• Title/Summary/Keyword: Space Security

Search Result 971, Processing Time 0.037 seconds

Prospection of Power IT networks (전력 IT 네트워크 보안 전망)

  • Kim, Hak-Man;Kang, Dong-Joo
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.294-295
    • /
    • 2007
  • The importance of security is increased in power industry. Recently Power IT networks are attacked in cyber space and demage of attack become increased. For solving the problems, many research studies for network security enhancement are globally carried out in the world. In this paper, we introduce recent cyber attack cases, efforts for enhancing cyber safeness and put into perspective of potential security areas for power IT areas.

  • PDF

Architectural Design Elements for Hazard-Resistant and Reduction House (방재 및 감재주택을 위한 건축 계획 요소의 설정)

  • Kim, Hyeong-Eon
    • KIEAE Journal
    • /
    • v.16 no.6
    • /
    • pp.77-82
    • /
    • 2016
  • Purpose: Almost every research carried out in our country against the natural disaster is focused on the temporary facilities such as temporary housing, emergency shelter and as a result, it is very hard to find out researches on the ordinary houses which installed integrated systems of hazard-resistant against the natural disaster. Method: To conduct this research, categorizing process for design, structural, environmental and installation elements found in the Hazard-Resistant and Reduction House built for sale in Japan was performed. Result: In this study, several design concepts and subordinate items are recommended for hazard-resistant housing. First, design concept of 'Preparedness' which means security and access to the storage storing goods especially food & beverage for the emergencies is needed. The subordinate items consist of security of stocking space, diversified and circular storage system, and safety storage system. Second, design concept of 'Security' which means security of physical safety space and rapid recovery to returning to daily life against natural disaster is needed. The subordinate items consist of many items including not only structure and facilities but also architectural design method. And finally, design concept of 'Maintenance, Support and Return' which means minimizing the physical and psychological damages and support safety and physical conditions of the victims from the impact of the disaster to returning to daily life is needed. The subordinate items consist of high efficiency insulation/airtightness design, microclimate design, combination of photovoltaic system and storage battery, non-power appliance system against the power failure, storing system for drinking water, rainwater storing and utilization system.

An Implementation of 128bit Block Cipher Algorithm for Electronic Commerce (전자상거래를 위한 128비트 블록 암호 알고리즘의 구현)

  • 서장원;전문석
    • The Journal of Society for e-Business Studies
    • /
    • v.5 no.1
    • /
    • pp.55-73
    • /
    • 2000
  • Recently; EC(Electronic Commerce) is increasing with high speed based on the expansion of Internet. EC which is done on the cyber space through Internet has strong point like independence from time and space. On the contrary, it also has weak point like security problem because anybody can access easily to the system due to open network attribute of Internet. Therefore, we need the solutions that protect the security problem for safe and useful EC activity. One of these solutions is the implementation of strong cipher algorithm. NC(Nonpolynomial Complete) cipher algorithm proposed in this paper is good for the security and it overcome the limit of current 64bits cipher algorithm using 128bits key length for input, output and encryption key, Moreover, it is designed for the increase of calculation complexity and probability calculation by adapting more complex design for subkey generation regarded as one of important element effected to encryption. The result of simulation by the comparison with other cipher algorithm for capacity evaluation of proposed NC cipher algorithm is that the speed of encryption and decryption is 7.63 Mbps per block and the speed of subkey generation is 2,42 μ sec per block. So, prosed NC cipher algorithm is regarded as proper level for encryption. Furthermore, speed of subkey generation shows that NC cipher algorithm has the probability used to MAC(Message Authentication Code) and block implementation of Hash function.

  • PDF

Quantum Secret Sharing Scheme with Credible Authentication based on Quantum Walk

  • Li, Xue-Yang;Chang, Yan;Zhang, Shi-Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.3116-3133
    • /
    • 2020
  • Based on the teleportation by quantum walk, a quantum secret sharing scheme with credible authentication is proposed. Using the Hash function and quantum local operation, combined with the two-step quantum walks circuit on the line, the identity authentication and the teleportation of the secret information in distribution phase are realized. Participants collaborate honestly to recover secret information based on particle measurement results, preventing untrusted agents and external attacks from obtaining useful information. Due to the application of quantum walk, the sender does not need to prepare the necessary entangled state in advance, simply encodes the information to be sent in the coin state, and applies the conditional shift operator between the coin space and the position space to produce the entangled state necessary for quantum teleportation. Security analysis shows that the protocol can effectively resist intercept/resend attacks, entanglement attacks, participant attacks, and impersonation attacks. In addition, the quantum walk circuit used has been implemented in many different physical systems and experiments, so this quantum secret sharing scheme may be achievable in the future.

SVM-Based Speaker Verification System for Match-on-Card and Its Hardware Implementation

  • Choi, Woo-Yong;Ahn, Do-Sung;Pan, Sung-Bum;Chung, Kyo-Il;Chung, Yong-Wha;Chung, Sang-Hwa
    • ETRI Journal
    • /
    • v.28 no.3
    • /
    • pp.320-328
    • /
    • 2006
  • Using biometrics to verify a person's identity has several advantages over the present practice of personal identification numbers (PINs) and passwords. To gain maximum security in a verification system using biometrics, the computation of the verification as well as the storing of the biometric pattern has to take place in a smart card. However, there is an open issue of integrating biometrics into a smart card because of its limited resources (processing power and memory space). In this paper, we propose a speaker verification algorithm using a support vector machine (SVM) with a very few features, and implemented it on a 32-bit smart card. The proposed algorithm can reduce the required memory space by a factor of more than 100 and can be executed in real-time. Also, we propose a hardware design for the algorithm on a field-programmable gate array (FPGA)-based platform. Based on the experimental results, our SVM solution can provide superior performance over typical speaker verification solutions. Furthermore, our FPGA-based solution can achieve a speed-up of 50 times over a software-based solution.

  • PDF

New Revocable E-cash System Based on the Limited Power of TTP

  • Yan Xie;Fangguo Zhang;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.266-269
    • /
    • 2002
  • As a simulation or replacement of analog money in cyber space, the e-cash was introduced by using cryptographic primitives. Since a perfect anonymity system causes some illegal activities, such as money laundering, blackmailing, and illegal purchase, a revocable electronic system was paid a great attention to control the anonymity. In general, Trust Third Party(TTP) is introduced to detect any dubious user and coin, namely user tracing and coin tracing. In this paper we propose a new revocable anonymity e-cash system, and verify the security requirement as well. In our scheme a user first withdraws the e-coin from bank by using blind signature, and then TTP verifies the bank's signature and records the tracing information.

  • PDF

Modeling of Indoor Geometry and Environment Sensor for Responsive Virtual URS Service (반응형 가상 URS 서비스를 위한 실내 기하구조 및 환경 센서 모델링)

  • Jeon, Kyeong-Won;Ki, Jeong-Seok;Kwon, Yong-Moo
    • The Journal of Korea Robotics Society
    • /
    • v.3 no.2
    • /
    • pp.112-116
    • /
    • 2008
  • This paper presents URS (Ubiquitous Robotic Space) Modeling and service technique for the robotic security service while bridging between virtual space and physical space. First, this paper introduces a concept of virtual URS and responsive virtual URS. Second, this paper addresses modeling of URS which covers modeling of indoor geometry and environment sensor. Third, this paper describes virtual URS services including interactive virual-physical bridging service.

  • PDF

The threats and responses of cyber-terrorism in a new security environment: Issues and propositions on strategic frameworks (새로운 안보환경을 둘러싼 사이버 테러의 위협과 대응방안: 쟁점들과 전략적 접근 틀에 대한 논의)

  • Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.109-145
    • /
    • 2014
  • Despite much discussions on cyber-terrorism in South Korea, several missing issues could be addressed. This paper attempts to deal with such missing but important issues. In South Korea, there has been little attentions on cyber-terrorism with the respects of national security strategy development under macro framework responding to future security environment. This article focuses on such issues. In other words, the purpose of this paper evaluates the meaning of national security threats raised from cyber-terrorism as a mode of security threats and proposes the matter of cyber-terrorism within the development of national security strategy in the future security environment. several issues in this discussion pass some important messages for the construction of national security strategic approach framework within the future security environment adding cyber-space. in the future environment, a new space called cyber is added as an important external condition which might determine the security of individuals, societies, and nations. Therefore, the fundamental strategic framework should be prepared. After that, the trend and direction of future technological advancement should be understood and the identity, nature, and types of threat should be analyzed. Also, after that, various responses and countermeasures are together constituted in the aspect of function and system regarding various anticipated threats of the future human society including cyber-terrorism.

  • PDF

Comparative Study of DC Breakdown and Space Charge Characteristics of Insulation Paper Impregnated with Natural Ester and Mineral Oil

  • Hao, Jian;Zou, Run-Hao;Liao, Rui-Jin;Yang, Li-Jun;Liao, Qiang;Zhu, Meng-Zhao
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.4
    • /
    • pp.1682-1691
    • /
    • 2018
  • Natural ester is a suitable substitute for mineral oil and has been widely used in AC transformer in many countries. In order to further application of natural ester in direct current (DC) equipment, it is needed to investigate its long term insulation property under DC condition. In this paper, a thermal ageing experiment was conducted for both mineral oil-paper and natural ester-paper insulation. The DC breakdown and space charge characteristics of insulation paper impregnated with natural ester and mineral oil was compared. Results show that the resistivity of the paper immersed in natural ester and mineral oil both increase as the ageing goes on. While insulation paper impregnated with natural ester has higher resistivity and DC breakdown voltage than the paper impregnated with mineral oil. The DC breakdown voltage for the oil impregnated insulation paper being DC pre-stressing is higher than that without pre-stressing. The average DC breakdown field strength difference between the test with pre-stressing and without pre-stressing clearly shows that there is an apparent enhancement effect for the homo-charge injection on the DC breakdown.

The North Korean Nuclear problem and disarmament of Outer Space (북한 핵문제와 우주군축)

  • Noh, Dong-Young
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.2
    • /
    • pp.219-246
    • /
    • 2017
  • Nuclear issue is a good example showing globalization of the international regime. The history showed nuclear weapons may cause the extinction of human races when the first nuclear bombs fell down to Japan in August, 1945 and people became increasingly eager to achieve peace. Military buildup for national security is a matter of existence in the international society. However, disarmament or arms control to secure international peace and safety which is also the purpose of the Charter of the United Nations may be the most important task for us to realize peace of the mankind. Today, disarmament, together with amicable settlement of international conflicts and collective security system, is an important means to maintain and promote international peace and safety. It might be our permanent task to realize complete disarmament but, as the Preamble of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) expressed general and complete disarmament, the international society has clarified its effort for complete disarmament. Thus, taking a look into the international regime on the nuclear issue and progress related to the nuclear issue in North Korea, the study was intended to introduce the globalization of the nuclear issue, review the international effort for nuclear disarmament based on the concept of the 'common heritage of the mankind' and with respect to the United Nations Committee on the Peaceful Uses of Outer Space (COPUOS) and controls over nuclear weapons, and then evaluate the North Korean nuclear issue, which is in direct relation with South Korea and international laws, in terms of the space law and disarmament acts. The collective security system along with policies to prevent dissemination of nuclear weapons should also be emphasized and implemented to cope with the North Korean nuclear issue.

  • PDF