• Title/Summary/Keyword: secure design

Search Result 1,832, Processing Time 0.029 seconds

Design and Implementation of a Client Mail Security System for Secure Mail Exchange using Public Key Infrastructure (공개키 기반 구조에서 안전한 메일 전송을 위한 클라이언트 메일 보안 시스템 설계 및 구현)

  • 정창렬;고진광
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.1
    • /
    • pp.149-157
    • /
    • 2003
  • Recently, the Internet enhanced by development of IT makes the processing and exchanging of information, As the Internet is sending and receiving digitized documents over the Internet e-mail system. The security of document information is being threated when exchanging digitized documents over an open network such as the Internet. The degree of threat is even higher when sensitive documents are involved Therefore, in this paper, the secure e-mail system on a client is designed and implemented in order to make secure exchanging of digitized documents. By using the public key infrastructure in which encrypted mail transmission, proof of delivery and integrity of the message are garanted, unauthorized manipulation, illegal acquisition and mutual authentication problem can be prevented in order to secure the document information which is crucial and sensible when exchanging the digitized document over the Internet. Futhenmore, by using the SET protocol based on public key cryptography, the secure mail system is designed and implemented in order for the users not having any professional knowledge to deal with the system easily and friendly in GUI environment.

Design and Implementation of Virtual and Invisible Private Disk (VIPDISK) having Secure Storage Device (보안 저장장치를 구비한 가상의 인비저블한 보안 디스크 (VIPDISK) 설계 및 구현)

  • Quan, Shan Guo;Kwon, Yong-Gu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.781-792
    • /
    • 2015
  • This paper proposes a virtual and invisible private disk (VIPDISK) technology equipped with the secure storage devices. As a software based security technology, it can create hidden partitions on any data storage device which can not be identified by the windows OS, so the program running on it, does not have any evidence of the existence of the hidden storage space. Under inactive state, it maintains an unexposed secure partition which can only be activated with a matching combination of a unique digital key and a user password to open the decryption tool. In addition, VIPDISK can store data to secure storage device with real-time encryption, it is worry-free even in the case of lost or theft. Simulation results show that VIPDISK provides a much higher level of security compared to other existing schemes.

The Proposed of the Encryption Method and Designed of the Secure Key Using Initial Bad Block Information Physical Address of NAND Flash Memory (NAND Flash Memory의 초기 Bad Block 정보 물리주소를 이용한 보안키 설계와 암호화 기법 제안)

  • Kim, Seong Ryeol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.12
    • /
    • pp.2282-2288
    • /
    • 2016
  • Security key generation method by hardware or software related techniques have been variously proposed. This study analyzed the existing security key generation techniques, and propose the design of a new NAND Bad block based security key(NBSK) using a Bad Block information in the NAND flash memory, and propose a new encryption method using the same. Bad Block present in the NAND flash memory is also generated during production and sometimes occur during operations. Initial Bad Block information generated during production is not changed, Bad Block information that may occur during operation has a characteristic that can be changed periodically. This study is designed of the new secure key using initial Bad Block information physical address generated during manufacturing a NAND flash memory, and proposed of the new encryption method. With the proposed key and method can satisfy the general security characteristics, such as the creation and distribution of the secure key authentication and confidentiality and the simplicity of the security key.

A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model

  • Lu, Yang;Li, Jiguo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1502-1522
    • /
    • 2019
  • Leakage of secret keys may be the most devastating problem in public key cryptosystems because it means that all security guarantees are missing. The forward security mechanism allows users to update secret keys frequently without updating public keys. Meanwhile, it ensures that an attacker is unable to derive a user's secret keys for any past time, even if it compromises the user's current secret key. Therefore, it offers an effective cryptographic approach to address the private key leakage problem. As an extension of the forward security mechanism in certificate-based public key cryptography, forward-secure certificate-based signature (FS-CBS) has many appealing merits, such as no key escrow, no secure channel and implicit authentication. Until now, there is only one FS-CBS scheme that does not employ the random oracles. Unfortunately, our cryptanalysis indicates that the scheme is subject to the security vulnerability due to the existential forgery attack from the malicious CA. Our attack demonstrates that a CA can destroy its existential unforgeability by implanting trapdoors in system parameters without knowing the target user's secret key. Therefore, it is fair to say that to design a FS-CBS scheme secure against malicious CAs without lying random oracles is still an unsolved issue. To address this problem, we put forward an enhanced FS-CBS scheme without random oracles. Our FS-CBS scheme not only fixes the security weakness in the original scheme, but also significantly optimizes the scheme efficiency. In the standard model, we formally prove its security under the complexity assumption of the square computational Diffie-Hellman problem. In addition, the comparison with the original FS-CBS scheme shows that our scheme offers stronger security guarantee and enjoys better performance.

The Design and Implementation of Module supporting Trusted Channel in Secure Operating System Environment (보안운영체제 환경에서의 신뢰채널 지원을 위한 모듈의 설계 및 구현)

  • 유준석;임재덕;나재훈;손승원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.3-12
    • /
    • 2004
  • Secure operating system is a special operating system that integrates some security functions(i.e. access control, user authentication, audit-trail and etc.) with normal operating system in order to protect system from various attacks. But it doesn't consider my security of network traffic. To guarantee the security of the whole system, network traffic must be protected by a certain way and IPsec is a representative technology for network security. However, it requires administrator's carefulness in managing security policies and the key management mechanism is very heavy as well as complicated. Moreover, it doesn't have a suitable framework for delivery of security information for access control mechanism. So we propose a simple trusted channel mechanism for secure communication between secure operating systems. It provides confidentiality md authentication for network traffic and ability to deliver security information. It is implemented at the kernellevel of IP layer and the simplicity of the mechanism can minimize the overhead of trusted channel processing.

Design and Performance Evaluation of the Secure Transmission Module for Three-dimensional Medical Image System based on Web PACS (3차원 의료영상시스템을 위한 웹 PACS 기반 보안전송모듈의 설계 및 성능평가)

  • Kim, Jungchae;Yoo, Sun Kook
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.3
    • /
    • pp.179-186
    • /
    • 2013
  • PACS is a medical system for digital medical images, and PACS expand to web-based service using public network, DICOM files should be protected from the man-in-the-middle attack because they have personal medical record. To solve the problem, we designed flexible secure transmission system using IPSec and adopted to a web-based three-dimensional medical image system. And next, we performed the performance evaluation changing integrity and encryption algorithm using DICOM volume dataset. At that time, combinations of the algorithm was 'DES-MD5', 'DES-SHA1', '3DES-MD5', and '3DES-SHA1, and the experiment was performed on our test-bed. In experimental result, the overall performance was affected by encryption algorithms than integrity algorithms, DES was approximately 50% of throughput degradation and 3DES was about to 65% of throughput degradation. Also when DICOM volume dataset was transmitted using secure transmission system, the network performance degradation had shown because of increased packet overhead. As a result, server and network performance degradation occurs for secure transmission system by ensuring the secure exchange of messages. Thus, if the secure transmission system adopted to the medical images that should be protected, it could solve server performance gradation and compose secure web PACS.

A Life Cycle Model for Computer Integrated Manufacturing Systems (컴퓨터통합제조시스템을 위한 수명주기 모형)

  • 이대주
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.21 no.3
    • /
    • pp.127-141
    • /
    • 1996
  • In this paper, we propose a 7-phase life cycle model which applies to Computer Integrated Manufacturing systems. The model emphasizes product design and manufacturing design activities of CIM to secure the critical success factors of CIM systems such as high quality, adaptability, productivity, and flexibility. It is argued that the product design aspect would be divided into three phases-conceptual design, embodiment design, and detialed design. The conceptual design phase is to build a conceptual model of the product based on requirements and specifications which reflect "the voice of the customer". THe embodiment design phase utilizes specific design tools such as DFM, CAE, and CAD, and results in a concrete model of the product and parts. The detailed design phase is to crete a working prototype of the product and design tools such as DFA. CAD and CAM are employed in this phase. The output of the product design activity is to be the input for the manufacturing design activity. Using the proposed model, one can effectively and efficiently manufacture a high-quality, low-cost product with short delivery time, and above all achieve customer'ssatisfaction.isfaction.

  • PDF

Quayside Mooring System Design of Prelude FLNG for Extreme Environmental Condition (극한환경조건에 대한 프릴루드 FLNG 안벽계류시스템 설계)

  • Cho, Jin-Woog;Yun, Sang-Woong;Kim, Bong-Jae;Choi, Jae-Woong;Kim, Booki;Yang, Seung-Ho
    • Journal of Ocean Engineering and Technology
    • /
    • v.32 no.1
    • /
    • pp.21-27
    • /
    • 2018
  • The design and analysis of a quayside mooring system for safe mooring of Prelude FLNG under extreme environmental conditions were carried out. The design of the mooring system considered the yard operation conditions and maximum wind speed during a typhoon. In order to secure the mooring safety of Prelude FLNG under an extreme environment, a special steel structure was designed between the quay and Prelude FLNG to maintain the distance from the quay to a certain extent to avoid a collision with the inclined base. The mooring safety was also ensured by installing additional new parts on the quay. A mooring analysis and mooring safety review were performed with more rigorous modeling considering the nonlinearity of the mooring rope and fender. In order to secure additional safety of the mooring system under extreme environmental conditions, a safety assessment was conducted on the failures of the mooring components proposed in the marine mooring guidelines. Based on the results of the mooring analysis, it was confirmed that the Prelude FLNG can be safely moored even under the extreme conditions of typhoons, and a worst case scenario analysis verified that the mooring system design was robust enough. The proposed mooring analysis and design method will provide a basis for the safe mooring of ultra-large floating offshore structures of similar size in the future.

A Study on the Development of Planting Design Method for Creating an Ecological Park -Focus on a Correlation between Visual Preference and Ecological Diversity- (생태공원조성을 위한 식재설계방법의 개발 -시각적 선호도와 생태적 다양성의 상호관련성을 중심으로-)

  • 김귀곤;조동길;차영두;황기현
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.27 no.5
    • /
    • pp.12-24
    • /
    • 2000
  • This study seeks to find an approach tool that allows to consider both ecological and visual aspect in developing an ecological space. Main objective of this study is to develop a planting design method in consideration of correlation between high visual preference and ecological diversity. To this end, an integrated method based on visual design principles and landscape ecological principles was developed first. Then study areas of 20 natural areas and 10 urban areas were selected to survey and analyze visual preference and ecological diversity. The result showed that scale is an element that has the greatest impact on visual preference. In areas with high ecological diversity, scale and connectivity had the biggest impact. In order to have a planting design desirable visually and ecologically based on these factors, it may be divided into following three issues.(1) In oder to increase ecological diversity in areas with strong visual preference, a priority should be given to introduce techniques promoting harmony among dominant species of various scales and other species. At the same time, there should be efforts to secure connectivity. (2) To improve visual preferences in areas with high ecological diversity, close-range, medium-range, and distant landscapes should be ensured by aligning colors and connectivity of various scales with other factors. (3) Also, a target area should be developed into a visually preferred and ecologically sound area by supplementing form and interlocking issues and identifying the spirit of the place. This study offers a way to improve visual preference and promote ecological diversity indeveloping ecological parks for the future. In landscape planning and design, it is important to secure various scales and connectivity as high-priority principles.

  • PDF

Securing of Potential Users of Smartphone UI due to the Philosophy of its Design (스마트 폰 UI의 디자인 철학에 따른 잠재적 사용자 확보)

  • Kim, Su-Hee;Oh, Chi-Gyu
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.10
    • /
    • pp.503-513
    • /
    • 2016
  • Innovator and Early Adopter are main clients of smart phone until now, but the silver generation enjoying price stability and the Internet emerges, so a strategy of the importance, systematic classification, and focus of a neglected class is needed. It is necessary to analyze UI that can departmentalize not a neglected class limited to the silver generation but potential users who can be voluntarily users and can secure them. To secure them, the researcher analyzes how Windows, Icons, Mouse Pull-Down-Menus(WIMP) of UI has been applied in the process that skeuomorphism UI of iPhone, Metro UI of MS, and Material UI of Google change. As a result of an analysis, skeuomorphism is not entirely new and has secured potential users slowly with a method to compensate and improve a part that users disregard. As a concept of touch UI, Metro UI considered potential users from the beginning but did not secure them with new and epoch-making UI. However, Material UI of Google compensates the weaknesses of skeuomorphism UI and Metro UI and emphasizes cost-effectiveness, so has developed into UI that can secure final consumers of potential users. Therefore, to secure potential users, it should make users themselves understand why they should use smart phone, and it should approach with more organized studies on UI through feedback of observation and direct talks.