• Title/Summary/Keyword: key exposure protection

Search Result 38, Processing Time 0.021 seconds

The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution (기업비밀유통을 위한 MSEC 기반 그룹 키 관리 프로토콜 설계와 구현 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.87-110
    • /
    • 2010
  • Recently competitive Korean companies are suffered from financial loss due to illegal exposure of their own proprietary know-how secrets, since it is difficult to watch hidden illegal channels to leak them due to their digitalization. Today the DRM-based system designed to protect such secrets is insufficient to prevent it, since DRM-based protection system cannot defend the intelligent robbery of secrets, in special, employee's robbery. The MSEC is much appropriate to secure secrets against employee's robbery. Our paper notes that IGMP, MSEC and SNMP can work easily together to realize secure system that satisfy strong security condition for prevention from leaking secrets. Since the previous research was on the architectural design for prevention of illegal exposure, this paper proposes the efficient protocol based on MSEC protocol. Our protocol satisfies the strong security conditions that the principles that the secret should be stored/distributed only in an encrypted shape, and should be separated physically from its encryption key, and should be carried in registered mobile storage separate from its processing device, and should be verified in terms of both user and device. Thus this paper proposes both the protocol for secret document distribution and its group key management.

A Study on Key Protection Method based on WhiteBox Cipher in Block Chain Environment (블록체인 환경에서 화이트박스 암호기반 키 보호 기법에 관한 연구)

  • Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.10
    • /
    • pp.9-15
    • /
    • 2019
  • Recently, in the field of next-generation e-commerce and finance, interest in blockchain-based technologies such as Bitcoin and Ethereum is great. Although the security of blockchain technology is known to be secure, hacking incidents / accidents related to cryptocurrencies are being issued. The main causes were vulnerabilities in the external environment, such as taking over login sessions on cryptocurrency wallets, exposing private keys due to malware infection, and using simple passwords. However, private key management recommends general methods such as utilizing a dedicated application or local backup and physical archiving through document printing. In this paper, we propose a white box password-based private key protection scheme. As a result of safety and performance analysis, we strengthened the security against vulnerability of private key exposure and proved the processing efficiency of existing protocol.

Encryption Algorithm Technique for Device's key Protect in M2M environment (M2M 환경의 디바이스 키 보호를 위한 암호 알고리즘 응용 기법)

  • Choi, Do-Hyeon;Park, Jung-Oh
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.343-351
    • /
    • 2015
  • With the diverse services of the current M2M environment being expanded to the organizations, the corporations, and the daily lives, the possibility of the occurrence of the vulnerabilities of the security of the related technologies have become an issue. In order to solve such a problem of the vulnerability of the security, this thesis proposes the technique for applying the cryptography algorithm for the protection of the device key of the M2M environment. The proposed technique was based on the elliptic curve cryptography Through the key exchange and the signature exchange in the beginning, the security session was created. And the white box cipher was applied to the encryption that creates the white box table using the security session key. Application results cipher algorithm, Elliptic Curve Cryptography provides a lightweight mutual authentication, a session key for protecting the communication session and a conventional white-box cipher algorithm and was guaranteed the session key used to encrypt protected in different ways. The proposed protocol has secure advantages against Data modulation and exposure, MITM(Man-in-the-middle attack), Data forgery and Manipulation attack.

Numerical and experimental analysis on the axial compression performance of T-shaped concrete-filled thin-walled steel

  • Xuetao Lyu;Weiwei Wang;Huan Li;Jiehong Li;Yang Yu
    • Steel and Composite Structures
    • /
    • v.50 no.4
    • /
    • pp.383-401
    • /
    • 2024
  • The research comprehensively studies the axial compression performance of T-shaped concrete-filled thin-walled steel tubular (CTST) long columns after fire exposure. Initially, a series of tests investigate the effects of heating time, load eccentricity, and stiffeners on the column's performance. Furthermore, Finite Element (FE) analysis is employed to establish temperature and mechanical field models for the T-shaped CTST long column with stiffeners after fire exposure, using carefully determined key parameters such as thermal parameters, constitutive relations, and contact models. In addition, a parametric analysis based on the numerical models is conducted to explore the effects of heating time, section diameter, material strength, and steel ratio on the axial compressive bearing capacity, bending bearing capacity under normal temperature, as well as residual bearing capacity after fire exposure. The results reveal that the maximum lateral deformation occurs near the middle of the span, with bending increasing as heating time and eccentricity rise. Despite a decrease in axial compressive load and bending capacity after fire exposure, the columns still exhibit desirable bearing capacity and deformability. Moreover, the obtained FE results align closely with experimental findings, validating the reliability of the developed numerical models. Additionally, this study proposes a simplified design method to calculate these mechanical property parameters, satisfying the ISO-834 standard. The relative errors between the proposed simplified formulas and FE models remain within 10%, indicating their capability to provide a theoretical reference for practical engineering applications.

Assessment of Occupational Health Risks for Maintenance Work in Fabrication Facilities: Brief Review and Recommendations

  • Dong-Uk Park;Kyung Ehi Zoh;Eun Kyo Jeong;Dong-Hee Koh;Kyong-Hui Lee;Naroo Lee;Kwonchul Ha
    • Safety and Health at Work
    • /
    • v.15 no.1
    • /
    • pp.87-95
    • /
    • 2024
  • Background: This study focuses on assessing occupational risk for the health hazards encountered during maintenance works (MW) in semiconductor fabrication (FAB) facilities. Objectives: The objectives of this study include: 1) identifying the primary health hazards during MW in semiconductor FAB facilities; 2) reviewing the methods used in evaluating the likelihood and severity of health hazards through occupational health risk assessment (OHRA); and 3) suggesting variables for the categorization of likelihood of exposures to health hazards and the severity of health effects associated with MW in FAB facilities. Methods: A literature review was undertaken on OHRA methodology and health hazards resulting from MW in FAB facilities. Based on this review, approaches for categorizing the exposure to health hazards and the severity of health effects related to MW were recommended. Results: Maintenance workers in FAB facilities face exposure to hazards such as debris, machinery entanglement, and airborne particles laden with various chemical components. The level of engineering and administrative control measures is suggested to assess the likelihood of simultaneous chemical and dust exposure. Qualitative key factors for mixed exposure estimation during MW include the presence of safe operational protocols, the use of air-jet machines, the presence and effectiveness of local exhaust ventilation system, chamber post-purge and cooling, and proper respirator use. Using the risk (R) and hazard (H) codes of the Globally Harmonized System alongside carcinogenic, mutagenic, or reprotoxic classifications aid in categorizing health effect severity for OHRA. Conclusion: Further research is needed to apply our proposed variables in OHRA for MW in FAB facilities and subsequently validate the findings.

A Design of MILENAGE Algorithm-based Mutual Authentication Protocol for The Protection of Initial Identifier in LTE (LTE 환경에서 초기 식별자를 보호하기 위한 MILENAGE 알고리즘 기반의 상호인증)

  • Yoo, Jae-hoe;Kim, Hyung-uk;Jung, Yong-hoon
    • Journal of Venture Innovation
    • /
    • v.2 no.1
    • /
    • pp.13-21
    • /
    • 2019
  • In LTE environment, which is 4th generation mobile communication systems, there is concern about private information exposure by transmitting initial identifier in plain text. This paper suggest mutual authentication protocol, which uses one-time password utilizing challenge-response and AES-based Milenage key generation algorithm, as solution for safe initial identification communication, preventing unique identification information leaking. Milenage key generation algorithm has been used in LTE Security protocol for generating Cipher key, Integrity key, Message Authentication Code. Performance analysis evaluates the suitability of LTE Security protocol and LTE network by comparing LTE Security protocol with proposed protocol about algorithm operation count and Latency.Thus, this paper figures out initial identification communication's weak points of currently used LTE security protocol and complements in accordance with traditional protocol. So, it can be applied for traditional LTE communication on account of providing additional confidentiality to initial identifier.

Over-expression of Cu/ZnSOD Increases Cadmium Tolerance in Arabidopsis thaliana

  • Cho, Un-Haing
    • Journal of Ecology and Environment
    • /
    • v.30 no.3
    • /
    • pp.257-264
    • /
    • 2007
  • Over-expression of a copper/zinc superoxide dismutase (Cu/ZnSOD) resulted in substantially increased tolerance to cadmium exposure in Arabidopsis thaliana. Lower lipid peroxidation and $H_2O_2$ accumulation and the higher activities of $H_2O_2$ scavenging enzymes, including catalase (CAT) and ascorbate peroxidase (APX) in transformants (CuZnSOD-tr) compared to untransformed controls (wt) indicated that oxidative stress was the key factor in cadmium tolerance. Although progressive reductions in the dark-adapted photochemical efficiency (Fv/Fm) and quantum efficiency yield were observed with increasing cadmium levels, the chlorophyll fluorescence parameters were less marked in CuZnSOD-tr than in wi. These observations indicate that oxidative stress in the photosynthetic apparatus is a principal cause of Cd-induced phytotoxicity, and that Cu/ZnSOD plays a critical role in protection against Cd-induced oxidative stress.

Key Determinants of Dissatisfaction on COVID-19 Contact Tracing and Exposure Notification Apps (COVID-19 접촉추적과 노출알림 앱사용자의 항의 및 불만요인 탐색)

  • Leem, Byung-hak;Hong, Han-Kook
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.9
    • /
    • pp.176-183
    • /
    • 2021
  • Digital medical technology is very effective and at the same time faces the challenge of protecting privacy. However, for contact tracking and exposure notification apps in COVID-19 environment, there is always a trade-off between privacy measures and the effectiveness of the app's use. Today, many countries have developed and used contact tracking and exposure notification apps in various forms to prevent the spread of COVID-19, but the suspicion of digital surveillance (digital panopticon) is unavoidable. Therefore, this study aims to identify the factors of personal information infringement and dissatisfaction through text mining analysis by extracting user reviews of "Self-Quarantine Safety Protection" in Korea. As a result of the text mining analysis, we derived four groups, 'Address recognition error', 'Exit warning error', 'Access error', and 'App. program error'. Since 'Address recognition error' and 'Exit warning error' can give the app users a strong perception that they are keeping under surveillanc by the app, transparent management of personal information protection and consent procedures related to personal information collection are required. In addition, if the other two groups are not corrected immediately due to an error in an app function or a program bug, the complaints of users can be maximized and a protest against the monitor can be raised.

Risk Assessment for Identifying Maximum Level of Hazardous Chemicals in Foods (유해물질의 식품기준 설정시 위해평가)

  • Lee, Hyo-Min;Jung, Ki-Hwa
    • Journal of Food Hygiene and Safety
    • /
    • v.23 no.1
    • /
    • pp.80-84
    • /
    • 2008
  • Maximum level of hazardous chemicals in foods can be settled after overall investigation of toxicological database, the representative exposure assessment, risk level on the present exposure level, the need of maximum level establishment, making of maximum level scenario proposed under consumer protection and verification of contamination reduction method and review of application efficiency on maximum level for risk management. The maximum level should be needed when the risk value of specific chemical caused by food ingestion was high and chronic human exposure was predicted continuously unless the maximum level exists. The key role of the risk assessment is to improve the efficiency of the risk management to reduce the present risk level and make the risk management policy scientifically by setting the representative result of the risk assessment.

Uncertainty Analysis and Application to Risk Assessment (위해성평가의 불확실도 분석과 활용방안 고찰)

  • Jo, Areum;Kim, Taksoo;Seo, JungKwan;Yoon, Hyojung;Kim, Pilje;Choi, Kyunghee
    • Journal of Environmental Health Sciences
    • /
    • v.41 no.6
    • /
    • pp.425-437
    • /
    • 2015
  • Objectives: Risk assessment is a tool for predicting and reducing uncertainty related to the effects of future activities. Probability approaches are the main elements in risk assessment, but confusion about the interpretation and use of assessment factors often undermines the message of the analyses. The aim of this study is to provide a guideline for systematic reduction plans regarding uncertainty in risk assessment. Methods: Articles and reports were collected online using the key words "uncertainty analysis" on risk assessment. Uncertainty analysis was conducted based on reports focusing on procedures for analysis methods by the World Health Organization (WHO) and U.S. Environmental Protection Agency (USEPA). In addition, case studies were performed in order to verify suggested methods qualitatively and quantitatively with exposure data, including measured data on toluene and styrene in residential spaces and multi-use facilities. Results: Based on an analysis of the data on uncertainty, three major factors including scenario, model, and parameters were identified as the main sources of uncertainty, and tiered approaches were determined. In the case study, the risk of toluene and styrene was evaluated and the most influential factors were also determined. Five reduction plans were presented: providing standard guidelines, using reliable exposure factors, possessing quality controls for analysis and scientific expertise, and introducing a peer review system. Conclusion: In this study, we established a method for reducing uncertainty by taking into account the major factors. Also, we showed a method for uncertainty analysis with tiered approaches. However, uncertainties are difficult to define because they are generated by many factors. Therefore, further studies are needed for the development of technical guidelines based on the representative scenario, model, and parameters developed in this study.