• Title/Summary/Keyword: 원동

Search Result 880, Processing Time 0.026 seconds

The Integrated Identification Number Checking and Key Management Protocol with Certificates (인증서를 이용한 개인식별번호 확인 및 키분배 통합 프로토콜)

  • Kim Sung Duk;Jung Jae Dong;Won Dong Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.317-322
    • /
    • 2005
  • The existing certificate based authentication or identification just verifies whether the owner of private key corresponding to public key of certificate is the DN user set in the user field in the certificate or not, then we cannot find out who is the actual private key owner in a real world. To make up for this weak points, the method to insert the identification number like the resident registration number into the certificate extension field is applied as a technical standard to current domestic PKI system. In this paper, we propose the ECC based integrated identification, identification number checking and key management protocol providing user validation during the login.

Security Analysis of Diffie-Hellman based Standard Key Agreement Protocols (이산대수 기반 Diffie-Hellman형 표준 키 분배 프로토콜의 안전성 분석에 관한 연구)

  • Kim, Kyung-Jin;Kim, Sung-Duk;Shim, Kyung-Ah;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.799-808
    • /
    • 2002
  • According to the wide-spread of information transmission system over network, the use of cryptographic system to provide the integrity of transmitted message over network is increasing and the importance of that is emphasized. Because the security of the cryptographic system totally relies on the key, key management is a essential part of cryptographic system. A number of key agreement protocols have been proposed to far, but their rigorous security analysis is still open. In this paper, we analyze the features of Diffie-Hellman based standard key agreement protocols and provide the security analysis of those protocols against several kinds of active attacks.

Efficient On-line Secret Sharing scheme based on One-way Hash Function (일반향 해쉬 함수에 기반한 효율적인 온라인 비밀분산 방식)

  • Oh, Soo-Hyun;Kim, Seung-Joo;Won, Dong-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3128-3137
    • /
    • 2000
  • Secret sharing scheme is a cryptographic protocol in which a dealer distribures shares of a secret among a set of participants such that only authorized set of participants can recover the secret at a later. Secret sharing is an important cryptographic primitive in management of secret information, secure multiparty protocol and group-oriented cryptography, etc. In this paper, we propose an efficient, on-line secret sharing scheme based on one-way hash function. This scheme provides the property to share multiple secrets and allows participants to be added/deleted dynamically, without having to redistributo new shares. Proposed scheme has advantage to detect cheating and identify of all cheater, regardless of then number. Frthermore, it is more eficient than previous schemes.

  • PDF

The New Korea Innovation Systems: An Application of System Dynamics Approach (새로운 과학기술혁신체제의 시스템다이내믹스)

  • Won, Dong-Kyu;Yun, Jin-Hyo
    • Korean System Dynamics Review
    • /
    • v.6 no.1
    • /
    • pp.71-98
    • /
    • 2005
  • If Korea Research & Development reinforces integrated control function, indeed would Korea Research & Development's output be increased? Truly, could Korea's competition be ultimately improved with technology innovation and accumulation of knowledge. Can reinforcement of Integrated control that reinforced efficiency of Research & Development's investment effects make Korea Research & Development's investment,itself, be decreased? I try to answer clearly that in a way to reorganize Korea technology Administration's system, introduced Korea Research & Development integrated control system's establishment is what to effect Korea innovation system's direction after answering clearly previous mentioned problems. In this study, to answer these problems view theoretical discussion about Korea innovation system, integrated control system and system dynamics. Set up analytic tools of system dynamics which includes Korea innovation system and integrated control system. Then, draw a general casual loop diagram, which includes established Korea Research & Development's integrated control system, of Korea innovation system's activity. In based these, develop situation model to analyze trend of Korea innovation system and derive a political meaning by analyzing value of Korea innovation system's major inflow, outflow and stock variations according to extent of Korea Research & Development's integrated control in the same model.

  • PDF

Real-time Operation Analysis for Stand-alone Microgrid using RTDS (RTDS를 이용한 독립형 마이크로그리드의 실시간 동작 분석)

  • Lee, Yoon-Seok;Han, Byung-Moon;Won, Dong-Jun;Lee, Hak Ju
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.10
    • /
    • pp.1393-1401
    • /
    • 2014
  • In this paper the operational characteristics of stand-alone microgrid was analyzed using RTDS simulation models. The accuracy of developed simulation models were verified by comparing with the analysis results using the PSCAD/EMTDC simulation models. The proper scenarios and operation algorithms were developed and analyzed in accordance with various situations that can occur in the actual system, so as to establish operation scheme for the stand-alone microgrid system. The developed simulation models can be effectively utilized to design a newly installed stand-alone microgrid and to develop various operation scenarios for stand-alone microgrid. And these models can be applied for analyzing the transient phenomena due to system fault so that system protection can be properly designed.

A Secure Attribute-based Authentication Scheme for Cloud Computing (클라우드 컴퓨팅을 위한 안전한 속성기반 인증 기법)

  • Moon, Jongho;Choi, Younsung;Won, Dongho
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.8
    • /
    • pp.345-350
    • /
    • 2016
  • Cloud computing services have different characteristics from the traditional computing environment such as resource sharing, virtualization, etc. These characteristics of cloud computing environment necessitate specific properties such as user identify, access control, security control property, etc. Recently, Yoo proposed an attribute-based authentication scheme for secure cloud computing. However, Yoo's authentication scheme is vulnerable to customer attack and an adversary can modify the authentication request message. In this paper, we propose a secure and efficient attribute-based authentication scheme for cloud computing based on Yoo's scheme.

Improvement of Okamoto-Uchiyama Probabilistic Public Key Cryptosystem (Okamoto-Uchiyama 확률 공개키 암호 방식의 효율성 개선)

  • Choi, Duk-Hwan;Kim, Hyun-Jue;Choi, Seung-Bok;Won, Dong-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.346-351
    • /
    • 2002
  • We improve a new probabilistic public key cryptosystem, in which the one wav function was defined only on the discrete logarithmic functions, proposed by Okamoto and Uchiyama. The plaintexts are calculated from the modular product of two these functions, one of which has a fixed value depending on a given public key. The improvement is achieved by a well-chosen public key assuming an unit element 1 as the fixed function value. Because it is possible to reduce the number of operations at the decryption. Also the concrete method for a public key of our improved scheme is suggested.

A JTAG Protection Method for Mobile Application Processors (모바일 애플리케이션 프로세서의 JTAG 보안 기법)

  • Lim, Min-Soo;Park, Bong-Il;Won, Dong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.4
    • /
    • pp.706-714
    • /
    • 2008
  • In this paper, we suggest a practical and flexible system architecture for JTAG(Joint Test Action Group) protection of application processors. From the view point of security, the debugging function through JTAG port can be abused by malicious users, so the internal structures and important information of application processors, and the sensitive information of devices connected to an application processor can be leak. This paper suggests a system architecture that disables computing power of computers used to attack processors to reveal important information. For this, a user authentication method is used to improve security strength by checking the integrity of boot code that is stored at boot memory, on booting time. Moreover for user authorization, we share hard wired secret key cryptography modules designed for functional operation instead of hardwired public key cryptography modules designed for only JTAG protection; this methodology allows developers to design application processors in a cost and power effective way. Our experiment shows that the security strength can be improved up to $2^{160}{\times}0.6$second when using 160-bit secure hash algorithm.

Dynamic performances of output power of wind turbine and fuel-cell hybrid system (풍력-연료전지 하이브리드 시스템 출력의 동특성 분석)

  • Moon, Dae-Seong;Kim, Yun-Seong;Seo, Jae-Jin;Won, Dong-Jun;Park, Young-Ho;Moon, Seung-Il
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.545-546
    • /
    • 2007
  • A hybrid system that uses a parallel combination of wind turbine and fuel cell is modeled. Wind energy source is characterized by its intermittent and variable nature. The output power generated by the fuel cell is stable and can be properly controlled. Therefore, fuel cell system can be added to the wind turbine system for the purpose of ensuring continuous power flow. Fuel cell helps to compensate power and regulate the frequency in power system. Simulation results show the effect of the hybrid system on power regulation. The excess power generated by the wind turbine was directed to an electrolyzer to generate hydrogen and the power deficit was compensated by the fuel cell.

  • PDF

A Study on the Integrated Digital Signature System for Smart Card (지능형 전자 증명 카드에 적합한 통합 서명 시스템에 관한 연구)

  • 김승주;이보영;원동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.4
    • /
    • pp.870-879
    • /
    • 1997
  • At crypto'89 meeting, D. chaum suggested an undeniable signature scheme. Undeniable signatures are verified via a protocol between the signer and verifier, so the cooperation of the signer is necessary. So far, ther have been several variants of undeniable signatures to obtain a signature scheme, which can control the abous of ordinary digital signatures. In this paper we integrate these variants into a generalized undeniable-type signature scheme. Also, it will be pointed out, that undeniable signature schemes but its first realization are vulnerable in full view of eavesdropping third party. Moreover, to solve this problem, we propose a new type of digital signature, called "result-indisting-uishable undeniable signature" and construct a practical protocol that implements it.

  • PDF