• Title/Summary/Keyword: cyber communication

Search Result 793, Processing Time 0.023 seconds

Efficient RSA-Based PAKE Procotol for Low-Power Devices (저전력 장비에 적합한 효율적인 RSA 기반의 PAKE 프로토콜)

  • Lee, Se-Won;Youn, Taek-Young;Park, Yung-Ho;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.23-35
    • /
    • 2009
  • Password-Authenticated Key Exchange (PAKE) Protocol is a useful tool for secure communication conducted over open networks without sharing a common secret key or assuming the existence of the public key infrastructure (PKI). It seems difficult to design efficient PAKE protocols using RSA, and thus many PAKE protocols are designed based on the Diffie-Hellman key exchange (DH-PAKE). Therefore it is important to design an efficient PAKE based on RSA function since the function is suitable for designing a PAKE protocol for imbalanced communication environment. In this paper, we propose a computationally-efficient key exchange protocol based on the RSA function that is suitable for low-power devices in imbalanced environment. Our protocol is more efficient than previous RSA-PAKE protocols, required theoretical computation and experiment time in the same environment. Our protocol can provide that it is more 84% efficiency key exchange than secure and the most efficient RSA-PAKE protocol CEPEK. We can improve the performance of our protocol by computing some costly operations in offline step. We prove the security of our protocol under firmly formalized security model in the random oracle model.

A Study on Biometric Model for Information Security (정보보안을 위한 생체 인식 모델에 관한 연구)

  • Jun-Yeong Kim;Se-Hoon Jung;Chun-Bo Sim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.317-326
    • /
    • 2024
  • Biometric recognition is a technology that determines whether a person is identified by extracting information on a person's biometric and behavioral characteristics with a specific device. Cyber threats such as forgery, duplication, and hacking of biometric characteristics are increasing in the field of biometrics. In response, the security system is strengthened and complex, and it is becoming difficult for individuals to use. To this end, multiple biometric models are being studied. Existing studies have suggested feature fusion methods, but comparisons between feature fusion methods are insufficient. Therefore, in this paper, we compared and evaluated the fusion method of multiple biometric models using fingerprint, face, and iris images. VGG-16, ResNet-50, EfficientNet-B1, EfficientNet-B4, EfficientNet-B7, and Inception-v3 were used for feature extraction, and the fusion methods of 'Sensor-Level', 'Feature-Level', 'Score-Level', and 'Rank-Level' were compared and evaluated for feature fusion. As a result of the comparative evaluation, the EfficientNet-B7 model showed 98.51% accuracy and high stability in the 'Feature-Level' fusion method. However, because the EfficietnNet-B7 model is large in size, model lightweight studies are needed for biocharacteristic fusion.

Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability (시스템 취약점 개선의 필요성에 따른 효율적인 점검 방법을 통한 종합 보안 취약성 분석 시스템 설계)

  • Min, So-Yeon;Jung, Chan-Suk;Lee, Kwang-Hyong;Cho, Eun-Sook;Yoon, Tae-Bok;You, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.1-8
    • /
    • 2017
  • As the IT environment becomes more sophisticated, various threats and their associated serious risks are increasing. Threats such as DDoS attacks, malware, worms, and APT attacks can be a very serious risk to enterprises and must be efficiently managed in a timely manner. Therefore, the government has designated the important system as the main information communication infrastructure in consideration of the impact on the national security and the economic society according to the 'Information and Communication Infrastructure Protection Act', which, in particular, protects the main information communication infrastructure from cyber infringement. In addition, it conducts management supervision such as analysis and evaluation of vulnerability, establishment of protection measures, implementation of protection measures, and distribution of technology guides. Even now, security consulting is proceeding on the basis of 'Guidance for Evaluation of Technical Vulnerability Analysis of Major IT Infrastructure Facilities'. There are neglected inspection items in the applied items, and the vulnerability of APT attack, malicious code, and risk are present issues that are neglected. In order to eliminate the actual security risk, the security manager has arranged the inspection and ordered the special company. In other words, it is difficult to check against current hacking or vulnerability through current system vulnerability checking method. In this paper, we propose an efficient method for extracting diagnostic data regarding the necessity of upgrading system vulnerability check, a check item that does not reflect recent trends, a technical check case for latest intrusion technique, a related study on security threats and requirements. Based on this, we investigate the security vulnerability management system and vulnerability list of domestic and foreign countries, propose effective security vulnerability management system, and propose further study to improve overseas vulnerability diagnosis items so that they can be related to domestic vulnerability items.

Redesign and Performance Analysis of RTP(Real-time Transport Protocol) for Encryption of VoIP Media Information between Different Communication Networks (이종의 통신망 간에 VoIP 미디어 암호화를 위한 RTP(Real-time Transport Protocol)의 재설계 및 성능 분석)

  • Oh, Hyung-Jun;Park, Jae-Kyoung;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.4
    • /
    • pp.87-96
    • /
    • 2013
  • In this paper, we suggest redesigned RTP protocol that is able to perform encryption of VoIP media information for single private network and between the different private networks. And we conduct a test for performance analysis. Such as SRTP or ZRTP methods have been used for VoIP media encryption. But, the existing encryption techniques have problem that can not perform end-to-end encryption between different private networks. In order to solve this problem, in this paper, we redesign RTP protocol. Redesigned RTP includes all information for encryption of VoIP media. Therefore the encryption is not affected by modification of SIP and SDP information that occurred in gateway. Also, redesigned RTP includes code for whether or not to apply encryption. By using the code, modification of RTP header from gateway prevents. As a result, redesigned RTP maintain the integrity and the RTP is able to perform encryption between the different private networks. Also, we conduct a test for performance analysis of SRTP, ZRTP and redesigned RTP.

Domestic Research Trends in IT Fashion (IT 패션에 대한 국내 연구 동향)

  • Choo, Ho-Jung;Nam, Yun-Ja;Lee, Yu-Ri;Lee, Ha-Kyung;Lee, Sung-Ji;Lee, Sae-Eun;Jang, Jae-Im;Park, Jin-Hee;Choi, Jin-Woo;Kim, Do-Yuon
    • Fashion & Textile Research Journal
    • /
    • v.14 no.4
    • /
    • pp.614-628
    • /
    • 2012
  • The purpose of this study was to analyze research trends and make suggestions regarding the future of information technology (IT) in the fashion industry. In this study, 437 papers written regarding IT fashion from five major journals published between 2000 and 2011 were examined. The research areas were then organized by subject and keyword, and divided into 16 high-context categories. Two IT fashion maps were constructed, one from a fashion consumer's perspective, and the other based on the fashion industry's supply chain. This study identified important trends in IT fashion such as: 3D scanners, 3D digital renderings of the human form, 3D digital garments, smart garments, mass customization, production automation, online shopping, home shopping, online communities, e-commerce, digital media, virtual reality, e-tail, the digital generation, E-CRM, and education. Data from body scans was collected and applied to production, and research on smart textiles was also carried out. As for IT fashion's service areas, the majority of the research focused on online shopping or online communication. Additionally, research done on avatars and cyber space, and studies on social networking services are shown. The results of this study indicated that a new field of research has opened and that current research has been developing. Also, this study showed what is needed to expand and strengthen IT fashion.

The effects and related factors of public service announcement on hand-washing (국민 손씻기 홍보사업 효과 및 관련요인)

  • Kim, Hyun-Soo;Lee, Moo-Sik;Kim, Byung-Hee;Yang, Nam-Young;Hwang, Hae-Jung;Hong, Jee-Young;Hong, Soo-Jin;Kim, Eun-Young;Kim, Young-Tek;Park, Youn-Jin;Lim, Go-Un
    • Korean Journal of Health Education and Promotion
    • /
    • v.32 no.2
    • /
    • pp.1-13
    • /
    • 2015
  • Objectives: This study was conducted to investigate derived factors associated with a public service announcement on handwashing to evaluate the effect of this announcement. Methods: In early september, 1,000 persons over 19 years old was investigated by Computer Aided Telephone Interview, at last 993 persons for analysis. Outcomes were the exposure to the public service announcements on handwashing, the comprehension of this announcements, the intention of behavioral change and the practice of handwashing. Results: In particular, the proportion of exposure is more women and highly educated. The comprehension of the announcement was no statistically significant difference. The intention of behavior change showed higher in workers and understanding of the announcements. The practice of handwashing is higher in women and lower in student/unemployed. There was no difference in practice in accordance with the exposure, the comprehension and the intention of behavioral change. Conclusions: About the comprehension of the announcements and the intention of behavioral change, the effects of the public service announcements on handwashing can be very positive. But it does not affect the actual practice of hand washing. The handwashing promotion programs will have to devise a strategy and structure, operation method considering realistic and scalable platform.

Comparison of Security Education Program of Woman Information Security Majors of Seoul Region (서울지역 여성 정보보호전공의 보안교육 프로그램 비교)

  • Hong, Jin-Keun
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.10
    • /
    • pp.107-113
    • /
    • 2020
  • With the development of IT technology, along with the expansion of women's participation in society, the education training of information security women's workforce is becoming a very important issue. Therefore, it is important to analyze the relevant curriculum to identify the direction of fostering women's information security workforce. Therefore, in this paper, the education and training programs of the department for training women's information security workforce based in Seoul area of the Korean metropolitan area were analyzed. The main research objective of this paper is to review whether the education and training system, which consists of the department of women's information security human resources development, is in line with the direction of NIST's human resources development. The research focus was on what the women's information security department organizes courses with each security major and what task training is interested in. In addition, in this paper, we were confirmed that the curriculum of the relevant major is based on the NIST Human Resources Development Framework, and that the majors of the relevant universities have an education and training system that conforms to the relevant task. In conclusion, the related majors are judged to be focused on the development of certification evaluation personnel of convergence industry security or information security development personnel, and general cyber security personnel.

A Study on the Establishment of Industrial Security Education Programs in Korea (한국 산업보안교육 프로그램의 정립에 관한 연구)

  • Choi, Sun-Tae;Yu, Hyeong-Chang
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.185-208
    • /
    • 2010
  • This study is to suggest the current security education programs and improvement of industrial security curriculums in Korea. We live in a world of insecurity; the world is changing at an ever accelerating pace. Life, society, economics, international relations, and security risk are becoming more and more complex. The nature of work, travel, recreation, and communication is radically changing. We live in a world where, seemingly with each passing year, the past is less and less's guide to the future. Security is involved in on one way or another in virtually every decision we make and every activity we undertake. The global environment has never been more volatile, and societal expectations for industrial security and increasing if anything. The complexities of globalization, public expectation, regulatory requirements, transnational issues, jurisdictional risks, crime, terrorism, advances in information technology, cyber attacks, and pandemics have created a security risk environment that has never been more challenging. We had to educate industrial security professional to cope with new security risk. But, how relevant is a college education to the security professional? A college degree will not guarantee a job or advancement opportunities. But, with a college and professional training, a person has improved chances for obtaining a favored position. Commonly, Security education and experience are top considerations to find a job so far, also training is important. Today, Security is good source to gain competitive advantage in global business. The future of security education is prospect when one considers the growth evident in the field. Modern people are very security-conscious today, so now we had to set up close relevant industrial security programs to cope with new security risk being offered in colleges or several security professional educational courses.

  • PDF

Identifying Regional Tourism Resources Using Webometric Network Analysis: A case of Suseong-gu in Daegu, South Korea (웹보메트릭스를 활용한 지역관광자원 발굴 및 네트워크 분석: 대구 수성구를 중심으로)

  • Song, Hwa Young;Zhu, Yu Peng;Kim, Ji Eun;Oh, Jung Hyun;Park, Han Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.7
    • /
    • pp.475-486
    • /
    • 2020
  • The purpose of present study is to identify the regional tourism resources using Webometric network analysis. The study focuses on Suseong area in Daegu metropolitan city. Various kinds of web-based data, for example, hit counts, online news, and public comments, were used to discover hot places and people's responses. The research question is, 'First, what is the optimum level of the search engine for suseong? Second, what is the online appearance of tourist resources in suseong? Which region is the center of tourism with high levels of emergence? Third, what are the main contents of news articles and comments related to the Suseong pond?'. The results show that the search engine optimization level in Suseong is lower than that in other areas in Daegu. In other words, tourism information and contents regarding Suseong are not highly visible on cyber space. Importantly, Suseong pond had the highest online presence. A close analysis of both online news and users' comments on Suseong pond, however, revealed the biggest concern as calling for improving public accessibility to tourism infrastructure. The findings are expected to contribute to policy development and service operation related to tourism resources in Suseong.

Characteristics of 'Modern Cyborg' in Animation - Focused on Animations of and - (애니메이션에 나타난 '현대 사이보그' 특성 - <공각기동대>와 <이노센스>를 중심으로-)

  • Seo, Soo-Jung
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.4
    • /
    • pp.150-159
    • /
    • 2007
  • The remark by Andy Clark that the cleverer our world is, the more difficult we perceive our world and ourselves, is very significant to us living in digital world. As the huge power of Technology are dominating the world, the people are drifting with their body fragmented in diverse kinds of chaos, being are faced with the situation that they should reorganize themselves about personal life and ways of thinking in a new technological environment. This paper approach some characteristics of contemporary society through 'Cyborg' which is the product of limitless human desire and technology. The characteristics in modern times, such as boundary disjoint, hybridity, transformation, fusion, communication with image, digital sensitivity, womanness correspond to those of the Cyborg. This paper also investigates the history of modern Cyborg through animation, one of the remarkable medium in digital age and analyze the cyber punk animation, and by Oshii Mamoru, which provoked the extension of the concept of Cyborg. This paper will give a moment to diagnose what this age is like and to present a reference line of our contemporaries exposed to the surplus images and technology.