• Title/Summary/Keyword: 세션키 인증

Search Result 216, Processing Time 0.029 seconds

Mutual Identification and Key Exchange Scheme in Secure Vehicular Communications based on Group Signature (그룹 서명 기반의 차량 네트워크에서 상호 신분 확인 및 세션키 교환 기법)

  • Kim, Dai-Hoon;Choi, Jae-Duck;Jung, Sou-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.41-50
    • /
    • 2010
  • This paper proposes a mutual identification and session key exchange scheme in secure vehicular communication based on the group signature. In VANETs, security requirements such as authentication, conditional privacy, non-repudiation, and confidentiality are required to satisfy various vehicular applications. However, existing VANET security methods based on the group signature do not support a mutual identification and session key exchange for data confidentiality. The proposed scheme allows only one credential to authenticate ephemeral Diffie-Hellman parameters generated every key exchange session. Our scheme provides a robust key exchange and reduces storage and communication overhead. The proposed scheme also satisfies security requirements for various application services in VANETs.

Efficient Key Establishment Protocol in Mobile Communication (이동통신 환경에서의 효율적인 상호인증 및 세션키 공유 프로토콜)

  • 이승원;홍성민;윤천수;조유근
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1998.12a
    • /
    • pp.357-367
    • /
    • 1998
  • 이동통신 환경에서, 이동단말기와 기지국 사이에 안전한 통신을 제공하기 위한 많은 프로토콜들이 제안되어왔다. 그러나 이동단말기 의 부족한 계산능력 때문에 공개키를 이용한 프로토콜은 많은 장점에도 불구하고 그 실용성을 검증받기 힘들었다. 본 논문은 이동단말기 의 부족한 계산능력으로도 공개키를 이용해 상호인증 및 세션키 공유를 효율적으로 수행할 수 있는 프로토콜을 제안한다. 제안된 프로토콜은 최근 제안된 SASC 프로토콜을 적용하여 이동단말기의 부족한 계산능력을 보충하였다.

  • PDF

A Mobile IPTV Authentication Protocol using Session Key in Wireless LAN (무선랜 환경에서 세션키를 이용한 모바일 IPTV 인증 프로토콜)

  • Baek, Jong-Gyu;Sohn, Kyu-Seek;Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1474-1480
    • /
    • 2011
  • Recently the mobile IPTV service has been spread through the wireless LAN(WLAN). In order to provide the commercial mobile IPTV service through the WLAN, re-authentication for the mobile IPTV terminal is required whenever the mobile terminal roams between APs(Access Points). The most popular one of the authentication protocol standards for the wired and/or wireless LAN is IEEE 802.1X. However IEEE 802.1X takes much time to authenticate the terminal and is not adequate for the seamless mobile IPTV service. We introduce the session key and separate the user authentication and the hardware authentication. And we strengthen the device authentication by the initial registration. By these, the proposed authentication protocol reduces the authentication time and can protect the authentication key securely.

Certificate Issuing Protocol Supporting WAKE-KR (WAKE-KR을 지원하는 인증서 발행 프로토콜)

  • 이용호;이임영
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.2
    • /
    • pp.288-300
    • /
    • 2003
  • As the importance of information security gets recognized seriously, ciphers technology gets used more. Particularly, since public key ciphers are easier to control the key than symmetric key ciphers and also digital signature is easily implemented, public key ciphers are increased used. Nowadays, public key infrastructure is established and operated to use efficiently and securely the public key ciphers. In the public key infrastructure, the user registers at the certificate authority to generate the private key and public key pair and the certificate authority issues the certificate on the public key generated. Through this certificate, key establishment between users is implemented and encryption communication becomes possible. But, control function of session key established in the public key infrastructure is not provided. In this thesis, the certificate issuing protocol to support the key recovery of the session key established during the wireless authentication and key establishment is proposed.

  • PDF

Security analysis for authenticated key agreement protocol (상호 인증 키 교환 프로토콜의 안전성 분석)

  • 이재민;류은경;김기원;이형목;유기영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.547-549
    • /
    • 2002
  • Seo와 Sweeny는 통신 당사자간의 직접적인 세션키(session key) 교환을 위해 SAKA(Simple Authenticated Key Agreement Algorithm)를 제안했다. SAKA는 패스워드(password)를 사용하여 사용자인증 기능을 제공하는 변형된 Diffie-Hellman 키 교환 프로토콜로써, 키 생성 및 사용자 인증 시 요구되는 계산량과 메시지 전송량을 고려할 때 효율적인 프로토콜이다. 그러나, 최근에 Lin은 SAKA의 안전성에 취약점이 있음을 지적하고 개선된 프로토콜을 제안하였다. 본 논문에서는 개선된 프로토콜이 여전히 재전송 공격(replay attack)에 안전하지 않기 때문에 사용자 인증을 제공 할 수 없음을 보인다.

  • PDF

An Authentication and Key Management Protocol for Secure Data Exchange in EPON MAC Layer (EPON MAC 계층의 안전한 데이터 전송을 위한 인증 및 키관리 프로토콜)

  • Kang, In-kon;Lee, Do-Hoon;Lee, Bong-Ju;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1B
    • /
    • pp.1-10
    • /
    • 2003
  • An EPON which is going on standardization in IEEE 802.3ah, is tree topology consists of a OLT and multiple ONU using passive optical components, so this network is susceptible to variable security threats - eavesdropping, masquerading, denial of service and so on. In this paper, we design a security protocol supporting authentication and confidentiality services in MAC layer in order to prevent these security threats and to guarantee secure data exchange The designed security protocol introduce public-key based authentication and key management protocols for efficient key management, and choose Rijndael algorithm, which is recent standard of AES, to provide the confidentiality of EPON Proposed authentication and key management protocols perform authentication and public-key exchange at a time, and are secure protocols using derived common cipher key by exchanging public random number To implement the designed security protocol, we propose the procedures of authentication and public-key exchange, session key update, key recovery. This proposed protocol is verified using unknown session key, forward secrecy, unknown key-share, key-compromise impersonation.

Certificateless Signature for Authentication and Key Agreement (인증 및 키 합의를 위한 무인증서 서명 기술)

  • Kim, Joon Sik;Eom, Jieun;Lee, Dong Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.203-206
    • /
    • 2017
  • 사용자 인증 및 키 합의 프로토콜은 두 사용자의 안전한 통신에 필수적인 세션키를 생성하는 프로토콜이다. 전자서명과 디피-헬만(Diffie-Hellman) 키 합의 프로토콜을 이용하여 인증 및 키 합의를 수행할 수 있으나, 각각의 파라미터 정보를 모두 공유해야한다는 단점이 있다. 이에 ID 기반 서명을 이용하여 인증과 키 합의를 동시에 수행할 수 있는 프로토콜이 제안되었는데, 기본적으로 ID 기반 서명은 키 위탁(key escrow) 문제가 있다. 본 논문에서는 이러한 문제를 해결하기 위해 상호 인증과 키 합의를 동시에 수행할 수 있는 무인증서 (certificateless, CL) 서명 기법을 설계하고, 이를 이용한 인증 및 키 합의 프로토콜을 제안한다.

A Study on Encryption Method using Hash Chain and Session Key Exchange in DRM System (DRM 시스템에서 해쉬체인과 세션키 교환을 이용한 암호화 기법에 관한 연구)

  • Park, Chan-Kil;Kim, Jung-Jae;Lee, Kyung-Seok;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.843-850
    • /
    • 2006
  • This is devoted to first, to propose a hash chain algorithm that generates more secure key than conventional encryption method. Secondly, we proposes encryption method that is more secure than conventional system using a encryption method that encrypts each block with each key generated by a hash chain algorithm. Thirdly, After identifying the user via wired and wireless network using a user authentication method. We propose a divided session key method so that Although a client key is disclosed, Attackers cannot catch a complete key and method to safely transfer the key using a divided key method. We make an experiment using various size of digital contents files for performance analysis after performing the design and implementation of system. Proposed system can distribute key securely than conventional system and encrypt data to prevent attacker from decrypting complete data although key may be disclosed. The encryption and decryption time that client system takes to replay video data fie is analogous to the conventional method.

Boundary Zone Overlapping Scheme for Fast Handoff Based on Session Key Reuse (AAA MIP 환경에서 공유영역 기반 세션키 재사용을 통한 고속 핸드오프 방식 연구)

  • Choi, Yu-Mi;Chung, Min-Young;Choo, Hyun-Seung
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.481-488
    • /
    • 2005
  • The Mobile W provides an efficient and scalable mechanism for host mobility within the Internet. However, the mobility implies higher security risks than static operations in fixed networks. In this paper, the Mobile IP has been adapted to allow AAA protocol that supports authentication, authorization, and accounting(AAA) for security and collection for accounting information of network usage by mobile nodes(MNs). For this goal, we Propose the boundary tone overlapped network structure while solidifying the security for the authentication of an MN. That is, the Proposed scheme delivers the session keys at the wired link for MN's security instead of the wireless one, so that it provides a fast and seamless handoff mechanism. According to the analysis of modeling result, the proposed mechanism compared to the existing session key reuse method is up to about $40\%$ better in terms of normalized surcharge for the handoff failure rate that considers handoff total time.

Public Key based Authentication Protocol for Mobile IP (Mobile IP를 위한 공개키 기반 인증 프로토콜)

  • Lee, Byung-Rae;Chang, Kyung-Ah;Kim, Tai-Yun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.04a
    • /
    • pp.649-653
    • /
    • 2000
  • Mobile IP[1]환경에서 (Mobile Node)[1]는 (Foreign Agent)[1]와 (Home Agent[1])간에 컨트롤 메시지들을 주고 받으며 이러한 컨트롤 메시지들은 인증을 받아야 한다. 그러나 기존의 Mobile IP에서는 키 분배 문제를 고려하지 않고 메시지 인증만을 다루고 있으며 [2,3]에서는 등록 키를 생성하기 위하여 몇 가지 방법을 제시하고 있지만 구체적인 인증 프로토콜은 다루지 않고 있다. 본 논문에서는 Mobile IP 환경에서의 와 간에 공개키 기반 인증 프로토콜을 제안한다. 제안된 인증 프로토콜은 와 간의 상호 인증 단계를 거치며, 서로간에 비밀 세션키를 생성하여 데이터의 기밀성을 보장할 수 있다. 또한 공개키에 기반 하므로 전자서명을 통한 메시지의 부인방지 기능을 얻을 수 있다.

  • PDF