• Title/Summary/Keyword: 일회성 난수

Search Result 13, Processing Time 0.018 seconds

RFID Mutual Authentication Protocol with Security and Performance Improvements (안전성과 성능을 개선한 RFID 상호인증 프로토콜)

  • Hong, Sung-Hyuk;Park, Jong-Hyuk;Yeo, Sang-Soo;Ha, Kyung-Jae
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.6
    • /
    • pp.876-883
    • /
    • 2009
  • In 2008, Kim-Jun proposed RFID Mutual Authentication Protocol based on One-Time Random Numbers which are strong in Eavesdropping Attack, Spoofing attack and Replay attack. However, In 2009, Yoon-Yoo proved that it was weak in Replay attack and proposed a protocol which can prevent Replay attack. But Yoon-Yoo's protocol has problems that efficiency on communication and Brute-force attack. This paper shows weak points of Yoon-Yoo's protocol and proposes an RFID mutual authentication protocol with security and performance improvements.

  • PDF

Development of Seat Allocation Model with Individual Demand's Diversion and Upgrade (개인수요의 상.하 이동을 고려한 좌석할당모형 개발)

  • Lee, Hwi-Young
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.5
    • /
    • pp.156-165
    • /
    • 2007
  • The concepts of static seat allocation model has been used widely in the air transportation industry, and proven as a good concepts for managing perishable assets. The paper analyzed, in realistic environment, the volume of Accept Demand and Reject Demand through several times' simulation experiments at each fare level by using C-Program analyzing process applied to upward and downward models of demand, to analyze the change of fare level when upward and downward shifts of fare levels' demand happen at once. As a consequence, I concluded that the revenue of the case to consider the both shifts of demand at each fare level is bigger than that of the case to consider the single shift of demand at each fare level, except the case to downsize the seat allotment at very low price when supply is bigger than demand, with developing a general model concerned with plural fare levels.

Design of PUF-Based Encryption Processor and Mutual Authentication Protocol for Low-Cost RFID Authentication (저비용 RFID 인증을 위한 PUF 기반 암호화 프로세서와 상호 인증 프로토콜 설계)

  • Che, Wonseok;Kim, Sungsoo;Kim, Yonghwan;Yun, Taejin;Ahn, Kwangseon;Han, Kijun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.12
    • /
    • pp.831-841
    • /
    • 2014
  • The attacker can access the RFID systems illegally because authentication operation on the RFID systems are performed in wireless communication. Authentication methods based on the PUF were presented to defend attacks. Because of Hash and AES, the cost is expensive for the low-cost RFID tag. In this paper, the PUF-based encryption processor and the mutual authentication protocol are proposed for low-cost RFID authentication. The challenge-response pairs (PUF's input and output) are utilized as the authentication key and encrypted by the PUF's characteristics. The encryption method is changed each session and XOR operation with random number is utilized. Therefore, it is difficult for the attacker to analyze challenge-response pairs and attack the systems. In addition, the proposed method with PUF is strong against physical attacks. And the method protects the tag cloning attack by physical attacks because there is no authentication data in the tag. Proposed processor is implemented at low cost with small footprint and low power.