• Title/Summary/Keyword: 동적 서명

Search Result 45, Processing Time 0.029 seconds

A Study of Performance and Analysis of Dynamic Signature Verification System (동적 서명검증시스템의 성능 평가에 관한 연구)

  • 김진환;조혁규;차의영
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1537-1540
    • /
    • 2003
  • Dynamic signature verification technology is to verify the signer by calculating his writing manner, speed, angle, and the number of strokes, order, down/up/movement of pen when the signer input his signature with an electronic pen for his authentication In this paper, we will study an abjective basis for performance and analysis of the dynamic signature verification system.

  • PDF

Secure Routing Mechanism using one-time digital signature in Ad-hoc Networks (애드혹 네트워크에서의 one-time 전자 서명을 이용한 라우팅 보안 메커니즘)

  • Pyeon, Hye-Jin;Doh, In-Shil;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.623-632
    • /
    • 2005
  • In ad-hoc network, there is no fixed infrastructure such as base stations or mobile switching centers. The security of ad-hoc network is more vulnerable than traditional networks because of the basic characteristics of ad-hoc network, and current muting protocols for ad-hoc networks allow many different types of attacks by malicious nodes. Malicious nodes can disrupt the correct functioning of a routing protocol by modifying routing information, by fabricating false routing information and by impersonating other nodes. We propose a routing suity mechanism based on one-time digital signature. In our proposal, we use one-time digital signatures based on one-way hash functions in order to limit or prevent attacks of malicious nodes. For the purpose of generating and keeping a large number of public key sets, we derive multiple sets of the keys from hash chains by repeated hashing of the public key elements in the first set. After that, each node publishes its own public keys, broadcasts routing message including one-time digital signature during route discovery and route setup. This mechanism provides authentication and message integrity and prevents attacks from malicious nodes. Simulation results indicate that our mechanism increases the routing overhead in a highly mobile environment, but provides great security in the route discovery process and increases the network efficiency.

The Dynamic Group Authentication for P2P based Mobile Commerce (P2P 기반의 모바일 상거래를 위한 동적 그룹 인증)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.335-341
    • /
    • 2014
  • To play the networked video contents in a client's mobile device in real time, the contents should be delivered to it by the contents server with streaming technology. Generally, in a server-client based commerce model, the server is in charge of both the authentication of the paid customer and distribution of the contents. The drawback of it is that if the customers' requests go on growing rapidly, the service quality would be degraded results from the problems of overloaded server or restricted network bandwidth. On the contrary, in P2P based networks, more and more the demand for service increasing, the service quality is upgraded since a customer can act as a server. But, in the P2P based network, there are too many servers to manage, it's possible to distribute illegal contents because the P2P protocol cannot control distributed servers. Thus, it's not suitable for commercial purposes. In this paper, the dymanic group authentication scheme is proposed which is suited to P2P based applications. The proposed scheme consists of group based key generation, key update, signature generation and verification protocols. It can control the seeder's state whether the seeder is joining or leaving the network, and it can be applied to hybrid P2P based commerce model where sales transactions are covered by the index server and the contents are distributed by the P2P protocol.

A Study on Efficient Generation of Beam-Mass Model for Simplification of the Crankshaft in the Large Marine Engine (대형 선박엔진용 크랭크축 해석을 위한 보-질량 모델 생성 기법에 관한 연구)

  • Suh, Myung-Won;Shim, Mun-Bo;Kim, Ki-Hyun;Kim, Kyu-Hee
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.27 no.10
    • /
    • pp.1661-1666
    • /
    • 2003
  • The purpose of this study is to develop the simplified model of the crankshaft in the large marine engine for dynamic analysis. Because the actual engine system is under complex dynamic loading condition and it has multi-cylinder, the dynamic analysis is purchased at a high computation cost. In spite of this burden, the dynamic analysis must be perfonned to assure structural integrity of operating marine engine. Therefore, simplification of the analytic model is necessary for dynamic analysis. Beam-mass model, which is generated with the section property method, is the model simplified effectively. Section property method can provide desired section information by optimization technique. By applying beam-mass model to the crankshaft in the large marine engine, the usefulness of the proposed method was proven.

Dynamic Signature Verification System for the User Authentication Security (사용자 인증 보안을 위한 동적 서명인증시스템)

  • 김진환;조혁규;차의영
    • Proceedings of the IEEK Conference
    • /
    • 2002.06c
    • /
    • pp.131-134
    • /
    • 2002
  • As the increased use of computer, wired/wireless/mobile Internet, security in using Internet becomes a more important problem. Thus, biometric technology using physical and behavior characteristics of a person is hot issue. Many different types of biometric technologies of a person such as fingerprint, face, iris, vein, DNA, brain wave, palm, voice, dynamic signature, etc. had already been studied but remained unsuccessful because they do not meet social demands. However, recently many of these technologies have been actively revived and researchers have developed new products on various commercial fields. Dynamic signature verification technology is to verify the signer by calculating his writing manner, speed, angle, and the number of strokes, order, the down/up/movement of pen when the signer input his signature with an electronic pen for his authentication. Then signature verification system collects mentioned above various feature information and compares it with the original one and simultaneously analyzes to decide whether signature is forgery or true. The prospect of signature verification technology is very promising and its use will be wide spread in terms of economy, security, practicality, stability and convenience.

  • PDF

안전주입 및 정지냉각 배관의 LBB 적용을 위한 배관평가선도 개발

  • 허남수;서명원;김영진;표창률;박상덕
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1996.11b
    • /
    • pp.697-702
    • /
    • 1996
  • 원전 배관계통에 LBB를 적용하면 배관파단으로 인한 동적영향(dynamic effect)을 고려하지 않아도 되므로 각종 구조물의 설계가 단순해지고, 배관파단에 대비해 설치하였던 각종 지지구조물들을 제거할 수 있으므로 설계비용 절감 등 경제적 이점을 얻을 수 있다. 본 논문의 목적은 차세대원전 안전주입 및 정지냉각계통 배관에 대해 설계초기단계에서 LBB적용 여부를 판단할 수 있는 배관평가선도를 개발하는 것이다. 이를 위해 먼저 배관재료의 응력-변형률곡선을 사용하여 감지가능한 균열길이를 산출하였으며, 3차원 유한요소해석과 배관재료의 파괴저항곡선을 이용한 균열안정성평가를 수행하여 배관평가선도를 개발하였다. 본 연구에서 개발한 배관평가선도를 배관설계초기단계에 사용하면 LBB적용여부로 인한 설계변경과정이 불필요하므로 전체공기를 단축할 수 있으며, 특정한 배관계통이 아닌 일반 배관계통에 적용할 수 있으므로 LBB해석회수를 상당히 줄일 수 있다.

  • PDF

Fixing Security Flaws of URSA Ad hoc Signature Scheme (URSA 애드혹 서명 알고리즘의 오류 수정)

  • Yi, Jeong-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.131-136
    • /
    • 2007
  • Ad hoc networks enable efficient resource aggregation in decentralized manner, and are inherently scalable and fault-tolerant since they do not depend on any centralized authority. However, lack of a centralized authority prompts many security-related challenges. Moreover, the dynamic topology change in which network nodes frequently join and leave adds a further complication in designing effective and efficient security mechanism. Security services for ad hoc networks need to be provided in a scalable and fault-tolerant manner while allowing for membership change of network nodes. In this paper, we investigate distributed certification mechanisms using a threshold cryptography in a way that the functions of a CA(Certification Authority) are distributed into the network nodes themselves and certain number of nodes jointly issue public key certificates to future joining nodes. In the process, we summarize one interesting report [5] in which the recently proposed RSA-based ad hoc signature scheme, called URSA, contains unfortunate yet serious security flaws. We then propose new scheme by fixing their security flaws.

Insider Threat Detection Technology against Confidential Information Loss using Email (이메일을 통한 기밀정보 유출 유형의 내부자 위협 탐지 기술)

  • Youngjae Lee;Seongwon Kang;Kyungmi Kim;Kyungroul Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.217-218
    • /
    • 2023
  • 내부자 위협이란, 조직의 보안 및 데이터, 시스템에 대한 내부 정보에 접근하는 현 임직원 및 전 임직원, 계약자와 같이, 동일한 조직 내부의 사람들로부터 발생하는 위협을 의미한다. 일반적으로 내부자들은 업무를 위하여, 시스템에 대한 합법적인 접근 권한을 가지며, 만약 이러한 권한이 오남용되는 경우에는 조직에 매우 심각한 피해를 입힐 수 있다. 이러한 내부자 위협은 외부로부터의 위협보다 방어 및 탐지가 훨씬 어려운 한계점이 있으며, 그 피해 규모가 매우 방대하다는 문제점도 존재한다. 이에 따라, 본 논문에서는 내부자 위협을 탐지하기 위하여, 이메일을 통한 기밀정보를 유출하는 유형의 위협에 대응하는 방안을 제안한다. 제안하는 방안은 조직 내에서 이메일을 발신하는 경우를 대상으로, 파일이 포함된 이메일에 발신자를 식별하기 위하여, 파일에 키 값 및 서명을 삽입하며, 발신되는 이메일을 모니터링하여 첨부된 파일의 유형을 파악함으로써, 동적 그래프를 통하여 시각화한다. 내부 시스템 및 네트워크에서의 보안관제 담당자 및 관리자는 시각화된 그래프를 확인함으로써, 직관적으로 정보 유출을 파악하고 대응할 수 있을 것으로 판단된다. 본 논문에서 제안하는 방안을 통하여, 조직 내의 내부자 위협을 탐지할 수 있으며, 데이터 유출 사고가 발생하는 경우, 유출자를 빠르게 식별하고 초기에 대응할 수 있을 것으로 판단된다.

  • PDF

A Comparative Analysis of GBEF According to Image Aquisition Method in Hepatobiliary Scan (간담도스캔의 영상수집방법에 따른 담즙배출율의 비교분석)

  • Kim, Yeong-Seon;Seo, Myeong-Deok;Lee, Wan-Kyu;Song, Jae-Beom
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.18 no.2
    • /
    • pp.8-16
    • /
    • 2014
  • Purpose The quantitative analysis of gallbladder emptying is very important in diagnosis of motility disorder of gallbladder and in biliary physiology. The GBEF obtain the statics aquisition method or the dynamic acquisition method in two ways. The purpose of this study is to compare the GBEF value of statics acquisition method and the dynamic acquisition method. And we find the best way for calculate GBEF. Materials and Methods The quantitative hepatobiliary scan with $^{99m}Tc$-mebrofenin was performed of 27 patients. Initial images were acquired statically, for 60 min after injection of the radioactive tracer. And if the gallbladder is visualized to 60 min, performed stimulation of gallbladder (1egg, 200 mL milk). After that, started acquisition of dynamic image for 30 min. After that, image of after fatty meal of the statics method were acquired on equal terms with 60 min image. The statics GBEF was calculated using the images of before fatty meal and post fatty meal by the statics method. The dynamic GBEF was calculated using the images of time of maximum bile juice uptake ($T_{max}$) and time of minimum bile juice uptake ($T_{min}$) images from the gallbladder time-activity curve. A bile juice is secreted from gallbladder while eating a fatty meal. that is named early GBEF and that was calculated using before fatty meal image of the statics method and 1 min image of the dynamic method. Results The result saw very big difference between two according to $T_{max}$. The result, were as follows. 1) In case of less than 1 min, the dynamic mean GBEF was $40.1{\pm}21.7%$, the statics mean GBEF was $51.5{\pm}23.6%$ in 16 cases. The early mean GBEF was $14.0{\pm}29.1%$. The GBEF of statics method was higher because that include secreted bile juice while performed stimulation of gallbladder. A difference of GB counts according to acquisition method and the early bile juice counts was $17.6{\pm}14.8%$ and $13.5{\pm}15.3%$. 2) In case of exceed than 1 min, the dynamic mean GBEF was $31.0{\pm}19.7%$, the statics mean GBEF was $21.3{\pm}19.4%$ in 7 cases. The early GBEF was $-6.9{\pm}4.9%$. The GBEF of dynamic method was higher because that include concentrated bile juice to $T_{max}$. A difference of GB counts according to acquisition method and the early bile juice counts was $14.3{\pm}7.3%$ and $5.9{\pm}3.9%$. Conclusion The statics method is very easy and simple, but in case of $T_{max}$ delay, the GBEF can be lower. The dynamic method is able to calculate accurately in case of $T_{max}$ delay, but in case of $T_{max}$ is less than 1 min, the GBEF can be lower because dynamic GBEF exclude secreted bile juice while performed stimulation of gallbladder. The best way to calculate GBEF is to scan with dynamic method preferentially and to choose suitable method between the two way after conform $T_{max}$ on the T-A curve of the dynamic method.

  • PDF

Dynamic Spectrum Sensing and Channel Access Mechanism in Frequency Hopping Based Cognitive Radio Ad-hoc Networks (주파수 홉핑 기반 인지무선 애드 혹 네트워크에서 동적 스펙트럼 센싱 및 채널 엑세스 방안)

  • Won, Jong-Min;Yoo, Sang-Jo;Seo, Myunghwan;Cho, Hyung-Weon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.11
    • /
    • pp.2305-2315
    • /
    • 2015
  • Frequency resource value is growing more and more with the development of the wireless communication. With the advent of the current information society comes a serious shortage of frequency resource, as the amount of supply is far from meeting its demands. Thus, cognitive radio (CR) technique is receiving more attention as a way to make use of the temporarily unoccupied frequency resource. In this paper we propose a novel out-of-band spectrum sensing and dynamic channel access scheme for frequency hopping-based cognitive radio ad-hoc networks. At the beginning of each current channel hopping time, member nodes perform spectrum sensing for the next hopping channel. Based on the proposed collision free primary detection notification, member nodes can determine whether they should execute a hopping time extension procedure of the current channel or not. When the primary detected hopping channel is re-idled, the hopping pattern recovery procedure is performed. In this paper we evaluated the performance of the proposed dynamic sensing and hopping channel extension mechanism for the various wireless network conditions. As a result, we show that the proposed method can increase channel utilization and provide reliable channel management operation.