• 제목/요약/키워드: cryptographic technology

검색결과 213건 처리시간 0.023초

금융부문 암호기술의 안전성 강화를 위한 보안고려사항 (The Considerable Security Issues on the Security Enforcement of Cryptographic Technology in Finance Fields)

  • 김영태;이수미;노봉남
    • 정보보호학회논문지
    • /
    • 제19권4호
    • /
    • pp.137-142
    • /
    • 2009
  • 최근까지 암호기술에 대해 알려진 공격이나 안전성 저하현상에 의해 국내외 주요기관들은 권장되는 암호기술의 종류, 사용기간, 안전성 파라미터 등을 명확하게 명시하고 있다. 이에 따라 국내 금융권에서도 일부 암호기술을 교체하기 위한 작업이 이루어져야 할 것이다. 본 논문에서는 금융권에서 시급히 이루어져야하는 금융권 암호기술 적용 현황파악 및 취약 암호기술 선별 등 선행작업과 금융권 암호기술관리 방안에 대해 살펴보고, 향후 암호기술의 안전성에 대한 급격한 변화에도 금융시스템의 신뢰도를 유지할 수 있도록 중장기적인 관점에서의 암호기술 관리방안에 대해 제시한다.

Addressing Emerging Threats: An Analysis of AI Adversarial Attacks and Security Implications

  • HoonJae Lee;ByungGook Lee
    • International journal of advanced smart convergence
    • /
    • 제13권2호
    • /
    • pp.69-79
    • /
    • 2024
  • AI technology is a central focus of the 4th Industrial Revolution. However, compared to some existing non-artificial intelligence technologies, new AI adversarial attacks have become possible in learning data management, input data management, and other areas. These attacks, which exploit weaknesses in AI encryption technology, are not only emerging as social issues but are also expected to have a significant negative impact on existing IT and convergence industries. This paper examines various cases of AI adversarial attacks developed recently, categorizes them into five groups, and provides a foundational document for developing security guidelines to verify their safety. The findings of this study confirm AI adversarial attacks that can be applied to various types of cryptographic modules (such as hardware cryptographic modules, software cryptographic modules, firmware cryptographic modules, hybrid software cryptographic modules, hybrid firmware cryptographic modules, etc.) incorporating AI technology. The aim is to offer a foundational document for the development of standardized protocols, believed to play a crucial role in rejuvenating the information security industry in the future.

Modeling cryptographic algorithms validation and developing block ciphers with electronic code book for a control system at nuclear power plants

  • JunYoung Son;Taewoo Tak;Hahm Inhye
    • Nuclear Engineering and Technology
    • /
    • 제55권1호
    • /
    • pp.25-36
    • /
    • 2023
  • Nuclear power plants have recognized the importance of nuclear cybersecurity. Based on regulatory guidelines and security-related standards issued by regulatory agencies around the world including IAEA, NRC, and KINAC, nuclear operating organizations and related systems manufacturing organizations, design companies, and regulatory agencies are considering methods to prepare for nuclear cybersecurity. Cryptographic algorithms have to be developed and applied in order to meet nuclear cybersecurity requirements. This paper presents methodologies for validating cryptographic algorithms that should be continuously applied at the critical control system of I&C in NPPs. Through the proposed schemes, validation programs are developed in the PLC, which is a critical system of a NPP's I&C, and the validation program is verified through simulation results. Since the development of a cryptographic algorithm validation program for critical digital systems of NPPs has not been carried out, the methodologies proposed in this paper could provide guidelines for Cryptographic Module Validation Modeling for Control Systems in NPPs. In particular, among several CMVP, specific testing techniques for ECB mode-based block ciphers are introduced with program codes and validation models.

암호모듈 검증 정책에 관한 연구 (A Study on the Policy of Cryptographic Module Verification Program)

  • 최명길;정재훈
    • 한국산학기술학회논문지
    • /
    • 제12권1호
    • /
    • pp.255-262
    • /
    • 2011
  • 정보통신분야의 발전은 해킹 등의 역기능을 발생에 따라 정보보호를 위한 암호모듈의 한 수요가 급증한다. 국내 암호모듈 평가 기준의 불명확성과 모듈 선정의 어려움은 모듈 및 제품 상호간의 운용 및 호환성 확보를 어렵게 한다. 본 연구는 국외 암호모듈 평가 프로그램인 CMVP(Cryptographic Module Verification Program)를 분석하여 국내 암호모듈 암호 모듈 검증 기준 및 평가 절차, 검증 정책 발전 방향을 제안한다. 본 연구는 국내 암호모듈 발전정책을 제안하여 암호모듈 국제 표준화, 국제 암호모듈 제도에 대한 공조를 기반을 제공한다.

AES(Advanced Encryption Standard) 평가에 대한 고찰 (Criteria for Evaluating Cryptographic Algorithms, based on Statistical Testing of Randomness)

  • 조용국;송정환;강성우
    • 정보보호학회논문지
    • /
    • 제11권6호
    • /
    • pp.67-76
    • /
    • 2001
  • 본 논문에서는 미국 NIST(National Institute of Standards & Technology)의 AES(Advanced Encry-ption Standard) 선정기준 중 안전성 평가인 난수검정에 대하여 고찰하고자 한다. 암호 알고리즘의 안전성 평가는 입출력문과 키의 크기, 평문과 암호문 및 키와 암호문의 상관성, 평문과 키의 변화에 따르는 암호문의 변화 그리고 구조적 특이성 등이 고려대상이 된다. 주어진 암호 알고리즘에 대한 안전성 필요충분조건 만족여부를 평가하는 것은 어려우며 객관적인 평가를 위해서는 정량적인 평가결과가 도출되어야 한다. 본 논문에서는 NIST에서 실시한 AES 안전성 평가항목들과 기준에 대하여 고찰하며, 국내 암호 알고리즘 표준인 SEED등 여러 암호 알고리즘과 난수발생기를 AES 평가기준에 맞추어 새롭게 분석해 보고자 한다.

PRaCto: Pseudo Random bit generator for Cryptographic application

  • Raza, Saiyma Fatima;Satpute, Vishal R
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.6161-6176
    • /
    • 2018
  • Pseudorandom numbers are useful in cryptographic operations for using as nonce, initial vector, secret key, etc. Security of the cryptosystem relies on the secret key parameters, so a good pseudorandom number is needed. In this paper, we have proposed a new approach for generation of pseudorandom number. This method uses the three dimensional combinational puzzle Rubik Cube for generation of random numbers. The number of possible combinations of the cube approximates to 43 quintillion. The large possible combination of the cube increases the complexity of brute force attack on the generator. The generator uses cryptographic hash function. Chaotic map is being employed for increasing random behavior. The pseudorandom sequence generated can be used for cryptographic applications. The generated sequences are tested for randomness using NIST Statistical Test Suite and other testing methods. The result of the tests and analysis proves that the generated sequences are random.

Design of Fast Elliptic Curve Crypto module for Mobile Hand Communication

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • 제6권2호
    • /
    • pp.177-181
    • /
    • 2008
  • The more improved the Internet and the information technology, the stronger cryptographic system is required which can satisfy the information security on the platform of personal hand-held devices or smart card system. This paper introduces a case study of designing an elliptic curve cryptographic processor of a high performance that can be suitably used in a wireless communicating device or in an embedded system. To design an efficient cryptographic system, we first analyzed the operation hierarchy of the elliptic curve cryptographic system and then implemented the system by adopting a serial cell multiplier and modified Euclid divider. Simulation result shows that the system was correctly designed and it can compute thousands of operations per a second. The operating frequency used in simulation is about 66MHz and gate counts are approximately 229,284.

AES 암호 프로세서의 VLSI 설계 (VLSI Design of AES Cryptographic Processor)

  • 정진욱;최병윤;서정욱
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2001년도 하계종합학술대회 논문집(2)
    • /
    • pp.285-288
    • /
    • 2001
  • In this paper a design of cryptographic coprocessor which implements AES Rijndael algorithm is described. To achieve average throughput of 1 round per 5 clocks, subround pipelined scheme is applied. To apply the coprocessor to various applications, three key sizes such as 128, 192, 256 bits are supported. The cryptographic coprocessor is designed using 0.25${\mu}{\textrm}{m}$ CMOS technology and consists of about 36, 000 gates. Its peak performance is about 512 Mbps encryption or decryption rate under 200 Mhz clock frequency and 128-bit key ECB mode(AES-128ECB).

  • PDF

안전한 보안명령 전달을 위한 비행종단시스템용 암호화 장치 설계 요구사항 (The cryptographic module design requirements of Flight Termination System for secure cryptogram delivery)

  • 황수설;김명환;정혜승;오창열;마근수
    • 한국위성정보통신학회논문지
    • /
    • 제10권3호
    • /
    • pp.114-120
    • /
    • 2015
  • 본 논문에서는 우주발사체에 적용되는 비행종단시스템의 보안명령 입력을 위한 암호화 장치의 개념설계 결과와 개발 요구조건을 보였다. 암호화 장치는 명령신호를 생성하고 암호화하기 위한 명령생성장치와 암호화 명령신호를 연계장치에 입력하기 위한 명령입력장치로 구분하여 개발되도록 설계하였으며, 미국 NIST의 권고안과 한국인터넷진흥원(KISA)의 권고안을 참고하여 보안등급과 암호 알고리즘, 암호키 관리방안 등을 설정하였다. 암호화 장치는 AES-256 블록 암호화가 적용된 비밀키 알고리즘과 SHA-256의 해쉬 알고리즘을 적용하여 기밀성, 무결성, 가용성이 확보되도록 설계되었다. 설계된 암호화 장치는 우주발사체에 탑재되는 비행종단시스템의 보안명령 입력 용도로 활용되어 비행종단명령의 보안성과 비행종단시스템의 신뢰성 향상에 기여할 것으로 판단된다.

기업 정보체계의 키 복구 기술 (Key Recovery Technology for Enterprise Information Infrastructure(EII))

  • 임신영;강상승;하영국;함호상;박상봉
    • 한국전자거래학회지
    • /
    • 제4권3호
    • /
    • pp.159-178
    • /
    • 1999
  • As Electronic Commerce is getting larger, the volume of Internet-based commerce by enterprise is also getting larger. This phenomenon applies to Internet EDI, Global Internet Business, and CALS information services. In this paper, a new type of cryptographic key recovery mechanism satisfying requirements of business environment is proposed. It is also applied to enterprise information infrastructure for managing employees' task related to handling official properties of electronic enterprise documents exchange. This technology needs to be complied to information management policy of a certain enterprise environment because behavior of cryptographic key recovery can cause interruption of the employees' privacy. However, the cryptographic key recovery mechanism is able to applied to any kind of information service, the application areas of key recovery technology must be seriously considered as not disturbing user's privacy It will depend on the policy of enterprise information management of a specific company.

  • PDF