• 제목/요약/키워드: Authentication Algorithm

검색결과 476건 처리시간 0.025초

ESP 프로토콜에서의 문제점 보완 알고리즘 (The problem resolution algorithm in ESP protocol)

  • 이영지;김태윤
    • 정보처리학회논문지C
    • /
    • 제9C권2호
    • /
    • pp.189-196
    • /
    • 2002
  • IPSec은 공용 네트워크 상에서 암호화와 인증, 무결성을 제공하기 위해 사용되는 프로토콜이다. IPSec에서는 전송되는 패킷에 암호화와 인증, 무결성을 추가해 전달하기 위해 ESP프로토콜을 사용한다. ESP는 패킷 암호화를 위해 DES-CBC 알고리즘을 이용하는데 이 모드에서는 ESP프로토콜로 보호되어 전송되는 데이터를 암호화하기 위한 초기 값으로 IV(Initialization Vector) 값을 사용한다. 이 값은 수신 측의 패킷 복호화를 위해 공개적으로 전달되므로 중간에 공격자에 의해 공격당할 위험이 많다. IV의 값이 조금이라도 변경되면 ESP의 모든 데이터의 복호화가 이루어지지 않고 상위 레벨의 정보가 변경되는 통 심각한 문제가 발생한다. 이것은 보안을 목적으로 하는 IPSec에서는 치명적인 약점이 된 수 있다. 따라서 본 논문에서는 ESP프로토콜에서의 문제점인 IV를 안전하게 전송하기 위한 새로운 알고리즘을 제시한다. 이 방법은 IV 값을 DES-ECB 알고리즘을 이용하여 암호화하여 IV 공격을 방어하고 메시지 인증 함수를 추가 적용하여 ESP 전체 데이터의 무결성 체크도 가능하게 한다. 제안된 알고리즘으로 IV와 데이터에 대한 공격을 방어할 수 있고 안전한 전송을 보장한다.

외부 해킹 방지를 위한 CAN 네트워크 침입 검출 알고리즘 개발 (Development of CAN network intrusion detection algorithm to prevent external hacking)

  • 김현희;신은혜;이경창;황용연
    • 한국산업융합학회 논문집
    • /
    • 제20권2호
    • /
    • pp.177-186
    • /
    • 2017
  • With the latest developments in ICT(Information Communication Technology) technology, research on Intelligent Car, Connected Car that support autonomous driving or services is actively underway. It is true that the number of inputs linked to external connections is likely to be exposed to a malicious intrusion. I studied possible security issues that may occur within the Connected Car. A variety of security issues may arise in the use of CAN, the most typical internal network of vehicles. The data can be encrypted by encrypting the entire data within the CAN network system to resolve the security issues, but can be time-consuming and time-consuming, and can cause the authentication process to be carried out in the event of a certification procedure. To resolve this problem, CAN network system can be used to authenticate nodes in the network to perform a unique authentication of nodes using nodes in the network to authenticate nodes in the nodes and By encoding the ID, identifying the identity of the data, changing the identity of the ID and decryption algorithm, and identifying the cipher and certification techniques of the external invader, the encryption and authentication techniques could be detected by detecting and verifying the external intruder. Add a monitoring node to the CAN network to resolve this. Share a unique ID that can be authenticated using the server that performs the initial certification of nodes within the network and encrypt IDs to secure data. By detecting external invaders, designing encryption and authentication techniques was designed to detect external intrusion and certification techniques, enabling them to detect external intrusions.

Dragon-MAC: 인증 암호를 이용한 효율적인 무선센서네크워크 보안 (Dragon-MAC: Securing Wireless Sensor Network with Authenticated Encryption)

  • 임슈윤;푸천친;임효택;이훈재
    • 한국정보통신학회논문지
    • /
    • 제11권8호
    • /
    • pp.1519-1527
    • /
    • 2007
  • 센서 네트워크에서는 다양하고 폭 넓은 응용 프로그램을 위해서 경제적으로 실행 가능한 모니터링 솔루션을 제공한다. 대부분의 연구에서는 값싼 노드들을 겨냥해서 연구가 진행된다. 센서 네트워크들이 노출되는 보안위협들과 맞서기 위해서, 암호 프로토콜은 센서 노드들 사이에서 점대점 암호화 방식으로 암호화를 실행한다. 알려진 파괴와 속임 위협들은 전송시에 데이터를 암호화 하는 것과 동시에 데이터 소스를 인증하는 것에 의해서 막을 수 있다. 제한된 자원을 가진 노드들에서 저 전력 장치들에게 효과적이라고 알려진 대칭키 알고리즘이 사용된다. 데이터보호는 Dragon Stream Cipher 대칭키 암호화와 새롭게 디자인된 Dragon-MAC Message Authentication Code를 짜 넣는 것에 의한 방법에 의해서 완전하게 된다. 제안된 알고리즘은 MAC 알고리즘에 의해서 요구되는 동작 계산값을 최소화 하기 위한 목적으로써 Dragon Stream Cipher을 기초로 한 계산된 몇몇의 데이터를 사용하기 위해서 디자인 되었다. 빠른 키 스트림 생성을 가진 문자 기반의 Stream Cipher 인 Dragon을 목표로 하여, 한정된 환경에 적합하다. 무선센서 노드에서 권한 암호화의 이행을 통한 실제 인증과 메시지 인증을 겨냥해서 우리의 프로토콜은 계획되었다.

Context-based Authentication Service for The Mobile Office

  • Yang, Jiyoung;Lee, Hyundong;Rhyoo, Shi-Kook;Chung, Mokdong
    • 한국멀티미디어학회논문지
    • /
    • 제15권12호
    • /
    • pp.1475-1484
    • /
    • 2012
  • Today many companies introduce new mobile office environments evolved from the recent rapid development in mobile device technologies. Most of the recent mobile office systems use a simple authentication scheme such as ID/Password. This method is easy to use, but it does not consider the user's context. Thus it cannot provide appropriate security service required by the user's proper contexts. Therefore, this paper proposes a context based authentication system which applies security level verification and uses fuzzy algorithm based on the importance of access authority control.

이웃한 두 Delaunay 삼각형이 만드는 특징점 사각형에 기반한 지문 인증 (Fingerprint Authentication Based on Minutiae Quandrangle Defined by Neighboring Two Delaunay Triangles)

  • 차순백;조상현;성효경;최홍문
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 제13회 신호처리 합동 학술대회 논문집
    • /
    • pp.721-724
    • /
    • 2000
  • This paper presents fingerprint authentication method based on minutiae quadrangle definded by neighboring two Delaunay triangles. In this method, we first make minutiae triangle through Delaunay triangulation which adaptively connect neighboring minutiae according to the local minutiae density distribution, and then use feature vectors in authentication which is extracted from the minutiae quadrangle formed by neighboring two minutiae triangles. This prevents the degradation of matching ratio caused by the errors in image processing or local deformation of the fingerprint, and we can authenticate more discriminately as this method reflects wider local area's topological features than the features extracted from the individual minutiae triangles. To evaluate the proposed algorithm's performance, experiment are conducted on 120 fingerprints, of which size is 256 ${\times}$ 364 with 500dpi resolution. Robust authentications are possible with low FRR.

  • PDF

Flexible Video Authentication based on Aggregate Signature

  • Shin, Weon;Hong, Young-Jin;Lee, Won-Young;Rhee, Kyung-Hyune
    • 한국멀티미디어학회논문지
    • /
    • 제12권6호
    • /
    • pp.833-841
    • /
    • 2009
  • In this paper we propose a flexible video authentication scheme based on aggregate signature, which provides authenticity of a digital video by means of cryptographic signature to guarantee right of users. In contrast to previous works, the proposed scheme provides flexible usages on content distribution system, and it allows addition of new contents to the signed contents and deletion of some parts of the signed contents. A modification can be done by content owner or others. Although contents are modified by one or more users, our scheme can guarantee each user's right by aggregation of the each user's signatures. Moreover, proposed scheme has half size of Digital Signature Algorithm (DSA) with comparable security.

  • PDF

A Security Framework for Archiving the Permission of Mobile Terminal in Wireless Environment

  • Byun, Byung-Kil;Lee, Ki-Young
    • Journal of information and communication convergence engineering
    • /
    • 제9권2호
    • /
    • pp.187-192
    • /
    • 2011
  • Traditional voice traffic over mobile communication has been changed into data and media contents traffic, which makes traffic amount increases and speedy data transfer required. In the near future ubiquitous mobile terminal environment will be common so that security issues will arise due to many heterogeneous equipments and connections. In this paper, many previous methods used for terminal authentication are examined. And we propose new system model which uses our novel user authentication protocol based on strong one-time password (OTP) and short message service (SMS). We verify our system model and protocol by implementation.

고기능 RFID 태그를 위한 보안 프로토콜 (A Secure Protocol for High-Performance RFID Tag)

  • 박진성;최명열
    • 전기학회논문지P
    • /
    • 제54권4호
    • /
    • pp.217-223
    • /
    • 2005
  • In this paper, we have proposed a secure dynamic ID allocation protocol using mutual authentication on the RFID tag. Currently, there are many security protocols focused on the low-price RFID tag. The conventional low-price tags have limitation of computing power and rewritability of memory. The proposed secure dynamic ID allocation protocol targets to the high-performance RFID tags which have more powerful performance than conventional low-price tag by allocating a dynamic ID to RFID using mutual authentication based on symmetric encryption algorithm. This protocol can be used as a partial solution for ID tracing and forgery.

Enhanced Machine Learning Algorithms: Deep Learning, Reinforcement Learning, and Q-Learning

  • Park, Ji Su;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • 제16권5호
    • /
    • pp.1001-1007
    • /
    • 2020
  • In recent years, machine learning algorithms are continuously being used and expanded in various fields, such as facial recognition, signal processing, personal authentication, and stock prediction. In particular, various algorithms, such as deep learning, reinforcement learning, and Q-learning, are continuously being improved. Among these algorithms, the expansion of deep learning is rapidly changing. Nevertheless, machine learning algorithms have not yet been applied in several fields, such as personal authentication technology. This technology is an essential tool in the digital information era, walking recognition technology as promising biometrics, and technology for solving state-space problems. Therefore, algorithm technologies of deep learning, reinforcement learning, and Q-learning, which are typical machine learning algorithms in various fields, such as agricultural technology, personal authentication, wireless network, game, biometric recognition, and image recognition, are being improved and expanded in this paper.

Analyses of RFID System Using Lighted Weight Algorithm

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • 제7권1호
    • /
    • pp.19-23
    • /
    • 2009
  • In this paper, we propose a general idea about an RFID system which provides lighted weight algorithm. We discuss how RFID could be applied for this kind of system, especially, compact protocol. We evaluate a few protocols that have been suggested for use in passive RFID tagged systems. We can reduce security computation without losing security features by message integration and pre-computation in this paper. And the proposed protocol can be used in low-cost RFID systems that require a small computational load for both the back-end database and the tags.