• Title/Summary/Keyword: 원격 사용자 인증

Search Result 171, Processing Time 0.026 seconds

Analysis to a Remote User Authentication Scheme Using Smart Cards (스마트 카드를 이용한 사용자 인증 스킴의 안전성 분석)

  • An, Young-Hwa;Lee, Kang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.3
    • /
    • pp.133-138
    • /
    • 2009
  • Recently Lin et al. proposed the remote user authentication scheme using smart cards. But the proposed scheme has not been satisfied security requirements considering in the user authentication scheme using the password based smart card. In this paper, we showed that he can get the user's password using the off-line password guessing attack on the scheme when the adversary steals the user's smart card and extracts the information in the smart card. Also, we proposed the seven security requirements for evaluating remote user authentication schemes using smart card. As a result of analysis, in Lin et al's scheme we have found the deficiencies of security requirements. So we suggest the improved scheme, the mutual authentication scheme that does not store the user's password verifier in server and can authenticate each other at the same time between the user and server.

Issues on Designing Shared and UI-less Intelligent Gadgets Managements (지능형 가젯의 공유 및 원격관리에 대한 연구)

  • Choi, Eunjeong;Bae, Chang-Seok;Lee, Jeonwoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.65-66
    • /
    • 2009
  • 본 논문에서는 웹 인터페이스를 이용해 웨어러블 로깅 장치를 설계하는데 있어 고려되어야 할 문제점들을 기술한다. 또한 사용자들간의 공유 가젯들의 사용자 인증과 관련된 문제점들을 도출하여 적합한 모델을 제시하고자 한다. 본 논문에서의 지능형 가젯은 일종의 아주 작은 착용형 컴퓨터로, 사용자가 지니고 다니는 물품에 부착시켜 사용자가 경험하는 정보를 저장한다. 개발된 가젯들은 너무 작아서 사용자들이 이용할 수 있는 형태의 사용자 인터페이스를 갖추지 못하기 때문에, 사용자들은 원격지에서 그들의 가젯을 관리한다. 또한 사용자들은 가젯을 구입하여 다른 사용자에게 빌려줄 수도 있다. 이러한 이유로, 사용자들이 어디서든 가젯에 접근하여 정보를 수정할 수 있도록 하기 위해서 인터넷을 통해 가젯을 관리하여야 한다. 본 논문에서는 사용자의 상황 정보를 기록하고 웹 인터페이스를 통해 접근 가능한 지능형 가젯을 위한 아키텍처를 설계하였다.

Technologies for Protection of Information in Public Networks using Communication Satellite (공용 위성 통신망의 정보 보호에 관한 연구)

  • 문희철;이필중
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1991.11a
    • /
    • pp.249-260
    • /
    • 1991
  • 위성 통신망은 도청의 위협이 가장 큰 통신망으로 사용자들의 민감한 정보에 대한 프라이버시의 보호가 어려운 통신망이다. 또한 위성통신의 고유한 특성상 위성체를 원격지에서 제어해야 하므로 위성 제어 신호에 대한 안전한 인증(authentication) 메카니즘이 필요하다. 본 연구에서는 공용 위성 통신망에서 사용자의 프라이버시를 위한 암호시스템과 위성 제어 신호의 안전한 인증 메카니즘을 제시하고자 한다.

  • PDF

Smart Card Based User Authentication Scheme Secure Against Password Guessing Attack

  • Joo, Young-Do
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.3
    • /
    • pp.182-188
    • /
    • 2011
  • Recently Yoon et al. proposed the remote user authentication scheme using smart cards. But their scheme has not satisfied security requirements which should be considered in the user authentication scheme using the password based smart card. In this paper, we prove that Yoon et al.'s scheme is vulnerable to a password guessing attack in case that the attacker steals the user's smart card and extracts the information from the smart card. Accordingly, this paper proposes the improved user authentication scheme based on the hash functin and random nonce that can withstand various possible attacks including a password guessing attack. The result of comparative analysis demonstrates that the proposed scheme is more secure and efficient than Yoon et al.'s scheme, with a trivial trade-off to require just a few more exclusive-OR operations.

New Password based Remote User Authentication Protocols using Smartcards (스마트카드를 이용한 새로운 패스워드 기반의 원격 사용자 인증 프로토콜)

  • Jeon Il-Soo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.10 no.2
    • /
    • pp.59-66
    • /
    • 2005
  • Recently, Ku and Chen(Ku-Chen) showed some problems in the password based remote user authentication scheme using smartcards proposed by Chien et al. and proposed an improvement from it. This paper shows some weaknesses in the Ku-Chen's scheme, especially the replay attacks, and proposes two authentication protocols to solve the problems in it. First of all, an authentication protocol using synchronized timestamps is proposed to solve the problem in the Ku-Chen's protocol. Then, a nonce-based authentication protocol is proposed to solve the inherent problems in the synchronized timestamp-based authentication protocols. The proposed authentication protocols support the advantages in the previous password-based authentication protocols and solve the problems in them effectively.

  • PDF

Vulnerability Analysis and Improvement in Man-in-the-Middle Attack for Remote User Authentication Scheme of Shieh and Wang's using Smart Card (Shieh and Wang's의 스마트카드 상호인증 스킴에 대한 중간자공격 개선)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.4
    • /
    • pp.1-16
    • /
    • 2012
  • Shieh and Wang [10] recently proposed an efficient mutual authentication scheme that combined the cost-effectiveness of operations of Lee et al. [6]. scheme and the security and key agreement of Chen and Yeh scheme. Shieh and Wang [10] scheme, however, does not satisfy the security requirements against a third party (the man-in the middle, attacker) that have to be considered in remote user authentication scheme using password-based smart cards. Shieh and Wang weaknesses are the inappropriateness that it cannot verify the forged message in 3-way handshaking mutual authentication, and the vulnerability that the system (server) secret key can easily be exposed. This paper investigates the problems of Shieh and Wang scheme in the verification procedure of the forged messages intercepted by the eavesdrop. An enhanced two-way remote user authentication scheme is proposed that is safe and strong against multiple attacks by adding the ability to perform integrity check on the server and proposed scheme is not expose user password information and the system's confidential information.

Anonymous Remote User Authentication Scheme with Smart Card (익명성을 제공하는 스마트카드 사용자 인증 프로토콜)

  • Kim, Se-Il;Rhee, Hyun-Sook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.139-144
    • /
    • 2007
  • Due to the increasing use of Internet and spread of ubiquitous environment the security of private information became an important issue. For this reason, many suggestions have been made in order to protect the privacy of users. In the study of authentication system using a smart card which is one of the methods for protecting private information, the main idea is to offer user anonymity. In 2004, Das et al. suggested an authentication system that guarantees anonymity by using a dynamic ID for the first time. However, this scheme couldn't guarantee complete anonymity as the identity of the user became revealed at log-in phase. In 2005, Chien at al. suggested a authentication system that guarantees anonymity, but this was only safe to the outsider(attacker). In this paper, we propose a scheme that enables the mutual authentication between the user and the sewer by using a smart card. For the protection of the user privacy, we suggest an efficient user authentication system that guarantees perfect anonymity to both the outsider and remote server.

A Study of the Authentication of On-line Test Participants under e-Learning (e-Learning상에서 온라인 시험 응시자 인증에 관한 연구)

  • 조길익;곽덕훈
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04b
    • /
    • pp.499-501
    • /
    • 2004
  • 교육의 새로운 방향은 가상 학교나 WBI와 같은 교육적 활용분야로 확대되고 있으나, e-Learning 상에서 이뤄지는 평가의 응시자에 대한 신뢰 확보는 어려운 상황이다. 기존의 인증이란 사용자가 E와 Password를 타인에게 공개하지 않는 한 본인임을 인증하였다. 하지만 온라인상에서 시험 응시자는 본인의 ID와 Password를 타인에게 알려주어 대리시험이 가능하게 함은 물론 시험문제의 공유 또는 다수의 응시자가 한 곳에 모여 문제를 풀어 감으로서 평가에 대한 신뢰도에 의문을 갖지 않을 수 없게 되었다. 이에 인터넷으로 원격조정이 가능한 PC카메라와 얼굴인식 프로그램 그리고 원격제어프로그램을 이용하여 응시자를 인증함으로써 부정행위를 원천적으로 봉쇄하고, 감독자가 언제 어디서나 웹을 통하여 쉽게 감독할 수 있도록 LMS 기능의 보완이 요구된다. 본 논문을 통해서는 채팅기능을 통한 상호 대화가 가능하고 응시 장면을 동영상으로 압축 저장하여 사후 감독이 가능토록 함으로서 e-Learning상에서의 평가 및 학사관리의 공정성 및 신뢰도를 높일 수 있는 방안을 제시하였다.

  • PDF

Secure Remote User Authentication Scheme for Password Guessing Attack (패스워드 추측공격에 안전한 원격 사용자 인증 스킴)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.12
    • /
    • pp.5895-5901
    • /
    • 2011
  • This paper shows that a scheme provided by An[7] is not enough to satisfy security requirements for a user certification using a password-based smart card. In order to compensate this weakness, this study provides an improved user scheme with a hash function and ElGamal signature. This new scheme has some advantages protecting password guessing attack, masquerade, and replay attack as well as providing forward secrecy. Compared to An's certification scheme, this scheme suggests that the effect of computational complexity is similar but the efficiency of safety is better.

Security Improvement of Remote User Authentication Scheme based on Smart Cards (스마트 카드 기반 사용자 인증 스킴의 보안 개선)

  • Joo, Young-Do;An, Young-Hwa
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.131-137
    • /
    • 2011
  • Recently Lin et al. proposed a simple remote user authentication scheme using smart cards. But the proposed scheme has not satisfied security requirements which should be considered in the user authentication scheme using the password based smart card. In this paper, we show that Lin et al.'s scheme is insecure against off-line password guessing attack. In their scheme, any legal user's password may be derived from the password guessing when his/her smart card is stolen and the secret information is leaked from the smart card by an attacker. Accordingly, we demonstrate the vulnerability of their scheme and present an enhancement to resolve such security weakness. Our proposed scheme can withstand various possible attacks including password guessing attack. Furthermore, this improved scheme can provide mutual authentication to improve the security robustness. Performance evaluation shows that the proposed scheme is relatively more effective than Lin et al.'s scheme.