• Title/Summary/Keyword: Security element

Search Result 372, Processing Time 0.034 seconds

Secure OTP Smart Card Authentication Protocol for Denial of Service (서비스거부공격에 안전한 OTP 스마트카드 인증 프로토콜)

  • Shin, Kwang-Cheul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.201-206
    • /
    • 2007
  • Development of Information and Communication technology coming to activity of internet banking and electronic business, and smart card of medium is generalized prevailing for user authentication of electronic signature certificate management center with cyber cash, traffic card, exit and entrance card. In field that using public network, security of smart cart and privacy of card possessor's is very important. Point of smart card security is use safety for smart card by user authentication. Anonymous establishment for privacy protection and denial of service attack for availability is need to provision. In this paper, after analyze for Hwang-Li, Sun's, L-H-Y scheme, password identify element is a change of safety using one time password hash function. We proposed an efficient new smart card authentication protocol against anonymity and denial of service.

  • PDF

A Study for Ammunition Integrated Logistics Support System Development (탄약종합군수지원 업무체계 발전에 관한 연구)

  • Han, Ho Seok;Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.23-30
    • /
    • 2015
  • Integrated Logistics Support can effectively respond to future wars and through the smooth logistics support activities bring a win in wars. Future warfare is very complex compare to Modern Warfare and required high level of strategies and tactics. Also, it is expected that the future war will be high-intensity war using high-tech weapon systems. Therefore, in this study, I look forward to the effective logistic support through the development of ammunition integrated logistics support which is a part of integrated logistics support(ILS). In addition, by studying a step-by-step system and supporting element of ammunition integrated logistics support, we can find the errors related to ammunition integrated logistics support system and suggest the direction to improve the system.

Rights to Control Information and Related Security Technologies on the CyberSpace (사이버공간에서 자기 결정권과 보안 기술)

  • Min, Kyung-Bae;Kang, Jang-Mook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.135-141
    • /
    • 2010
  • This research examines technologies and systems regarding right to control information in the network era. For this purpose, It attempts an integrated analysis of technologies and systems on the basis of the tree components of cyberspace. And it examines the prior researches and cases on privacy, personal information, and right to control information with emphasis on technologies and systems of the cyberspace. To protect privacy information, it analyses vulnerability of element technology, platform service technology, and individual technology. In particular, it describes, from the perspective of right to control information, the risk and security measures for personal information to be used as relation-context in the Web 2.0 environment. The research result will assist the methodology of future researches for grand theory on privacy information and help understanding the interaction between technology and society.

The Study for ENHPP Software Reliability Growth Model based on Superposition Coverage Function (중첩커버리지 함수를 고려한 ENHPP 소프트웨어 신뢰성장 모형에 관한 연구)

  • Kim, Hee-Cheul;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.7-13
    • /
    • 2007
  • Finite failure NHPP models presented in the literature exhibit either constant, monotonic increasing or monotonic decreasing failure occurrence rates per fault. Accurate predictions of software release times, and estimation of the reliability and availability of a software product require quantification of a critical element of the software testing process : test coverage. This model called Enhanced non-homogeneous poission process (ENHPP). In this paper, exponential coverage and S-shaped model was reviewed, proposes the superposition model, which maked out efficiency application for software reliability. Algorithm to estimate the parameters used to maximum likelihood estimator and bisection method, model selection based on SSE statistics for the sake of efficient model, was employed.

  • PDF

A Study on Relationships Between Information Systems Risk and Password Characteristics (정보 시스템 위험과 패스워드 특성간의 관계에 대한 연구)

  • 오창규;김종기;심윤주
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.1
    • /
    • pp.62-74
    • /
    • 2003
  • Information security becomes a critical attribute to corporate information systems as increased strategic an operational reliance on information systems. Current proliferation of password requires more attention on information security because its nature of external connection with password user makes information systems more vulnerable from various threats are an important element of information systems management. This study focused on two issues : (1) the relationships between risk management factors(asset, threat, vulnerability) and risk level affected by threat, (2) the relationships between risk level and key password characteristics(length, composition, lifetime, selection method).

  • PDF

Countermeasure of Mobile App tamper attack (모바일 앱 위·변조 공격 및 대응방안)

  • Jung, Hyun Soo
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.37-40
    • /
    • 2015
  • Recently range of use also being increase along with smart phone users growing. And keep pace with hacking technician is increasing inter alia tamper technician has issued. This technician infringe integrity on three element of security of data. In this case reliability has deteriorated, the app itself has increased danger, and it's value has reduced. This can affect like take information even though don't have any authority to information or hemorrhage at large in this country. In other words, I has been arranged tamper's definition to.

  • PDF

Side Channel Attack on Block Cipher SM4 and Analysis of Masking-Based Countermeasure (블록 암호 SM4에 대한 부채널 공격 및 마스킹 기반 대응기법 분석)

  • Bae, Daehyeon;Nam, Seunghyun;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.39-49
    • /
    • 2020
  • In this paper, we show that the Chinese standard block cipher SM4 is vulnerable to the side channel attacks and present a countermeasure to resist them. We firstly validate that the secret key of SM4 can be recovered by differential power analysis(DPA) and correlation power analysis(CPA) attacks. Therefore we analyze the vulnerable element caused by power attack and propose a first order masking-based countermeasure to defeat DPA and CPA attacks. Although the proposed countermeasure unfortunately is still vulnerable to the profiling power attacks such as deep learning-based multi layer perceptron(MLP), it can sufficiently overcome the non-profiling attacks such as DPA and CPA.

The Study for NHPP Software Reliability Growth Model of Percentile Change-point (백분위수 변화점을 고려한 NHPP 소프트웨어 신뢰성장모형에 관한 연구)

  • Kim, Hee-Cheul;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.115-120
    • /
    • 2008
  • Accurate predictions of software release times, and estimation of the reliability and availability of a software product require quantification of a critical element of the software testing process: Change-point problem. In this paper, exponential (Goel-Okumoto) model was reviewed, proposes the percentile change-point problem, which maked out efficiency application for software reliability. Algorithm to estimate the parameters used to maximum likelihood estimator and bisection method, model selection based on SSE statistics, for the sake of efficient model, was employed. Using NTDS data, The numerical example of percentilechange-point problemi s presented.

  • PDF

Novel Push-Front Fibonacci Windows Model for Finding Emerging Patterns with Better Completeness and Accuracy

  • Akhriza, Tubagus Mohammad;Ma, Yinghua;Li, Jianhua
    • ETRI Journal
    • /
    • v.40 no.1
    • /
    • pp.111-121
    • /
    • 2018
  • To find the emerging patterns (EPs) in streaming transaction data, the streaming is first divided into some time windows containing a number of transactions. Itemsets are generated from transactions in each window, and then the emergence of itemsets is evaluated between two windows. In the tilted-time windows model (TTWM), it is assumed that people need support data with finer accuracy from the most recent windows, while accepting coarser accuracy from older windows. Therefore, a limited array's elements are used to maintain all support data in a way that condenses old windows by merging them inside one element. The capacity of elements that accommodates the windows inside is modeled using a particular number sequence. However, in a stream, as new data arrives, the current array updating mechanisms lead to many null elements in the array and cause data incompleteness and inaccuracy problems. Two models derived from TTWM, logarithmic TTWM and Fibonacci windows model, also inherit the same problems. This article proposes a novel push-front Fibonacci windows model as a solution, and experiments are conducted to demonstrate its superiority in finding more EPs compared to other models.

A Study on Path Selection Scheme for Fast Restoration in Multilayer Networks (신속한 다계층 보호 복구를 위한 경로선택 방식 연구)

  • Cho, Yang-Hyun;Kim, Hyun-Cheol
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.35-43
    • /
    • 2012
  • The explosive growth of Internet traffic cause by smart equipment such as smart phone has led to a dramatic increase in demand for data transmission capacity and network control architecture, which requires high transmission rates beyond the conventional transmission capability. Next generation networks are expected to be controlled by Generalized Multi-Protocol Label Switching(GMPLS) protocol suite and operating at multiple switching layers. In order to ensure the most efficient utilization of multilayer network resources, effective global provisioning that providing the network with the possibility of reacting in advance to traffic changes should be provided. In this paper, we proposes a new path selection scheme in multilayer optical networks based on the vertical PCE architecture and a different approach to efficiently exploit multiple PCE cooperation.