• 제목/요약/키워드: Authentication/Integrity

검색결과 361건 처리시간 0.025초

OTP를 이용한 인터넷뱅킹 시스템의 다중 채널 인증 기법 (A Multichannel Authentication Technique In The Internet Banking System Using OTP)

  • 윤승구;박재표
    • 디지털산업정보학회논문지
    • /
    • 제6권4호
    • /
    • pp.131-142
    • /
    • 2010
  • Due to the development of the Internet, Internet banking that we are liberated from time and space has evolved into banking system. So modern life became comfortable. However, Dysfunction (malicious Information leakage and hacking etc.) of the Internet development has become a serious social problem. According to this, The need for security is rapidly growing. In this paper, we proposed the Internet Banking Authentication System using a dual-channel in OTP(One Time Password) authentication. This technology is that A user transfer transaction information to Bank through one Internet channel then bank transfer transaction information to user using the registered mobile phone or smart phone. If user confirm transaction information then bank request user's OTP value. User create OTP value and transfer to bank and bank authenticate them throgth the ARS. If authentication is pass then transaction permitted. Security assessment that the proposed system, the security requirement that the confidentiality and integrity, authentication, repudiation of all of the features provide a key length is longer than the current Internet banking systems, such as using encryption, the security provided by the Financial Supervisory Service Level 1 rating can be applied to more than confirmed.

TTS기반에서 디지털 서명의 실행 인증을 통한 에이전트의 무결성 보장 기법 (Integrity Guarantee Scheme of Mobile Agents through Authentication of Digital Signature with TTS)

  • 정창렬;윤홍상
    • 한국통신학회논문지
    • /
    • 제31권6C호
    • /
    • pp.651-657
    • /
    • 2006
  • 여기는 본 논문은 이동 에이전트의 안전한 수행을 보장하기 위한 TTS기반의 디지털 서명 실행 인증 기법을 제안한다. 즉 기존의 연구의 문제점인 처리과정에서 발생하는 시스템의 처리속도와 네트워크의 트래픽을 개선한다. 또한 효율적이고 안전한 이동 에이전트의 실행과 무결성을 보장하기 위해 디지털 서명을 이용한다. 디지털 서명은 합성함수와 공개키 기반의 암호화 알고리듬 그리고 해시함수를 이용한 인증서 체인을 한다. 그리고 디지털 서명의 인증서 체인을 이용할 경우, 공격자에 의해서 체인을 끊고 새로운 인증서를 생성하여 삽입하는 공격으로부터 안전하게 보호한다. 또한 공격자에 의해 정직한 호스트를 악의적으로 이용될 수 있는 위협으로부터 보호한다. 그리고 컴퓨터 실험을 통해 인증서 처리에 대한 시스템의 처리속도와 실시간 처리를 분석한다. 이러한 분석을 통해서 시스템의 오버헤드와 네트워크의 트래픽에 대한 효율성을 증명한다.

FPGA Implementation of a Cryptographic Accelerator for IPSec authentications

  • Lee, Kwang-Youb;Kwak, Jae-Chang
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 ITC-CSCC -2
    • /
    • pp.948-950
    • /
    • 2002
  • IPSec authentication provides support for data integrity and authentication of IP packets. Authentication is based on the use of a message authentication code(MAC). Hash function algorithm is used to produce MAC , which is referred to HMAC. In this paper, we propose a cryptographic accelerator using FPGA implementations. The accelator consists of a hash function mechanism based on MD5 algorithm, and a public-key generator based on a Elliptiv Curve algorithm with small scale of circuits. The accelator provides a messsage authentification as well as a digital signature. Implementation results show the proposed cryptographic accelerator can be applied to IPSec authentications.

  • PDF

Design and Implementation of the Authentication System for In-app Billing in Mobile Environments

  • Seok, Ho-Jun;Kim, Seog-Gyu
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권2호
    • /
    • pp.61-69
    • /
    • 2016
  • In this paper, we propose the authentication server system that prevent hacking in In-app billing applications. And we also propose the methods to verify electronic receipt for the payment of internal app payments and to check the integrity of the applications. Then we designed the payment metabolic system that checks between products-offer list and paid subscription if payment system is hacked with new hacking technologies different from existing ones. And then we implemented proposed authentication system and experimented with about 10,000 average internal application payments per an hour. It shows that proposed system has defensive techniques that counter attacks against in-app billing but it takes more than 0.8916 seconds than no-certification system that is considered as relatively short time.

CALS체계의 정보보호 구조 연구 (A Study on the Security Architecture of CALS System)

  • 남길현
    • 한국전자거래학회지
    • /
    • 제4권2호
    • /
    • pp.197-208
    • /
    • 1999
  • With developing computer and communication technologies, the concept of CALS system has been popular not only to military but also to commercial industries. The security problem is one of the most critical issues to construct CALS infrastructure. The CALS system needs some security functions such that data confidentiality, integrity, authenticity, availability, and non-repudiation. This paper proposes a security architecture model in CALS. The security architecture model is composed of 5 submodels such that network security model, authentication and key management model, operation and audit model, integrated database security model, and risk analysis model.

  • PDF

IEEE 802.1x 프레임워크 기반에서의 무선랜 보안 강화 방안에 관한 연구 (A Study on Intensified scheme to WLAN Secure based on IEEE 802.1x Framework)

  • 이준;홍성표;신명숙
    • 한국정보통신학회논문지
    • /
    • 제10권1호
    • /
    • pp.136-141
    • /
    • 2006
  • IEEE 802.1x는 EAP(Extended Authentication Protocol)를 통해 해쉬 함수를 이용한 Challenge/Response, Keberos, 인증서를 기반으로 하는 TLS, One-Time Password 등 다양한 사용자인증 메커니즘들을 지원한다. 그러나 AP에 대한 인증 및 암호 메커니즘의 부재와 인증 프로토콜의 구조적 원인에 의해 스푸핑 및 DoS(Denial of Service) 공격 등에 취약하다. 본 논문에서는 IEEE 802.1x 프레임워크의 스푸핑 및 DoS 공격 취약성을 보완하여 안전한 사용자 인증 및 암호통신 서비스를 제공하는 무선랜 보안시스템을 제안하고자 한다. 제안 시스템은 공개키 암호기술을 이용하여 전송 메시지에 대한 무결성 서비스를 통해 안전한 암호통신을 제공하며, 인증초기단계를 통해 DoS 공격을 방지한다.

Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol

  • Shi, Shanyu;Choi, Seungwon
    • 디지털산업정보학회논문지
    • /
    • 제13권1호
    • /
    • pp.87-101
    • /
    • 2017
  • As people increasingly rely on mobile networks in modern society, mobile communication security is becoming more and more important. In the Long Term Evolution/System Architecture Evolution (LTE/SAE) architecture, the 3rd Generation Partnership (3GPP) team has also developed the improved Evolved Packet System Authentication and Key Agreement (EPS AKA) protocol based on the 3rd Generation Authentication and Key Agreement (3G AKA) protocol in order to provide mutual authentication and secure communication between the user and the network. Unfortunately, the EPS AKA also has several vulnerabilities such as sending the International Mobile Subscriber Identity (IMSI) in plain text (which leads to disclosure of user identity and further causes location and tracing of the user, Mobility Management Entity (MME) attack), man-in-middle attack, etc. Hence, in this paper, we analyze the EPS AKA protocol and point out its deficiencies and then propose an Efficient and Security Enhanced Authentication and Key agreement (ESE-EPS AKA) protocol based on hybrid of Dynamic Pseudonym Mechanism (DPM) and Public Key Infrastructure (PKI) retaining the original framework and the infrastructure of the LTE network. Then, our evaluation proves that the proposed new ESE-EPS AKA protocol is relatively more efficient, secure and satisfies some of the security requirements such as confidentiality, integrity and authentication.

A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images

  • Nguyen, Thai-Son;Chang, Chin-Chen;Shih, Tso-Hsien
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권1호
    • /
    • pp.395-413
    • /
    • 2016
  • Image authentication is a technique aiming at protecting the integrity of digital images. Reversible image authentication has attracted much attention of researcher because it allows to authenticate tampered regions in the image and to reconstruct the stego image to its original version losslessly. In this paper, we propose a new, reversible image authentication scheme based on adaptive prediction error expansion (PEE) technique. In the proposed scheme, each image block is classified into smooth or complex regions. Then, according to the characteristic of each block, the authentication code is embedded adaptively to achieve high performance of tamper detection. The experimental results demonstrated that the proposed scheme achieves good quality of stego images. In addition, the proposed scheme has ability to reconstruct the stego image to its original version, if no modification is performed on it. Also demonstrated in the experimental results, the proposed scheme provides higher accuracy of tamper detection than state-of-the-art schemes.

협력기반 인증 기법을 통한 라우팅 성능 개선에 관한 연구 (A Study on Routing Performance Improvement through Cooperation Authentication Technique)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제12권1호
    • /
    • pp.71-79
    • /
    • 2016
  • The main security threats in MANET are integrity and non-repudiation. In the meantime, a lot of secure routing protocols have been designed in order to block these security threats. In this paper, partnership-based authentication technique is proposed in order to provide participation exclusion of network and non-repudiation for the nodes. The proposed technique is a technique that participates in data communication for only the nodes receiving the authentication through the authentication process for the nodes. For this, the proposed technique is largely consists of two steps. The first step is the process that issued the certificate after the reliability for the nodes participating in the network is evaluated. And in the second step, the key exchange agreement with the neighbor nodes is performed and data communication is made after setting security path with responding nodes. The level of security in data transmission is improved because the process of path setting is performed through cooperation with a neighboring nodes having high reliability during the course of these two steps. The superiority of proposed technique in this paper was confirmed through the comparative experiment.

메시지 인증 코드에 대한 연구 동향 분석 및 성능 비교 (Analysis of Research Trend and Performance Comparison on Message Authentication Code)

  • 김민우;권태경
    • 정보과학회 논문지
    • /
    • 제43권11호
    • /
    • pp.1245-1258
    • /
    • 2016
  • 다양한 기기들이 상호 연결되어 통신하는 IoT 환경에서는 보안 위협을 방지하기 위해 암호 알고리즘, 메시지 인증 코드 등 기밀성과 무결성을 제공하는 암호 기술을 사용한다. 안전성이 검증된 기존 암호 기술들이 다수 존재하지만, 저전력 저성능의 마이크로 컨트롤러 기반 IoT 기기에 기존 암호 기술을 그대로 사용하기 어렵기 때문에 다양한 경량 암호 기술이 등장하게 되었다. 최근 경량 블록 암호 알고리즘에 대한 연구는 꾸준히 증가하고 있지만, 경량 메시지 인증 코드에 대한 연구는 미흡한 실정이다. 따라서, 본 논문에서는 다양한 메시지 인증 코드에 대한 분류 분석을 통해 향후 메시지 인증 코드의 발전 방향에 대해 제시한다. 또한, 기반 기술별 대표 알고리즘을 실제 마이크로 컨트롤러에 구현 실험하여 저사양 환경에서의 알고리즘 성능 저하를 실증적으로 검증한다.