Sang Su Lee
Electronics and Telecommunications Research Institute
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Sang Su Lee.
Ksii Transactions on Internet and Information Systems | 2011
Keonwoo Kim; Sang Su Lee; Dowon Hong; Jae-Cheol Ryou
Digital document file such as Adobe Acrobat or MS-Office is encrypted by its own ciphering algorithm with a user password. When this password is not known to a user or a forensic inspector, it is necessary to recover the password to open the encrypted file. Password cracking by brute-force search is a perfect approach to discover the password but a time consuming process. This paper presents a new method of speeding up password recovery on Graphic Processing Unit (GPU) using a Compute Unified Device Architecture (CUDA). PDF files are chosen as a password cracking target, and the Abode Acrobat password recovery algorithm is examined. Experimental results show that the proposed method gives high performance at low cost, with a cluster of GPU nodes significantly speeding up the password recovery by exploiting a number of computing nodes. Password cracking performance is increased linearly in proportion to the number of computing nodes and GPUs.
international conference on future generation communication and networking | 2007
Sang Su Lee; Ku-Young Chang; Deokgyu Lee; Do Won Hong
In this paper, we discuss a simple encryption scheme in which a secret file is encrypted twice: one by a common encryption algorithm like AES and another by XOR. Despite the first key is revealed by guessing or dictionary-based attack, the attacker can not reconstruct the original secret until knows the files used to derive the second key block according to our scheme. We also give an explanation about the tool in which the proposed scheme is implemented. It consists of 1 main module and 5 sub-modules: main routine, command parser, file 10, buffer manager, cipher, and time handler. The design goals of the tool include encrypting a file with or without the second encryption and modifying times tamp values such as MAC time information. In addition, the second key can be derived from 3 files at most which are selected and specified as input arguments by a user.
international symposium on consumer electronics | 2008
Sang Su Lee; Un Sung Kyong; Do Won Hong
Recently, the capacity of digital storages for PCs gets larger, and forensic investigators need a system or a tool for imaging them in high speed. In this paper, we describe the high speed disk imaging system for the forensic purpose and report its performance.
Archive | 2010
Jooyoung Lee; Sung Kyong Un; Youngsoo Kim; Geon Kim; Sang Su Lee; Su Hyung Jo; Youn Hee Gil; Woo Yong Choi; Do Won Hong; Hyun Sook Cho
Archive | 2011
Youn Hee Gil; Jooyoung Lee; Su Hyung Jo; Youngsoo Kim; Keon Woo Kim; Sang Su Lee; Woo Yong Choi; Sung Kyong Un; Do Won Hong; Hyun Sook Cho
Archive | 2009
Jooyoung Lee; Su Hyung Jo; Youn-Hee Gil; Youngsoo Kim; Keonwoo Kim; Sang Su Lee; Sung Kyong Un; Do Won Hong
Archive | 2012
Jooyoung Lee; Youn Hee Gil; Do Won Hong; Keon Woo Kim; Youngsoo Kim; Sung Kyong Un; Sang Su Lee; Su Hyung Jo; Woo Yong Choi; Hyun Sook Cho
Archive | 2013
Jooyoung Lee; Sung Kyong Un; Hyun Sook Cho; Youn Hee Gil; Keon Woo Kim; Youngsoo Kim; Sang Su Lee; Su Hyung Jo; Woo Yong Choi
Archive | 2012
Sung Kyong Un; Do Won Hong; Hyun-Sook Cho; Youn-Hee Gil; Keonwoo Kim; Youngsoo Kim; Sang Su Lee; Jooyoung Lee; Su Hyung Jo; Woo Yong Choi
Archive | 2012
Keon Woo Kim; Do Won Hong; Sung Kyong Un; Youngsoo Kim; Woo Yong Choi; Sang Su Lee; Jooyoung Lee; Su Hyung Jo; Youn Hee Gil