• Title/Summary/Keyword: 도메인 키

Search Result 66, Processing Time 0.028 seconds

Design of an Efficient User Authentication Protocol Using subgroup of Galois Field (유한체의 부분군을 이용한 효율적인 사용자 인증 프로로콜 설계)

  • 정경숙
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.105-113
    • /
    • 2004
  • If the protocol has fast operations and short key length, it can be efficient user authentication protocol Lenstra and Verheul proposed XTR. XTR have short key length and fast computing speed. Therefore, this can be used usefully in complex arithmetic. In this paper, to design efficient user authentication protocol we used a subgroup of Galois Field to problem domain. Proposed protocol does not use GF($p^6$) that is existent finite field, and uses GF($p^2$) that is subgroup and solves problem. XTR-ElGamal based user authentication protocol reduced bit number that is required when exchange key by doing with upside. Also, Proposed protocol provided easy calculation and execution by reducing required overhead when calculate. In this paper, we designed authentication protocol that is required to do user authentication.

  • PDF

전자거래 신뢰구조를 위한 공개키 기반구조 도메인간 상호인정 방안에 관한 연구

  • Kim, Jung-Duk;Choi, Kwang-Hee
    • Review of KIISC
    • /
    • v.17 no.4
    • /
    • pp.50-55
    • /
    • 2007
  • 전자거래 환경 하에서 거래 당사자들간의 신분 확인 및 신뢰 구축은 매우 중요한 문제이다. 이러한 문제에 가장 현실적, 효과적 해결책으로 제시되고있는 것이 PKI기반의 신뢰구조이다. 그러나 기존의 계층적 신뢰구조는 광범위한 전자거래환경의 요구조건을 만족시키지 못하고 있다. 이러한 문제를 해결하기 위하여 각국에서는 상호인증과 상호인정 관련 많은 연구와 대안을 제시하고 있다. 그러나 지금까지의 연구는 신뢰 구조의 형성과 CA간의 상호 연동에만 치중하였을 뿐 최종 사용자의 신뢰의 판단이나 요구사항의 실시간 확인과 같은 의사결정에 직접 관련된 문제에는 소홀히 하였다. 여기에서는 최종사용자의 에이전트와 중계에이전트를 사용하여 실시간 확인기능의 제공과 신뢰보드를 이용하여 상호인정관련 신뢰구조의 확립을 제공하고자 한자. 이는 상호인증과 상호연동의 정책적, 기술적 장벽을 해소하는데 많은 도움을 제공할 것이다.

디바이스 인증 및 인가에 기반한 유비쿼터스 홈네트워크 프라이버시 대책

  • Lee, Sun-Young;Yim, Kang-Bin;Bae, Kwang-Jin;Jeong, Tae-Young;Han, Jong-Wook
    • Review of KIISC
    • /
    • v.18 no.5
    • /
    • pp.125-131
    • /
    • 2008
  • 유비쿼터스 홈네트워크에서는 다양한 디바이스를 이용하여 복수의 도메인을 오가며 서비스를 제공하거나 제공받을 수 있을 것으로 기대되는데 이때 디바이스는 반드시 정당한 디바이스여야 하며 이를 실현하기 위하여 인증서를 사용하는 디바이스 인증 기술이 제안되었다. 그리고, 계산 능력이 작은 디바이스를 인증하기 위한 방법으로서 대칭키 암호 기술에 기반을 둔 디바이스 인가 방법을 함께 사용함으로써 계산 능력이 다른 다양한 디바이스들을 인증하는 방법이 제안되었다. 이들 방법의 공통성은 사용자의 개인 정보 유출을 피하기 위하여 사용자 정보를 사용하지 않고 디바이스 고유의 정보만을 사용하여 인증한다는데 있다. 이러한 디바이스 인증/인가 방법을 홈네트워크에 사용하였을 경우 사용자의 개인 정보는 보호되는지 확인할 필요가 있다. 본 논문에서는 기존에 제안된 유비궈터스 홈네트워크를 위한 디바이스 인증/인가 기술을 분석하여 개인 정보의 유출에 관한 문제점을 도출하고 그에 대한 대응 방법을 제안하였다.

Novel Deep Learning-Based Profiling Side-Channel Analysis on the Different-Device (이종 디바이스 환경에 효과적인 신규 딥러닝 기반 프로파일링 부채널 분석)

  • Woo, Ji-Eun;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.987-995
    • /
    • 2022
  • Deep learning-based profiling side-channel analysis has been many proposed. Deep learning-based profiling analysis is a technique that trains the relationship between the side-channel information and the intermediate values to the neural network, then finds the secret key of the attack device using the trained neural network. Recently, cross-device profiling side channel analysis was proposed to consider the realistic deep learning-based profiling side channel analysis scenarios. However, it has a limitation in that attack performance is lowered if the profiling device and the attack device have not the same chips. In this paper, an environment in which the profiling device and the attack device have not the same chips is defined as the different-device, and a novel deep learning-based profiling side-channel analysis on different-device is proposed. Also, MCNN is used to well extract the characteristic of each data. We experimented with the six different boards to verify the attack performance of the proposed method; as a result, when the proposed method was used, the minimum number of attack traces was reduced by up to 25 times compared to without the proposed method.

Web Application Authentication System using Encipherment and PKI (암호화와 PKI를 이용한 웹 어플리케이션 인증시스템)

  • Heo, Jin-Kyoung
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.1-7
    • /
    • 2008
  • The hacking method came to be more complicated, became program ant it was automated. That is hacking trend of recent times. Before, The password crack, catch root authority is trend of hacking which uses the vulnerability of server. Hacker attack network or all of domain not some host. Web application system at hacking technique develops and improve transmitted data through the network shows many vulnerability. The massive data are transmitted through the network without encipherment filtering. It will be able to bring about the neck of a bottle actual condition which is serious in security system because of the network where the user comes to be many it leads and the data which is delivered comes to be many. In this paper, we propose web application system to prevent overload from bottleneck in encipherment system. It can solve security key trust problem in encoding and decoding with public key infrastructure.

  • PDF

Mobile Interaction in a Usable-Unified-Ubiquitous (U3) Web Service for Real-time Social Networking Service (실시간 소셜 네트워크 서비스를 위한 사용 가능한-통합적-유비쿼터스 (U3) 웹 서비스에서의 모바일 상호작용)

  • Kim, Yung-Bok;Kim, Chul-Su
    • The KIPS Transactions:PartB
    • /
    • v.15B no.3
    • /
    • pp.219-228
    • /
    • 2008
  • For real-time social networking service, mobile interaction in a usable-unified-ubiquitous (U3) web service was studied. Both as a convenient mobile HCI for real-time social networks and as indexing keys to metadata information in ubiquitous web service, the multi-lingual single-character domain names (e.g. 김.net, 이.net, 가.net, ㄱ.net, ㄴ.net, ㅎ.net, ㅏ.net, ㅔ.net, ㄱ.com, ㅎ.com) are convenient mobile interfaces when searching for social information and registering information. We introduce the sketched design goals and experience of mobile interaction in Korea, Japan and China, with the implementation of real-time social networking service as an example of U3 Web service. We also introduce the possibility of extending the application to the metadata directory service in IP-USN (IP-based Ubiquitous Sensor Network) for a unified information management in the service of social networking and sensor networking.

Reduction of Authentication Cost Based on Key Caching for Inter-MME Handover Support (MME 도메인간 핸드오버 지원을 위한 키캐싱 기반 인증비용의 감소기법)

  • Hwang, Hakseon;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.209-220
    • /
    • 2013
  • Handover is the technology to minimize data lose of mobile devices and make continuous communication possible even if the device could be moved from one digital cell site to another one. That is, it is a function that enables the mobile user to avoid the disconnection of phone conversations when moving from a specific mobile communication area to another. Today, there are a lot of ongoing researches for fast and efficient hand-over, in order to address phone call's delay and disconnection which are believed to be the mobile network's biggest problems, and these should essentially be resolved in all mobile networks. Thanks to recent technology development in mobile network, the LTE network has been commercialized today and it has finally opened a new era that makes it possible for mobile phones to process data at high speed. In LTE network environment, however, a new authentication key must be generated for the hand-over. In this case, there can be a problem that the authentication process conducted by the hand-over incurs its authentication cost and delay time. This essay suggests an efficient key caching hand-over method which simplifies the authentication process: when UE makes hand-over from oMME to nMME, the oMME keeps the authentication key for a period of time, and if it returns to the previous MME within the key's lifetime, the saved key can be re-used.

A Secure Micro-Payment Protocol based on Credit Card in Wireless Internet (무선인터넷에서 신용카드기반의 안전한 소액 지불 프로토콜)

  • Kim Seok mai;Kim Jang Hwan;Lee Chung sei
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12C
    • /
    • pp.1692-1706
    • /
    • 2004
  • Recently, there are rapid development of information and communication and rapid growth of e-business users. Therefore we try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. Wireless e-business adopts credit card WPP protocol and AIP protocol proposed by ASPeCT. WAP, one of the protocol used by WPP has weakness of leaking out information from WG which conned wire and wireless communication. certification chain based AIP protocol requires a lot of computation time and user IDs are known to others. We propose a Micro-Payment protocol based on credit card. Our protocol use the encryption techniques of the public key with ID to ensure the secret of transaction in the step of session key generation. IDs are generated using ECC based Weil Paring. We also use the certification with hidden electronic sign to transmit the payment result. The proposed protocol solves the privacy protection and Non-repudiation p개blem. We solve not only the safety and efficiency problem but also independent of specific wireless platform. The protocol requires the certification organization attent the certification process of payment. Therefore, other domain provide also receive an efficient and safe service.

Security Analysis and Implementation of Fast Inter-LMA domain Handover Scheme in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 LMA도메인 간 핸드오버 기법의 보안성 분석 및 구현)

  • Chai, Hyun-Suk;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.2
    • /
    • pp.99-118
    • /
    • 2012
  • In PMIPv6-based network, mobile nodes can be made smaller and lighter because the network nodes perform the mobility management-related functions on behalf of the mobile nodes. The one of the protocols, Fast Handovers for Proxy Mobile IPv6(FPMIPv6)[1] has studied by the Internet Engineering Task Force(IETF). Since FPMIPv6 adopts the entities and the concepts of Fast Handovers for Mobile IPv6(FMIPv6) in Proxy Mobile IPv6(PMIPv6), it reduces the packet loss. Conventional scheme has proposed that it cooperated with an Authentication, Authorization and Accounting(AAA) infrastructure for authentication of a mobile node in PMIPv6, Despite the best efficiency, without begin secured of signaling messages, PMIPv6 is vulnerable to various security threats such as the DoS or redirect attAcks and it can not support global mobility between PMIPv. In this paper, we analyze Kang-Park & ESS-FH scheme, and then propose an Enhanced Security scheme for FPMIPv6(ESS-FP). Based on the CGA method and the pubilc key Cryptography, ESS-FP provides the strong key exchange and the key independence in addition to improving the weaknesses for FPMIPv6. The proposed scheme is formally verified based on Ban-logic, and its handover latency is analyzed and compared with that of Kang-Park scheme[3] & ESS-FH and this paper propose inter-domain fast handover sheme for PMIPv6 using proxy-based FMIPv6(FPMIPv6).

A Secure Data Transmission Scheme Based on Secret Sharing for the Maritime Cloud Environment (해사클라우드 환경에 적합한 비밀분산 기반의 안전한 데이터 전송 기법)

  • Lee, Donghyeok;Park, Namje
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.4
    • /
    • pp.232-237
    • /
    • 2017
  • The Maritime Cloud is a technology that enables the seamless exchange of information between several communication links in the maritime domain. Although research on The Maritime Cloud security is still at an early stage, furthering this knowledge is vital to securing the marine environment. In this paper, we propose a method for secure data transmission through The Maritime Cloud domain. The proposed technique, based on the "secret sharing" scheme, is delivered through specifically-dedicated geocasting software. Thus, only authorized vessels can restore the original information. The proposed method is safe from so-called "sniffing" and "man-in-the-middle" attacks.