Abstract:
Disclosed is an encryption apparatus applying a KASUMI encryption algorithm. In the encryption apparatus, a round circuit is constructed through combination of an FL block with an FO block. The FL and FO blocks separate a secret key defined in the KASUMI encryption algorithm and provided from a secret key scheduler and 64-bit text data into 32-bit data, respectively, and perform specified encryption operation functions. The FO block is constructed through a multistage pipeline using a plurality of pipeline registers. The encryption apparatus has a low power consumption, and is small-sized in comparison to the conventional encryption apparatus using the MISTY or DES encryption algorithm. Also, the encryption apparatus can be applied to portable terminals and high-performance servers that require the low power consumption and the small size.
Abstract:
PURPOSE: A pseudo-random generator using a block password having an SPN structure and a method thereof are provided to improve a stability side by changing a key value through an update algorithm each time a random is generated. CONSTITUTION: A reseeding module(102) collects a noise suited to each platform. The reseeding module(102) generates a key value based on noise information. The key value is used as an input of a random function. A pseudo-random generating module(104) includes two random function value converters. The pseudo-random generating module(104) uses the key value and a state value as inputs of the first random function value converter to generate the first random function value. The pseudo-random generating module(104) uses the first random function value and the key value as inputs of the second random function value converter to generate the first random function value to generate the second random function value. The pseudo-random generating module(104) outputs the second random function value as a pseudo-random value.
Abstract:
PURPOSE: A nonlinear random number series generation device is provided to receive different number series from an FCSR(Feedback with Carry Shift Register), and to search for a corresponding random number series in an S-BOX(Substitution Box), a table of a random number having a good SAC(Strict Avalanch Criterion) characteristic so that it can be applied at a digital signature or an identification check in an electronic document transaction system. CONSTITUTION: The device comprises a plurality of FCSRs(210), a S-BOX(220), and a logic operator(230). The FCRSs(210) generate 8 bit nonlinear random number series, and transmit the 8 bit nonlinear random series to the logical operator(230). The logical operator(230) searches for a nonlinear random series in the S-BOX(220) corresponding to the transmitted 8 bit nonlinear random series. For example, in a case that a 8 bit binary value of the 8 bit nonlinear random number series is "abcdefgh", the logical operator(230) selects a row in the S-BOX(220) corresponding to the former 4 bit("abcd") and a column in the S-BOX(220) corresponding to the latter 4 bit("efgh"). Then, the logical operator(230) generates a 8 bit random number at a point where the column and the row cross in the S-BOX(220).
Abstract:
본 발명은 SHA-1 해쉬값 계산을 위해 64바이트 데이터 세그먼트로부터 4바이트 변수들로 구성된 배열을 생성하는 과정에서, 배열 중에서 배열값이 상수인 항목을 검출하는 단계 및 배열값이 상수인 항목을 배열에서 제외하는 단계를 포함하는 것을 특징으로 한다.
Abstract:
디지털 증거 자료 수집을 위한 데이터 분석 및 증거화 방법과 시스템이 개시된다. 데이터의 수집 대상이 되는 대상 장치로부터 사용 히스토리 정보를 수집하여 분석하고, 사용 히스토리 정보에 기초하여 인터넷상의 데이터를 다운로드하여 수집하고, 수집된 데이터에 대한 시점확인 토큰 발급을 요청하여 발급된 시점확인 토큰을 수령하는 온라인 데이터 포렌식 서버, 시점확인 토큰 발급 요청에 대응하여 수집된 데이터에 대한 시점확인 토큰을 발급하여 온라인 데이터 포렌식 서버로 제공하는 시점확인 토큰 발급 서버 및 수집된 데이터를 저장하는 저장 장치를 포함하여 데이터 분석 및 증거화 시스템를 구성한다. 본 발명에 따른 방법 및 시스템을 이용할 경우에는 수집되는 온라인 데이터에 대해 시점확인 토큰을 발급 받음으로써, 수집된 온라인 데이터가 과거 특정 시점으로부터 수집 시점까지 온라인 상의 해당 주소에 존재했으며, 수집 시점 이후로부터 수집된 데이터가 변경되지 않았음을 용이하게 증명할 수 있다.
Abstract:
PURPOSE: An e-discovery device of an information leakage preventing system is provided to prevent the information leakage within a company and is provided to be prepared with the cause analysis and responding function of an information leakage accident when the information leakage accident is occurred. CONSTITUTION: A common block (200) comprises a leakage accident preparation module and a leakage accident post response module. The leakage accident post response module prepares with the data for investigating the cause of the information leakage accident. The leakage accident post response module performs the investigation about the information leakage accident. A litigation exclusive block (210) calculates the evidence of litigation of the information leakage into the predetermined format. The litigation exclusive block visualizes the calculated evidence. The litigation exclusive block destroys the information about the calculated evidence based on the predetermined policy. [Reference numerals] (100) Integrate PC security block; (120) N/W transmitting signal control block; (140) Physical device security block; (160) Data base security block; (210) Litigation exclusive block; (220) Common block; (230) Leakage accident preparation response module; (240) Leakage accident post response module; (AA) E-discovery; (BB) Information leakage prevention system; (CC) Information management; (D1) Response strategy establishment; (D2) Collection; (D3) Storage; (D4) Process; (D5) Review and analysis; (E1) Calculation; (E2) Sending and breaking; (F1) Physical device use control; (F2) Printer/fax original text storage; (F3) I/O interface access and use information record identification; (G1) File life cycle management; (G2) PMS/personal fire wall/hacking tool detection; (G3) File auto encryption; (G4) File search in a PC; (G5) File access/use logging; (G6) File original text storage; (G7) Main service use logging; (H1) H1 mail attachment file control; (H2) N/W packet monitoring; (H3) Content control; (H4) Key word unit monitor/stop; (H5) File system level detection; (H6) Mail/message logging; (H7) Use control on services; (H8) N/W packet capturing; (I1) DB access control; (I2) DB decoding; (I3) DB access logging
Abstract:
PURPOSE: A security strengthened digital forensic device is provided to protect the user privacy by permitting only the authorized administrator to access to the collected forensic data. CONSTITUTION: A fingerprint registration unit (120) registers the registered fingerprint, which will be registered for the user authorization process, by receiving from the authorized administrator. A fingerprint authorization unit (130) compares the authorized fingerprint, which is received from the user for the user authorization process, with the pre-registered fingerprint. The fingerprint authorization unit performs the user authorization process depending on the satisfaction of the predetermined condition. A database unit (140) stores the forensic data which is collected by the forensic data collecting unit. If the user authorization process succeeds, a forensic data analysis unit (150) analyzes the forensic data which is stored in the database unit. [Reference numerals] (100) Digital forensic device; (11) User computer 1; (111,113,115) Forensic data collection unit; (120) Fingerprint registration unit; (13) User computer 2; (130) Fingerprint authorization unit; (140) Database unit; (15) User computer N; (150) Forensic data analysis unit; (20) Registration fingerprint; (30) Authorization fingerprint
Abstract:
PURPOSE: A file search device using attribute information and a method thereof are provided to suggest files corresponding to a user query in real time by generating a multi index database according to each attribute of the files. CONSTITUTION: An attribute extracting unit(104) extracts attribute information through the analysis of files, a distributed index generating unit(106) generates an index database by attribute by using the attribute information, and a storage unit(110) stores the index database. If a query is inputted, a file search unit(114) searches for the storage unit for an index database corresponding to the query to generate a search result. If the files are not compressed files, a file classifying unit(100) supplies the files to an attribute extracting unit. If the files are compressed files, a decompressing unit(102) decompresses the files to supply the same to the attribute extracting unit. [Reference numerals] (100) File classifying unit; (102) Decompressing unit; (104) Attribute extracting unit; (106) Distributed index generating unit; (108) Distributed index managing unit; (112) Query analyzing unit; (114) File search unit; (116) Graphic output unit; (118) Doubtful file processing unit
Abstract:
PURPOSE: A familiarity calculating device and a method thereof are provided to accurately calculate familiarity between a user and an interlocutor by calculating the familiarity based on time importance and a weighted value. CONSTITUTION: An information extracting unit(120) extracts a communication use record for communication with contact information in a wireless terminal. A weighted value setting unit(122) sets a weighted value to each contact in the contact information and the communication use record. A time importance setting unit(124) sets up time importance to the communication use record based on service execution time of the communication use record. A familiarity calculating unit(126) calculates familiarity by the communication use record based on the time importance and the weighted value to calculate familiarity between a user of the wireless terminal and an interlocutor corresponding to the contact information. [Reference numerals] (100) Communication history DB; (110) Address list DB; (120) Information extracting unit; (122) Weighted value setting unit; (124) Time importance setting unit; (126) Familiarity calculating unit; (128) Display unit