http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
연산자 조작 공격과 피연산자 조작 공격에 대한 기존 CRT-RSA Scheme의 안전성 분석
허순행(Soonhaeng Hur),이형섭(Hyungsub Lee),이현승(Hyunseung Rhee),최동현(Donghyun Choi),원동호(Dongho Won),김승주(Seungjoo Kim) 한국정보보호학회 2009 정보보호학회논문지 Vol.19 No.6
CRT-RSA의 사용이 대중화됨에 따라, CRT-RSA에 대한 보안 또한 중요 이슈가 되었다. 1996년, Bellcore 연구원들에 의해 CRT-RSA가 오류 주입 공격에 취약하다고 밝혀진 이래로, 많은 대응책들이 제안되었다. 첫 번째 대응책은 1999년 Shamir에 의해 제안되었으며, Shamir의 대응책은 오류 검사 기법에 기반을 두고 있다. Shamir의 대응책이 소개된 이후, 오류 검사 기법을 사용하는 많은 대응책들이 제안되었다. 그러나 Shamir의 대응책은 2001년 Joey 등에 의하여 피연산자 조작 공격에 취약함이 밝혀졌으며, 오류 검사 기법 또한 2003년 Yen 등에 의하여 연산자 조작 공격에 취약하다고 알려졌다. 이에 Yen 등은 오류 검사 기법을 사용하지 않고 오류 확산 기법을 사용하여 새로운 대응책을 제안하였으나, Yen 등이 제안한 대응책 또한 2007년에 Yen과 Kim에 의하여 안전하지 않음이 밝혀졌다. 최근에는 Kim 등이 Yen 등의 대응책을 보완한 새로운 대응책을 제안하였으며, Ha 등 또한 오류 확산 기법을 사용한 대응책을 제안하였다. 그러나 Kim 등과 Ha 등이 제안한 대응책들을 포함한 기존 대응책들은 연산자 조작 공격에 대해서는 안전성이 증명되지 않았기 때문에 본 논문에서는 피연산자 조작 공격은 물론, 연산자 조작 공격도 고려하여 지금까지 제안된 대응책들의 안전성을 분석할 것이다. As the use of RSA based on chinese remainder theorem(CRT-RSA) is being generalized, the security of CRT-RSA has been important. Since Bellcore researchers introduced the fault attacks on CRT-RSA, various countermeasures have been proposed. In 1999, Shamir firstly proposed a countermeasure using checking procedure. After Shamir's countermeasure was introduced, various countermeasures based on checking procedure have been proposed. However, Shamir's countermeasure was known to be vulnerable to the modified operand attack by Joey et al. in 2001, and the checking procedure was known to be vulnerable to the modified opcode attack by Yen et al. in 2003. Yen et al. proposed a new countermeasure without checking procedure, but their countermeasure was known to be also vulnerable to the modified operand attack by Yen and Kim in 2007. In this paper, we point out that pre, but countermeasures were vulnerable to the modified operand attack or the modified opcode attack.
Kim, Sungchul,Lee, Sanghyun,Shin, Jinwook,Kim, Youngkyun,Evnouchidou, Irini,Kim, Donghyun,Kim, Young-Kook,Kim, Young-Eui,Ahn, Jin-Hyun,Riddell, Stanley R,Stratikos, Efstratios,Kim, V Narry,Ahn, Kwangs Nature Publishing Group, a division of Macmillan P 2011 NATURE IMMUNOLOGY Vol.12 No.10
Major histocompatibility complex (MHC) class I molecules present peptides on the cell surface to CD8<SUP>+</SUP> T cells, which is critical for the killing of virus-infected or transformed cells. Precursors of MHC class I??presented peptides are trimmed to mature epitopes by the aminopeptidase ERAP1. The US2??US11 genomic region of human cytomegalovirus (HCMV) is dispensable for viral replication and encodes three microRNAs (miRNAs). We show here that HCMV miR-US4-1 specifically downregulated ERAP1 expression during viral infection. Accordingly, the trimming of HCMV-derived peptides was inhibited, which led to less susceptibility of infected cells to HCMV-specific cytotoxic T lymphocytes (CTLs). Our findings identify a previously unknown viral miRNA??based CTL-evasion mechanism that targets a key step in the MHC class I antigen-processing pathway.
Effects of Korean ginseng berry on skin antipigmentation and antiaging via FoxO3a activation
Kim, Juewon,Cho, Si Young,Kim, Su Hwan,Cho, Donghyun,Kim, Sunmi,Park, Chan-Woong,Shimizu, Takahiko,Cho, Jae Youl,Seo, Dae Bang,Shin, Song Seok The Korean Society of Ginseng 2017 Journal of Ginseng Research Vol.41 No.3
Background: The ginseng berry has various bioactivities, including antidiabetic, anticancer, antiinflammatory, and antioxidative properties. Moreover, we have revealed that the active antiaging component of the ginseng berry, syringaresinol, has the ability to stimulate longevity via gene activation. Despite the many known beneficial effects of ginseng, its effects on skin aging are poorly understood. In this study, we investigated the effects of ginseng and the ginseng berry on one of the skin aging processes, melanogenesis, and age-related pigment lipofuscin accumulation, to elucidate the mechanism of action with respect to antiaging. Methods: The human melanoma MNT1 cell line was treated with ginseng root extract, ginseng berry extract, or syringaresinol. Then, the cells were analyzed using a melanin assay, and the tyrosinase activity was estimated. The Caenorhabditis elegans wild type N2 strain was used for the life span assay to analyze the antiaging effects of the samples. A lipofuscin fluorescence assay was performed during 10 passages with the syringaresinol treatment. Results: A 7-d treatment with ginseng berry extract reduced melanin accumulation and tyrosinase activity more than ginseng root extract. These results may be due to the active compound of the ginseng berry, syringaresinol. The antimelanogenic activity was strongly coordinated with the activation of the longevity gene foxo3a. Moreover, the ginseng berry extract had more potent antiaging effects, caused a life span extension, and reduced lipofuscin accumulation. Conclusion: Taken together, our results suggest that these antimelanogenic effects and antiaging effects of ginseng berry mediate the activation of antioxidation-FoxO3a signaling.
Advanced Key-Management Architecture for Secure SCADA Communications
Donghyun Choi,Hakman Kim,Dongho Won,Seungjoo Kim IEEE 2009 IEEE transactions on power delivery Vol.24 No.3
<P>Supervisory control and data-acquisition (SCADA) systems are control systems for many national infrastructures. In the past, SCADA systems were designed without security functionality because of the closed operating environment. However, the security of SCADA systems has become an issue with connection to open networks becoming more common. Any damage to the SCADA system can have a widespread negative effect to society. In this paper, we review constraints and security requirements for SCADA systems and then investigate whether the existing key-management protocols for the SCADA systems satisfy these requirements. Afterward, we propose an advanced key-management architecture fitted for secure SCADA communications. The contributions of our work are two-fold. First, our scheme supports both message broadcasting and secure communication. Second, by evenly spreading much of the total amount of computation across high power nodes (MTU or SUB-MTU), our protocol avoids any potential performance bottleneck of the system while keeping the burden on low power nodes (RTU) at minimal.</P>