• Title/Summary/Keyword: information Security

Search Result 17,719, Processing Time 0.05 seconds

Low Power Implementation of Integrated Cryptographic Engine for Smart Cards (스마트카드 적용을 위한 저전력 통합 암호화 엔진의 설계)

  • Kim, Yong-Hee;Jeong, Yong-Jin
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.6
    • /
    • pp.80-88
    • /
    • 2008
  • In this paper, the block cipher algorithms, 3-DES(Triple Data Encryption Standard), AES(Advanced Encryption Standard), SEED, HASH(SHA-1), which are domestic and international standards, have been implemented as an integrated cryptographic engine for smart card applications. For small area and low power design which are essential requirements for portable devices, arithmetic resources are shared for iteration steps in each algorithm, and a two-level clock gating technique was used to reduce the dynamic power consumption. The integrated cryptographic engine was verified with ALTERA Excalbur EPXA10F1020C device, requiring 7,729 LEs(Logic Elements) and 512 Bytes ROM, and its maximum clock speed was 24.83 MHz. When designed by using Samsung 0.18 um STD130 standard cell library, the engine consisted of 44,452 gates and had up to 50 MHz operation clock speed. It was estimated to consume 2.96 mW, 3.03 mW, 2.63 mW, 7.06 mW power at 3-DES, AES, SEED, SHA-1 modes respectively when operating at 25 MHz clock. We found that it has better area-power optimized structure than other existing designs for smart cards and various embedded security systems.

The Effect of the on the purchase behavior of the Software Quality (소프트웨어 품질이 소비자 구매 행동에 미치는 영향)

  • Kim, Dae-Sung;Oh, Sung-Bae
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.4 no.1
    • /
    • pp.29-65
    • /
    • 2009
  • This study is The Effect of the on the purchase behavior of the Software Quality. To have purchased the software in a Consumer surveys were conducted. The following is a summary of results of this research. First, the software quality and significant consumer purchasing behavior (+) of influence. Functionality, usability, portability of software quality attributes the impulse buying and buy more of both the (+) showed the influence. Second, software quality is urge consumers to purchase significant (+) of influence. Functionality, reliability, usability, portability of software quality (+) showed the influence. Third, the software quality In the consumer buy more significant Chung (+) showed the influence. Software quality, functionality, usability, portability name (+) influence. In conclusion, the quality of the software in consumer purchasing behavior (+) were of significant influence. In particular, factors that functionality, usability factors, portability factor in the relatively large influence on the purchasing behavior. Software technology development, planning, development, testing, and in each step must keep in mind the following. First, the software, when used in certain conditions, Inherent ability to meet the needs and requirements set forth to provide the appropriate functionality and accuracy as the ability of software products each other with the capabilities to the effective and thorough security features should be required. Second, software, a user-specified criteria to use in understanding and learning, and must, and the ability to prefer. Software for users to understand and easy to use, whether the check. In particular, understanding the interface, Help understanding, understand the input and output data, and interface consistency, the user information, the message must be equipped and easy to understand. In addition, ease of learning to be self-learning, and help ease of access shall be required. Third, in certain circumstances, a different environment to transfer be equipped with the functionality of the software. Applying data structures and application environment, helping transplant convenience must keep in mind sex.

  • PDF

The Influence of Exhibitions as a Marketing Tool on Business Performance - An Illustration from a Defence Industry - (전시회 참가활동이 기업의 경영성과에 미치는 영향 - 방위산업체를 중심으로 -)

  • Han, Jung-Han;Jeon, In-Oh
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2009.10a
    • /
    • pp.223-243
    • /
    • 2009
  • In the early 1990's internation al security environment bring on the change. So each countries should have renewed the defence policy. The developed countries make efforts to keep the superiority of military industry with an high technology and huge capital. One of the efforts is the defence industry exhibitions for the management performance regarded as the marketing strategic principal method. The result of the opening exhibitions has been studied by research papers and treatises. A exhibitions' goal is different from an it's characteristic, type, industry, participator, institution and participating nation. An enterprise's management performance is runs as follows. First, an exhibitions participation activation has an effect re-participation following the satisfaction. Second, an exhibitions participation activation contributes to be on sale promotion, The result of the exhibitions participation is classified with sale performance and non-sale performance. The third, an exhibitions participation activation contributes to the effective company management. The huge fund advertisement is a financial burden, but a exhibitions takes effect one-fifth economical retrenchment. Accordingly, this study researched the exhibition participation choice properties, an exhibitions participation activation properties and investigated the Korea defence industry's income statement, balance sheet, growth ratios, profitability ratios, productivity ratios, stability ratios which were substitute for the enterprise's management performance through the exhibitions participation costs and the number of times.

  • PDF

Comparative Pathogenicity and Host Ranges of Magnaporthe oryzae and Related Species

  • Chung, Hyunjung;Goh, Jaeduk;Han, Seong-Sook;Roh, Jae-Hwan;Kim, Yangseon;Heu, Sunggi;Shim, Hyeong-Kwon;Jeong, Da Gyeong;Kang, In Jeong;Yang, Jung-Wook
    • The Plant Pathology Journal
    • /
    • v.36 no.4
    • /
    • pp.305-313
    • /
    • 2020
  • Host shifting and host expansion of fungal plant pathogens increases the rate of emergence of new pathogens and the incidence of disease in various crops, which threaten global food security. Magnaporthe species cause serious disease in rice, namely rice blast disease, as well as in many alternative hosts, including wheat, barley, and millet. A severe outbreak of wheat blast due to Magnaporthe oryzae occurred recently in Bangladesh, after the fungus was introduced from South America, causing great loss of yield. This outbreak of wheat blast is of growing concern, because it might spread to adjacent wheat-producing areas. Therefore, it is important to understand the host range and population structure of M. oryzae and related species for determining the evolutionary relationships among Magnaporthe species and for managing blast disease in the field. Here, we collected isolates of M. oryzae and related species from various Poaceae species, including crops and weeds surrounding rice fields, in Korea and determined their phylogenetic relationships and host species specificity. Internal transcribed spacer-mediated phylogenetic analysis revealed that M. oryzae and related species are classified into four groups primarily including isolates from rice, crabgrass, millet and tall fescue. Based on pathogenicity assays, M. oryzae and related species can infect different Poaceae hosts and move among hosts, suggesting the potential for host shifting and host expansion in nature. These results provide important information on the diversification of M. oryzae and related species with a broad range of Poaceae as hosts in crop fields.

A Study on Apparatus of Smart Wearable for Mine Detection (스마트 웨어러블 지뢰탐지 장치 연구)

  • Kim, Chi-Wook;Koo, Kyong-Wan;Cha, Jae-Sang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.263-267
    • /
    • 2015
  • current mine detector can't division the section if it is conducted and it needs too much labor force and time. in addition to, if the user don't move the head of sensor in regular speed or move it too fast, it is hard to detect a mine exactly. according to this, to improve the problem using one direction ultrasonic wave sensing signal, that is made up of human body antenna part, main micro processor unit part, smart glasses part, body equipped LCD monitor part, wireless data transmit part, belt type power supply part, black box type camera, Security Communication headset. the user can equip this at head, body, arm, waist and leg in removable type. so it is able to detect the powder in a 360-degree on(under) the ground whether it is metal or nonmetal and it can express the 2D or 3D film about distance, form and material of the mine. so the battle combats can avoid the mine and move fast. also, through the portable battery and twin self power supply system of the power supply part, combat troops can fight without extra recharge and we can monitoring the battle situation of distant place at the command center server on real-time. and then, it makes able to sharing the information of battle among battle combats one on one. as a result, the purpose of this study is researching a smart wearable mine detector which can establish a smart battle system as if the commander is in the site of the battle.

Fingerprint Recognition Algorithm using Clique (클릭 구조를 이용한 지문 인식 알고리즘)

  • Ahn, Do-Sung;Kim, Hak-Il
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.2
    • /
    • pp.69-80
    • /
    • 1999
  • Recently, social requirements of personal identification techniques are rapidly expanding in a number of new application ares. Especially fingerprint recognition is the most important technology. Fingerprint recognition technologies are well established, proven, cost and legally accepted. Therefore, it has more spot lighted among the any other biometrics technologies. In this paper we propose a new on-line fingerprint recognition algorithm for non-inked type live scanner to fit their increasing of security level under the computing environment. Fingerprint recognition system consists of two distinct structural blocks: feature extraction and feature matching. The main topic in this paper focuses on the feature matching using the fingerprint minutiae (ridge ending and bifurcation). Minutiae matching is composed in the alignment stage and matching stage. Success of optimizing the alignment stage is the key of real-time (on-line) fingerprint recognition. Proposed alignment algorithm using clique shows the strength in the search space optimization and partially incomplete image. We make our own database to get the generality. Using the traditional statistical discriminant analysis, 0.05% false acceptance rate (FAR) at 8.83% false rejection rate (FRR) in 1.55 second average matching speed on a Pentium system have been achieved. This makes it possible to construct high performance fingerprint recognition system.

  • PDF

A Proactive Secret Image Sharing Scheme over GF(28) (유한 체상에서의 사전 비밀이미지 공유 기법)

  • Hyun, Suhng-Ill;Shin, Sang-Ho;Yoo, Kee-Young
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.5
    • /
    • pp.577-590
    • /
    • 2013
  • Shamir's (k,n)-threshold secret sharing scheme is not secure against cheating by attacker because the signature of participants is omitted. To prevent cheating, many schemes have been proposed, and a proactive secret sharing is one of those. The proactive secret sharing is a method to update shares in the secret sharing scheme at irregular intervals. In this paper, a proactive image secret sharing scheme over $GF(2^8)$ is proposed for the first time. For the past 30 years, Galois field operation is widely used in order to perform the efficient and secure bit operation in cryptography, and the proposed scheme with update phase of shadow image over $GF(2^8)$) at irregular intervals provides the lossless and non-compromising of secret image. To evaluate security and efficiency of images (i.e. cover and shadow images) distortion between the proposed scheme and the previous schemes, embedding capacity and PSNR are compared in experiments. The experimental results show that the performances of the embedding capacity and image distortion ratio of the proposed scheme are superior to the previous schemes.

Fintech Trends and Mobile Payment Service Anlaysis in Korea: Application of Text Mining Techniques (국내 핀테크 동향 및 모바일 결제 서비스 분석: 텍스트 마이닝 기법 활용)

  • An, JungKook;Lee, So-Hyun;An, Eun-Hee;Kim, Hee-Woong
    • Informatization Policy
    • /
    • v.23 no.3
    • /
    • pp.26-42
    • /
    • 2016
  • Recently, with the rapid growth of the O2O market, Fintech combining the finance and ICT technology is drawing attention as innovation to lead "O2O of finance", along with Fintech-based payment, authentication, security technology and related services. For new technology industries such as Fintech, technical sources, related systems and regulations are important but previous studies on Fintech lack in-depth research about systems and technological trends of the domestic Fintech industry. Therefore, this study aims to analyze domestic Fintech trends and find the insights for the direction of technology and systems of the future domestic Fintech industry by comparing Kakao Pay and Samsung Pay, the two domestic representative mobile payment services. By conducting a complete enumeration survey about the tweets mentioning Fintech until June 2016, this study visualized topics extraction, sensitivity analysis and keyword analyses. According to the analysis results, it was found that various topics have been created in the technologies and systems between 2014 and 2016 and different keywords and reactions were extracted between topics of Samsung Pay based on "devices" such as Galaxy and Kakao Pay based on "service" such as KakaoTalk. This study contributes to analyzing the unstructured data of social media by period by using social media mining and quantifying the expectations and reactions of consumers to services through the sentiment analysis. It is expected to be the foundation of Fintech industry development by presenting a strategic direction to Fintech related practitioners.

Significant Factors for Building Enterprise Mobile Cloud (기업용 모바일 클라우드 시스템 구축 시 고려 요인)

  • Lee, Jae-Jin;Oh, Jun-Seok;Lee, Bong-Gyou
    • The KIPS Transactions:PartD
    • /
    • v.18D no.6
    • /
    • pp.481-492
    • /
    • 2011
  • Recently, various mobile services are provided by the spread of wireless network infrastructures and smart devices. The improvement of cloud computing technologies increases the interests for enterprise mobile cloud services in various IT companies as well. By increasing the interests for enterprise mobile cloud services, it is necessary to evaluate the use of enterprise mobile cloud services. Therefore, the factors which affect the user acceptance of enterprise mobile cloud services are analyzed on the basis of Davis' technology acceptance model in this research. As analysis results, four external variables have significant effects on perceived ease of use of mobile cloud services. Also, these variables indirectly affect attitude toward using cloud services. The results show that the security is the most important factor for attitude toward using enterprise mobile cloud services. The service users also consider the interoperability as an important factor for the user acceptance of cloud services. The perceived ease of use has more contribution than the perceive usefulness on attitude toward using enterprise mobile cloud services. This research has both industrial and academic contributions because it provides the guideline to companies for introducing the enterprise mobile cloud services and apply the technology acceptance model on new IT services.

An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit (심볼릭 링크 공격 취약성 검출을 위한 분석 기법)

  • Joo, Seong-Yong;Ahn, Joon-Seon;Jo, Jang-Wu
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.45-52
    • /
    • 2008
  • In this paper we define a vulnerable code to symbolic link exploit and propose a technique to detect this using program analysis. The existing methods to solve symbolic link exploit is for protecting it, on accessing a temporary file they should perform an investigation whether the file is attacked by symbolic link exploit. If programmers miss the investigation, the program may be revealed to symbolic link exploit. Because our technique detects all the vulnerable codes to symbolic link exploit, it helps programmers keep the program safety. Our technique add two type qualifiers to the existing type system to analyze vulnerable codes to symbolic link exploit, it detects the vulnerable codes using type checking including the added type qualifiers. Our technique detects all the vulnerable codes to symbolic link exploit automatically, it has the advantage of saving costs of modifying and of overviewing all codes because programmers apply the methods protecting symbolic link exploit to only the detected codes as vulnerable. We experiment our analyzer with widely used programs. In our experiments only a portion of all the function fopen() is analyzed as the vulnerabilities to symbolic link exploit. It shows that our technique is useful to diminish modifying codes.