• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.035 seconds

A D-H type Public Key Distribution System using a Normal Basis GF($2^m$) (GF($2^m$ ) 의 정규기저를 사용한 D-H형 공용키이분배 시스템)

  • 이창순
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.1 no.1
    • /
    • pp.29-37
    • /
    • 1991
  • several variants of the Diffie-Hellman public key distribution are examined, and a simkple and relatively secure public key distribution protocol is introduced. Using a normal basis of GF(2), this protocol is implemented, and simulated in software. A program is developed, whereby a normal basis is effectively searched for fost multiplication in GF(2).

Stream Cipher System using Opitical Threshold Generator (광 스레쉬홀드 발생기를 이용한 스트림 암호 시스템)

  • 한종욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.1
    • /
    • pp.15-32
    • /
    • 1997
  • 본 논문에서는 스트림 암호 시스템에서 사용이 되는 LFSR 을 이용한 이진 수열 발생기중 하나인 Threshold 발생기에 대한 광학적 구현 방법을 새로이 제안하였다. 광학적 구현을 위하여 LCD를 이용하므로서 LFSR 및 Mod 덧셈 연산을 위한 각 비트 값을 표현, 2차원 처리가 가능하게 하였다. Thredshold 발생기의 LFSR기능은 Shdow Casting 기법을 이용하여, 또한 XOR 연산 및 내적 계산을 위한 MOD덧셈 연산은 LCD 가 갖고 있는 편광 특성을 이용하여 광학적으로 구현하였다. 특히 본 논문에서는 Mod 2 덧셈 연산을 위한 새로운 광학적 구현 방법인 RSPM 을 제안하므로서 연산 결과 값 측정과 LCD 상의 데이타 값 표현 과정을 제외한 전 부분을 완전한 광학적 방법으로 처리가 가능하게 하였다. 본 논문에서 제안한 광 Threshold 암호 시스템은 기존의 전자적인 H/W 구현 방법에서 문제가 되어오던 Tapping Point의 개수에 대한 한계성을 극복할 수 있는 장점을 지니고 있으며, 또한 2차원 데이타인 영상용 암호화 시스템의 광학적 구현에 그 응용이 가능하다.

Development of Hash Algorithm and Its Application to the Authentication System for Digital Mobile Communication (해쉬 알고리듬 개발 및 디지털 이동통신을 위한 인증 시스템에의 응용)

  • 이국희;이상곤;정원영;김태근;문상재
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.8 no.4
    • /
    • pp.111-126
    • /
    • 1998
  • 이동통신에서의 사용자 인증 서비스는 통화도용 방지와 신뢰성 있는 과금을 위한 중요한 보호서비브이다. 본 논문에서는 해쉬 함수를 개발하고 이를 IS-95A 인증시스템의 인증 알고리듬과 인증 키생성 알고리듬을 적용하였다. 특히 인증 알고리듬을 활용하여 인증 키 생성알고리듬을 oracle 해쉬함수의 형태로 구현함으로써 인증 시스템의 높은 안전성과 간결성ㅇ르 동시에 성취하였다. 그리고 통계적분석 기법을 사용하여 개발된 알고리듬의 출력 특성을 분석한다.

A Method on Maintaining Consistency of Certificates in public Key Infrastructure using DNS (DNS를 사용한 공개키 인증서의 일치성 보장에 관한연구)

  • 석우진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.2
    • /
    • pp.3-12
    • /
    • 2000
  • In this paper we propose a new algorithm which resolves the inconsistency problems occurring when DNS severs are employed as elements of PKI. The inconsistency may take place between primary name servers and secondary name servers and between cached certificate and original certificate. The former can be removed by adapting RFC 1996 NOTIFY opcode for DNS. In order to eliminate the latter type of inconsistency we develope a new algorithm which is implemented with two additional RR(Resource Record). The present algorithm is designed such that DNS contacts the destination DNS prior to returning public key to users. Therefore the inconsistency problem occurring when DNS is operated as PKI can be eliminated by using the proposed adaptation and algorithm.

Secret Key and Tag Generation for IIoT Systems Based on Edge Computing

  • Koh, Giheon;Yu, Heungsik;Kim, Sungun
    • Journal of Multimedia Information System
    • /
    • v.8 no.1
    • /
    • pp.57-60
    • /
    • 2021
  • Industry 4.0 is continuous automation by applying the latest smart technologies to traditional manufacturing industries. It means that large-scale M2M (Machine-to-Machine) communication and IoT (Internet of Things) technologies are well integrated to build efficient production systems by analyzing and diagnosing various issues without human intervention. Edge computing is widely used for M2M services that handle real-time interactions between devices at industrial machinery tool sites. Here, secure data transmission is required while interacting. Thus, this paper focused on a method of creating and maintaining secret key and security tag used for message authentication between end-devices and edge-device.

Comprehensive Analysis and Evaluation of Mobile S-MAC Protocol in Wireless Sensor Network

  • Alanazi, Adwan Alownie
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.358-366
    • /
    • 2022
  • Wireless sensor networks (WSN) are becoming widely used in collecting and sensing information in different fields such as in the medical area, smart phone industry and military environment. The main concern here is reducing the power consumption because it effects in the lifetime of wireless sensor during commutation because it may be work in some environment like sensor in the battlefields where is not easy to change the battery for a node and that may decrease the efficiency of that node and that may affect the network traffic may be interrupted because one or more nodes stop working. In this paper we implement, simulate, and investigate S-MAC protocol with mobility support and show the sequence of events the sender and receiver go through. We tested some parameters and their impacts of on the performance including System throughput, number of packets successfully delivered per second, packet delay, average packet delay before successful transmission.

Education in Cyberspace: University as Universality

  • Shapoval, Oksana;Kotlyaria, Svitlana;Medvedieva, Alla;Lishafai, Oleksandr;Barabash, Oleh;Oleksyuk, Oksana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.333-337
    • /
    • 2021
  • The article reveals the essence of cyber socialization influencing the process of education and development. The general and potential possibilities of cyber socialization in the process of using the cyberspace of the Internet environment are presented. The sudden transition to distance learning in the spring of 2020 put the pedagogical community in the face of problems related to the content, organizational and methodological basis of the educational process. During the training in distance mode, a rich experience was gained in the use of information and communication technologies. The article discusses the techniques and methods of teaching using the capabilities of information and communication and digital technologies.

An Improved Pseudorandom Sequence Generator and its Application to Image Encryption

  • Sinha, Keshav;Paul, Partha;Amritanjali, Amritanjali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.4
    • /
    • pp.1307-1329
    • /
    • 2022
  • This paper proposes an improved Pseudorandom Sequence Generator (PRSG) based on the concept of modular arithmetic systems with non-integral numbers. The generated random sequence use in various cryptographic applications due to its unpredictability. Here the mathematical model is designed to solve the problem of the non-uniform distribution of the sequences. In addition, PRSG has passed the standard statistical and empirical tests, which shows that the proposed generator has good statistical characteristics. Finally, image encryption has been performed based on the sort-index method and diffusion processing to obtain the encrypted image. After a thorough evaluation of encryption performance, there has been no direct association between the original and encrypted images. The results show that the proposed PRSG has good statistical characteristics and security performance in cryptographic applications.

Strategic Business Values of the Blockchain Technology Market to Assist Professionals: Deployment Perspective

  • Waleed Rashideh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.210-226
    • /
    • 2023
  • It is difficult to transform a blockchain initiative from the feasibility stage to the fully commercialized the technology's products or services, especially considering the significant investment required and the lack of studies on the benefits and barriers from deployment perspective. Whereas some organizations have come up with their own solutions to moving beyond the feasibility stage, commercial applications do not yet exist and few organizations are willing to invest beyond the prototype phase and fill in the gap between the expected and actual business value of these types of projects. This study aims to develop a blockchain model using a survey to gather qualitative data on experts' opinions on the deployment of blockchain technology. Our model will measure how business professionals could take advantage of blockchain's disruptive technology to develop business opportunities. This study's contribution is to show blockchain technology's potential strategic business value. The findings from this exploration include the prospective for delivering comprehensions to businesses for different creating investment choices on the embracing of the blockchain technology.

A Study of Criminals Facial Recognition System (범죄자 얼굴 인식 시스템에 관한 연구)

  • Kim, Min-seon;Kim, Hyun-jung;Won, Il-young
    • Annual Conference of KIPS
    • /
    • 2010.11a
    • /
    • pp.1146-1149
    • /
    • 2010
  • 강력 범죄의 심각성이 사회적 이슈가 되면서 효과적인 범죄자 검거의 필요성이 증가되고 있다. 범죄자의 정보 중에서 가장 많이 알려지는 것은 얼굴이다. 따라서 등록되어 있는 범죄자의 얼굴을 자동으로 인식할 수 있는 기술의 연구가 중요해지고 있다. 본 연구는 범죄자 얼굴 인식 시스템에 관한 것이다. 우리는 기존 얼굴인식 알고리즘의 단점인 조명을 개선하여, 범죄자 얼굴 인식률을 향상시키는데 연구를 집중하였다. 제안된 알고리즘의 유용성은 실험을 통하여 검증하였다.