• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.04 seconds

ID-Based Cryptosystem and Digital Signature Scheme Using Discrete Logarithm Complexity (이산대수 문제를 이용한 ID 기본 암호시스템과 디지틀 서명방식에 관한 연구)

  • 염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.1 no.1
    • /
    • pp.3-15
    • /
    • 1991
  • in 1984 Shamir proposed the concept of ID(identity)-based cryptosystem and digital signature scheme wich does not require any public file for storing the user' s public keys. In this paper, the concept of the ID-based cryptosystem based on discrete logarithm problem using the conven-tional public-key cryptosystems is described, and the implementation method of the ID-based cryptosystem is also presented. The new digital signaturw schme based on the ID-based crypto-system is proposed and possible atacks are considered and analyzed for the security of digital signature scheme. The proposed ID-based schemes are particularrly useful for smart card and personal identification card application.

Design and Implementation of ALADDIN System (ALADDIN 시스템 설계 및 구현)

  • Yoon, Seung-Yong;Oh, Jin-Tae;Jang, Jong-Soo;Kim, Ik-Kyun
    • Annual Conference of KIPS
    • /
    • 2011.11a
    • /
    • pp.992-995
    • /
    • 2011
  • ALADDIN(Advanced Layer-free DDoS Defense INfrastructure) 시스템은 양방향 10Gbps 트래픽을 처리할 수 있는 안티 DDoS 전용 시스템이다. 로드 밸런서 엔진, 안티 DDoS 분석 엔진, PCI-Express 엔진으로 구성된 세 개의 FPGA 기반 하드웨어 엔진과 소프트웨어 엔진으로 이루어진 시스템은 인라인 모드로 동작하면서 Wire-speed 로 패킷을 처리한다. 시스템은 네트워크 레벨의 DDoS 공격뿐만 아니라 어플리케이션 레벨의 DDoS 공격도 실시간으로 탐지하고 대응한다. 본 논문에서는 ALADDIN 시스템의 설계 및 구현, 테스트 결과에 대해 기술한다.

Implementation of a Webtoon Transaction and Profit Distribution System using NFT. (NFT 를 활용한 웹툰 거래 및 수익분배 시스템 구현)

  • Lee, Su-Jin;Lee, Hye-Seung;Lee, Hee-Yeon;Cho, Eun-Min
    • Annual Conference of KIPS
    • /
    • 2021.11a
    • /
    • pp.341-343
    • /
    • 2021
  • 현재 웹툰 시장이 크게 성장하고 있는 가운데, 과도한 매출 수수료 및 불공정 계약 등 부조리한 수익분배 문제가 불거지고 있다. 본 논문은 웹툰 플랫폼의 수익모델을 보완하는 NFT 기반 웹툰거래 및 수익분배 시스템을 소개하고자 한다. NFT 는 고유한 값을 가진 토큰으로, 디지털 자산에 대한 소유권 인증에 용이하며 블록체인 네트워크 상에서 구매 이력 등의 데이터 위변조가 어렵다는 특징이 있다. 또한 암호화폐처럼 손쉽게 거래할 수 있고 재판매가 가능하다는 장점 때문에 예술 분야에서 각광받고 있다. 이에 웹툰에 NFT 를 발행하여 웹툰을 소장 및 거래하고, NFT 소장 비율에 따라 해당 웹툰의 열람 수익을 나눠 가질 수 있는 시스템을 개발하여 제안한다.

Allergy checking system using artificial intelligence (인공지능 기법을 이용한 알레르기 반응 여부 판단)

  • Kim, So-Young;Lee, Yang-Gyu;Jo, Eun-Young;Weon, Ill-Young
    • Annual Conference of KIPS
    • /
    • 2022.11a
    • /
    • pp.553-555
    • /
    • 2022
  • 다양한 양념과 조리법을 활용한 식품의 수는 시간이 지날수록 증가하는 추세이다. 따라서 처음 접하는 식품의 알레르기를 판단하는 연구가 필요하다. 우리는 이미지만으로 알레르기 유발 성분을 판단하는 시스템을 제안한다. 알레르기 성분으로 라벨링한 식품 이미지에 VGGNet 알고리즘을 적용하여 실험을 진행하고 제안된 시스템의 유용성을 판단하였다.

A Safety Analysis of Mobile Payment Systems: Ensuring Secure and Reliable Transactions (모바일 내 결제시스템의 안전성에 대한 연구)

  • JeongMyeong Lee;Jae-kyung Park
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.617-618
    • /
    • 2023
  • 본 논문은 모바일 환경에서의 안전한 결제시스템을 위한 기술 연구에 대해 다룬다. 모바일의 급속한 발전은 보안에 악영향을 끼쳤는데, 기기 내에서 많은 개인정보가 처리되기 때문에 해커들의 놀이터가 된 만큼 보안 이슈가 증가 되었다. 이를 해결하기 위해서는 기존의 결제 시스템과 다른 방식의 보안기술이 필요하다. 그리하여 모바일 보안기술과 결제시스템 기술을 연계하여 안전한 결제시스템을 구현하는 방안에 대해 연구하였다. 안전한 결제 시스템을 구현하기 위해 필요한 기술 요소들을 제안하고 이를 바탕으로 안전한 결제시스템을 구현하기 위한 시스템 아키텍쳐를 제안하고, 구현된 시스템을 통해 안전성을 검증하고자 한다. 본 논문에서는 모바일 환경에서 안전한 결제시스템을 위해 모바일 보안기술과 결제시스템 기술을 연계하여 안전성을 확보할 수 있는 방법에 대해 제안하고, 이를 통해 모바일 환경에서 안전하게 결제를 이루어낼 수 있는 기술적인 기반을 마련할 수 있을 것으로 기대해본다.

  • PDF

A Role-based Storage Encryption for the Electronic Approval System of Battle Management Systems (전장관리체계 전자결재시스템을 위한 역할기반 스토리지 암호화 기법)

  • Her, Kyoung-Soon;Lee, Soo-Jin
    • Journal of the military operations research society of Korea
    • /
    • v.37 no.1
    • /
    • pp.71-85
    • /
    • 2011
  • The most important factors of Electronic approval system of battle management system are availability and reliability. Therefore, the electronic approval system uses a SAN(storage area network) to construct the reliable server and storage. In this paper, we analyze the security vulnerabilities of the SAN storage that stores the critical military information in the electronic approval system of battle management system. Based on the analysis, we verify the possibility of information leakage by the inside attackers through the scenario-based experiment. And we finally propose a new storage encryption algorithm on the basis of user's role that can prevent the leakage of information by the inside attackers.

Optical security system for protection of personal identification information (개인신원정보 보호를 위한 광 보호 시스템)

  • 윤종수;도양회
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.4
    • /
    • pp.383-391
    • /
    • 2003
  • A new optical security system for the protection of personal identification information is proposed. Personal identification information consisting of a pure face image and an identification number is used for verification and authentication. Image encryption is performed by a fully phase image encryption technique with two random phase masks located in the input and the Fourier plane of 4-f correlator. The personal information, however, can be leaked out in the decryption process. To cope with this possibility, the encrypted image itself is used in the identification process. An encrypted personal identification number is discriminated and recognized by using the proposed MMACE_p (multiplexed MACE_p) filter, and then authenticity of the personal information is verified by correlation of the face image using the optical wavelet matched filter (OWMF). MMACE_p filter is a synthetic filter with four MACE_p (minimum average correlation energy_phase encrypted) filters multiplexed in one filter plane to recognize 10 different encrypted-numbers at a time. OWMF can improve discrimination capability and SNR (signal to noise ratio). Computer simulations confirmed that the proposed security technique can be applied to the protection of personal identification information.

Machine Learning Based Prediction of Bitcoin Mining Difficulty (기계학습 기반 비트코인 채굴 난이도 예측 연구)

  • Lee, Joon-won;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.225-234
    • /
    • 2019
  • Bitcoin is a cryptocurrency with characteristics such as de-centralization and distributed ledger, and these features are maintained through a mining system called "proof of work". In the mining system, mining difficulty is adjusted to keep the block generation time constant. However, Bitcoin's current method to update mining difficulty does not reflect the future hash power, so the block generation time can not be kept constant and the error occurs between designed time and real time. This increases the inconsistency between block generation and real world and causes problems such as not meeting deadlines of transaction and exposing the vulnerability to coin-hopping attack. Previous studies to keep the block generation time constant still have the error. In this paper, we propose a machine-learning based method to reduce the error. By training with the previous hash power, we predict the future hash power and adjust the mining difficulty. Our experimental result shows that the error rate can be reduced by about 36% compared with the current method.

PKG-VUL: Security Vulnerability Evaluation and Patch Framework for Package-Based Systems

  • Lee, Jong-Hyouk;Sohn, Seon-Gyoung;Chang, Beom-Hwan;Chung, Tai-Myoung
    • ETRI Journal
    • /
    • v.31 no.5
    • /
    • pp.554-564
    • /
    • 2009
  • In information security and network management, attacks based on vulnerabilities have grown in importance. Malicious attackers break into hosts using a variety of techniques. The most common method is to exploit known vulnerabilities. Although patches have long been available for vulnerabilities, system administrators have generally been reluctant to patch their hosts immediately because they perceive the patches to be annoying and complex. To solve these problems, we propose a security vulnerability evaluation and patch framework called PKG-VUL, which evaluates the software installed on hosts to decide whether the hosts are vulnerable and then applies patches to vulnerable hosts. All these operations are accomplished by the widely used simple network management protocol (SNMP). Therefore, system administrators can easily manage their vulnerable hosts through PKG-VUL included in the SNMP-based network management systems as a module. The evaluation results demonstrate the applicability of PKG-VUL and its performance in terms of devised criteria.

A Study on The Managing Practices in SLM for Multimedia System (멀티미디어 시스템 정보보호수준관리를 위한 관리형 프랙티스에 관한 연구)

  • Kim, Tai-Hoon;Cho, Sung-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.6
    • /
    • pp.673-680
    • /
    • 2008
  • Multimedia system security can be categorized into groups such as protection of multimedia asset itself and protection of multimedia systems which can process multimedia asset. Divided consideration for these two factors will not hurt the importance of security management. In this paper, managing practices for keeping security level of multimedia systems are induced and categorized.

  • PDF