be composed of people, robots, service applications on the cloud that give intelligence to robots, and a cloud bridge that connects robots and clouds. It will become an indispensable element for In this paper, we propose a Security Scheme that can provide security for communication between people, robots, cloud bridges, and cloud systems in the Cloud Robotics Computing environment for intelligent robots, enabling robot services that are safe from hacking and protect personal information.

Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling (STRIDE 위협 모델링 기반 가상 사설망 취약점 분석 및 보안 요구사항 도출)

  • Kim, Da-hyeon;Min, Ji-young;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.27-37
    • /
    • 2022
  • Virtual private network (VPN) services are used in various environments related to national security, such as defense companies and defense-related institutions where digital communication environment technologies are diversified and access to network use is increasing. However, the number of cyber attacks that target vulnerable points of the VPN has annually increased through technological advancement. Thus, this study identified security requirements by performing STRIDE threat modeling to prevent potential and new vulnerable points that can occur in the VPN. STRIDE threat modeling classifies threats into six categories to systematically identify threats. To apply the proposed security requirements, this study analyzed functions of the VPN and formed a data flow diagram in the VPN service process. Then, it collected threats that can take place in the VPN and analyzed the STRIDE threat model based on data of the collected threats. The data flow diagram in the VPN service process, which was established by this study, included 96 STRIDE threats. This study formed a threat scenario to analyze attack routes of the classified threats and derived 30 security requirements for each element of the VPN based on the formed scenario. This study has significance in that it presented a security guideline for enhancing security stability of the VPN used in facilities that require high-level security, such as the Ministry of National Defense (MND).

Application of C-11 Gas Target Using Finite Element Method (FEM을 이용한 C-11 기체표적의 성능평가)

  • Hur M.G.;Oh H.S.;Jung H.Y.;Park S.P.;Yang S.D.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.06a
    • /
    • pp.1699-1704
    • /
    • 2005
  • In this research the energy degrader, which is the most fragile part of the security of a target, has been newly designed to improve the performance of the gas target. Also, the numerical analysis of the heat movement and mechanical movement during the operation of the target has been accomplished. The heat analysis and structure analysis which are using the cooling water flow and pressure in the energy degrader and the Nastran mediocrity finite element analysis program, has been considered with the heat movement and mechanical movement according to the current capacity of proton beam which determines the production yield of the radioactive isotope. Also the possible use range has been determined, and at the same time the most suitable running condition according to the current capacity of proton beam has been suggested.

  • PDF

A Deterministic Method of Large Prime Number Generation (결정론적인 소수 생성에 관한 연구)

  • Park, Jung-Gil;Park, Bong-Joo;Baek, Ki-Young;Chun, Wang-Sung;Ryou, Jae-Cheol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.9
    • /
    • pp.2913-2919
    • /
    • 2000
  • It is essential to get large prime numbers in the design of asymmetric encryption algorithm. However, the pseudoprime numbers with high possibility to be primes have been generally used in the asymmetric encryption algorithms, because it is very difficult to find large deterministic prime numbers. In this paper, we propose a new method of deterministic prime number generation. The prime numbers generated by the proposed method have a 100% precise prime characteristic. They are also guaranteed reliability, security strength, and an ability of primitive element generation.

  • PDF

Structural Characteristics Evaluation Considering Construction Circumstances of Cheomseongdae (첨성대의 축조현황을 고려한 구조적 특성평가)

  • Kim, Ho-Soo;Kim, Jung-Hwan
    • Journal of Korean Association for Spatial Structures
    • /
    • v.15 no.3
    • /
    • pp.69-76
    • /
    • 2015
  • Cheomseongdae is the masonry stone structure with the cultural and historical values. But, this structure has the various damages such as cracks, gaps, slope variations and ground subsidence. So, the interests for the safety security in the structural parts have been increased. Therefore, this study performs the structural modelling which considers the several damage cases, and then evaluates the structural behavior characteristics through the discrete element analysis. Especially, this study checks the swelling and displacement gap of the whole structure and the separation between the neighboring members.