• Title/Summary/Keyword: efficient countermeasure

Search Result 139, Processing Time 0.027 seconds

The Countermeasure to Explosives on World Cup Stadiums (월드컵 경기장에 대한 폭발물 안전대책)

  • Kim, Myung-Gon
    • Korean Security Journal
    • /
    • no.2
    • /
    • pp.61-81
    • /
    • 1999
  • While the progress of preparation for the 2002 World Cup games goes on the environment is changing by industrializations development of science and specialization of technology, because of that recently the crime has also became intellectual so the importance on countermeasure of safety has raised. The countermeasure for safety The stadium is a limited space where amount of population could be concentrated, so that in a moment there could be a great casualties by terrorism, specially there should be efficient countermeasures for bomb terrorism. So to be prepared for the problems that had been appeared on bomb terrorism activities of North Korea around the world, we should know about the inspection environment and special inspection environment, and for the prevention first of all I've studied on suitable way to inspect the stadiums secondly to plan on specialized training of the necessary personnel on inspection and finally efficiency of use on inspection equipment. With there following plans we could make perfect safety countermeasures focused on prevention for the successful World Cup games.

  • PDF

A Study on Attack against NTRU Signature Implementation and Its Countermeasure (NTRU 서명 시스템 구현에 대한 오류 주입 공격 및 대응 방안 연구)

  • Jang, Hocheol;Oh, Soohyun;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.551-561
    • /
    • 2018
  • As the computational technology using quantum computing has been developed, several threats on cryptographic systems are recently increasing. Therefore, many researches on post-quantum cryptosystems which can withstand the analysis attacks using quantum computers are actively underway. Nevertheless, the lattice-based NTRU system, one of the post-quantum cryptosystems, is pointed out that it may be vulnerable to the fault injection attack which uses the weakness of implementation of NTRU. In this paper, we investigate the fault injection attacks and their previous countermeasures on the NTRU signature system and propose a secure and efficient countermeasure to defeat it. As a simulation result, the proposed countermeasure has high fault detection ratio and low implementation costs.

Research of Efficient Environmental Policy Instruments for the Reduction of SO2-Emissions from Stationary Sources (고정오염원에서 발생하는 SO2 배출량 저감을 위한 효율적인 환경정책수단의 연구)

  • Lee, Yeong Jun
    • Journal of Environmental Science International
    • /
    • v.13 no.4
    • /
    • pp.339-347
    • /
    • 2004
  • This paper asks the question: what choice of environmental policy instruments is efficient to reduce sulfur dioxide from stationary sources\ulcorner: In Korea, command and control has been a common way of controlling $SO_2-emissions.$ When compared to the non-incentive environmental policy instrument such as command and control, economic incentive environmental policy instrument has been the advantage of making polluter himself flexibly deals with in marginal abatement cost to develop environmental technology in the long view. Therefore, the application possibility of the incentive environmental policy instrument was studied in this research to realize the countermeasure for controlling of $SO_2-emissions.$ As a result, enforcement of the countermeasure such as flue gas desulfurizer by command and control would be suitable because power generation is performed by the public or for the public in source of air pollution and thus, economic principle is not applied to the polluter. In the source of industrial pollution, enforcement of fuel tax is found to be suitable for the countermeasure for the use of low sulfur oil in terms of the flexibility of demand for the price in the long tenn. For the permissible air pollution standards applicable to all air pollutant emitting facilities, enforcement of incentive environmental policy such as bubble, off-set, banking policy or tradeable emission penn its would be ideal in long terms according to the regional characteristics and the number and scale of air pollutant emitting facilities.

Elliptic Curve Scalar Multiplication Resistant against Side Channel Attacks (부채널 공격에 안전한 타원곡선 스칼라 곱셈 알고리즘)

  • Kim Tae Hyun;Jang Sang-Woon;Kim Woong Hee;Park Young-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.125-134
    • /
    • 2004
  • When cryptosystem designers implement devices that computing power or memory is limited such as smart cards, PDAs and so on, not only he/she has to be careful side channel attacks(SCA) but also the cryptographic algorithms within the device has to be efficient using small memory. For this purpose, countermeasures such as Moiler's method, Okeya-Takagi's one and overlapping window method, based on window method to prevent SCA were proposed. However, Moiler's method and Okeya-Talngi's one require additional cost to prevent other SCA such as DPA, Second-Order DPA, Address-DPA, and so on since they are immune to only SPA. Also, overlapping window method has a drawback that requires big memory. In this paper, we analyze existing countermeasures and propose an efficient and secure countermeasure that is immune to all existing SCA using advantages of each countermeasure. Moreover, the proposed countermeasure can enhance the efficiency using mixed coordinate systems.

Security Analysis against RVA-based DPA Countermeasure Applied to $Eta_T$ Pairing Algorithm (RVA 기반의 페어링 부채널 대응법에 대한 안전성 분석)

  • Seo, Seog-Chung;Han, Dong-Guk;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.83-90
    • /
    • 2011
  • Recently, pairings over elliptic curve have been applied for various ID-based encryption/signature/authentication/key agreement schemes. For efficiency, the $Eta_T$ pairings over GF($P^n$) (P = 2, 3) were invented, however, they are vulnerable to side channel attacks such as DPA because of their symmetric computation structure compared to other pairings such as Tate, Ate pairings. Several countermeasures have been proposed to prevent side channel attacks. Especially, Masaaki Shirase's method is very efficient with regard to computational efficiency, however, it has security flaws. This paper examines closely the security flaws of RVA-based countermeasure on $Eta_T$ Pairing algorithm from the implementation point of view.

강원산간지방 도로확장 대절토부 사면 안정 처리에 관한 연구

  • 이승호;황영철;송요원;정응환;지영환;노흥제
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2003.03a
    • /
    • pp.529-536
    • /
    • 2003
  • In domestic case occurrence of cut slopes according to construction and expansion of road is necessary more than 70% of country has been consisted of mountain area. In the case of Kang-won Do, there are much mountains locals in road wiping away a disgrace and expanded and slant is connoting collapse danger of incision side by each kind calamity being urgent. When route alteration enforces disadvantageous road extension, stability examination and processing way about large slope happened are serious. During road extension work in the Kang-won DO secure stability for falling rock of road slope and failure that happen and established suitable reinforcement and countermeasure in reply in necessity. The Slope is divided rock slope and soil slope, and then in order to analysis soil slope apply LEM theory. And rock slope examined stability about stereographic projection and wedge failure. Is going to utilize in reinforcement and failure prevention if it is efficient cutting as reinterpreting stability and secure stability and wish to consider effective and robust processing plan of great principle earth and sand side, and present countermeasure inside with these data hereafter applying suitable reinforcement countermeasure about unstable section.

  • PDF

A Study on Database System of Road Cut Slope Management (일반국도 절토사면 유지관리 데이터베이스 시스템 개발연구)

  • Koo, Hobon;Baek, Yong;Kim, Jin-Hwan;Bae, Gyu-Jin
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2003.06a
    • /
    • pp.23-32
    • /
    • 2003
  • In order to reduce the damage of property and the loss of lives caused by slope failure, the development of an efficient cut slope management system and the proposal of an appropriate countermeasure are required. However, recognizing the cause of slope failure and proposing the adequate countermeasure for failure are difficult tasks because slope failure is occurred by many complicated failure reasons. Therefore, the cut slope database system is developed in this study for the effective tool which Is able to analyze the characteristics and relationship for reasons of slope failure. In addition, this system contributes to the curtailment of governmental budget spending for countermeasures of slope. Moreover, GIS system will be adopted to the database system and the investigation of characteristics relationship between one and another area is in progress.

  • PDF

Theoretical Implication on Establishing the National Countermeasure System against Cyber Crime - Focusing on a Pattern of Cyber Terror - (사이버범죄에 대한 국가적 대응체계 구축의 이론적 함의 -사이버테러형 범죄를 중심으로-)

  • Kim, Young-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.6
    • /
    • pp.165-171
    • /
    • 2009
  • From the late 20th century, rapidly progressing information communication technology and spreading Internet all over the world cause many reverse functions when there is a conversion into the new information society. One of them is cyber terrorism as cyber crime. Cyber terrorism gradually has had a serious problem in the national security as well as the domestic aspects. Therefore, this study looked into the present condition of cyber terrorism, discussed its prospect, and sought the efficient national countermeasure methods against cyber terrorism by comparing other countries' countermeasure systems currently.

Practical Second-Order Correlation Power Analysis on the Message Blinding Method and Its Novel Countermeasure for RSA

  • Kim, Hee-Seok;Kim, Tae-Hyun;Yoon, Joong-Chul;Hong, Seok-Hie
    • ETRI Journal
    • /
    • v.32 no.1
    • /
    • pp.102-111
    • /
    • 2010
  • Recently power attacks on RSA cryptosystems have been widely investigated, and various countermeasures have been proposed. One of the most efficient and secure countermeasures is the message blinding method, which includes the RSA derivative of the binary-with-random-initial-point algorithm on elliptical curve cryptosystems. It is known to be secure against first-order differential power analysis (DPA); however, it is susceptible to second-order DPA. Although second-order DPA gives some solutions for defeating message blinding methods, this kind of attack still has the practical difficulty of how to find the points of interest, that is, the exact moments when intermediate values are being manipulated. In this paper, we propose a practical second-order correlation power analysis (SOCPA). Our attack can easily find points of interest in a power trace and find the private key with a small number of power traces. We also propose an efficient countermeasure which is secure against the proposed SOCPA as well as existing power attacks.

An Efficient Rain Fade Countermeasure Technique using Adaptive Modulation in Ka-band Satellite Systems (Ka밴드 위성시스템에서 적응변조방식을 이용한 효과적인 강우 페이딩 보상기술)

  • Hwang, Seong-Hyeon;Choe, Hyeong-Jin;Kim, Hui-Chan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.3
    • /
    • pp.18-27
    • /
    • 2000
  • Signal attenuation of Ka-band satellite communication system due to rain fading is more severe than those of conventional frequency band system, thus an efficient rain fade countermeasure technique is absolutely required. In this paper, we design an improved adaptive modulation system, which switches the modulation mode according to the channel condition, and propose the novel synchronization algorithms. We assume that the modulation scheme is M-ary PSK and the receiver is TDMA burst mode. And the transponder model is the same with KOREASAT-3. By using the adaptive modulation scheme, we satisfy the BER and mean spectral efficiency requirements, simultaneously, which is impossible by using the fixed modulation scheme.

  • PDF