• Title/Summary/Keyword: Data Origin Authentication

Search Result 17, Processing Time 0.024 seconds

Message Authentication Code based on k-invertible Matrices (k-역행렬을 이용한 메시지 인증 기법)

  • Lee Hee Jung;Kim Tae Gwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.105-110
    • /
    • 2004
  • MAC is used for data origin authentication or message integrity protection. In Crypto'03 Cary and Venkatesan introduced new MAC based on unimodular matrix groups. It is to encrypt messages using private keys and to encrypt them again using public keys which are matrices whose determinants are $\pm$1. These matrices have property called k-invertible. This k effects on the collision probability of this new MAC. The smaller k is, the less collisions occur. Cary shows 6-invertible matrices, and 10-invertible matrices whose components are only 1, 0, -1. In this paper we figure out sufficient conditions about choosing 4 matrices among special 22 matrices. Also, we introduce 5-invertible matrices whose components are 1, 0, -1. Those have better efficiency and security.

Implementation of Secure I-Mail System based on lava (타원곡선 알고리즘을 이용한 안전한 자바 메일 시스템의 설계 및 구현)

  • 이원구;조한진;이재광
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.700-702
    • /
    • 2001
  • As computers and networks become popular, distributing information on the Interment is common in our daily life. Also, the explosion of the Internet, of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. But secure mall is gamins popularity abroad and domestically because of their nature of prodding security. That is. it has been used a variety of fields such as general mail and e-mail for advertisement But, As the data transmitted on network can be easily opened or forged with simple operations. Most of existing e-mall system don't have any security on the transmitted information. Thus, security mail system need to provide security including message encryption, content integrity, message origin authentication, and non-repudiation. In this paper, we design implement secure mall system with non-repudiation service and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services.

  • PDF

Implementation and Analysis Performance of CCM-UW based AES, ARIA Blockcipher for Underwater Environment (수중무선통신 환경에 적합한 AES, ARIA 블록암호 기반 CCM-UW 구현 및 성능 분석)

  • Lee, Jae-Hoon;Park, Minha;Yun, Nam-Yeol;Yi, Okyeon;Park, Soo-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.115-118
    • /
    • 2014
  • Underwater Wireless Communication System can be useful for research of quality of water, ocean resources exploration, analysis ocean environment and so on. However, there exist security threats including data loss, data forgery, and another variety of security threats, because of characteristics of water, various geographical factors, intended attack, etc. To solve these problem, in this paper, we propose a CCM-UW mode of operation modified form of CCM mode of operation, providing data confidentiality, integrity, origin authentication and anti-attack prevent, for the Underwater Wireless Communication System. By implementing CCM-UW in MACA protocol(Underwater Wireless Communication MAC Protocol) and measuring speed of communication, we confirm the applicability of the security and analyze the communication environment impact.

  • PDF

Implementation of Secure E-Mail System based on lava (자바기반의 안전한 전자 메일 시스템 구현)

  • 이원구;김성준;이희규;조한진;이재광
    • Journal of Internet Computing and Services
    • /
    • v.2 no.3
    • /
    • pp.51-62
    • /
    • 2001
  • Recently, as computers and networks become popular, distributing information on the Internet is common In our daily life. also, the explosion of the Internet. of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. The e-mail has been commonly used by users as well recognizing It as the standard of manners among users on the Internet. In the past, e-mail has been the primary choice of exchanging Information, but secure mail is gaining popularity abroad and domestically because of their nature of providing security. That is. it has been used a variety of fields such as general mail and e-mail for advertisement. But, As the data transmitted on network can be easily opened or forged with simple operations. most of existing e-mail system don't have any security on the transmitted information. Thus. security mail system need to provide security including message encryption, content Integrity, message origin authentication, and non-repudiation. In this paper, we design implement secure mail system with non-repudiation service and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services. API.

  • PDF

Design and Implementation of a Secure E-Mail System using Elliptic Curve Cryptosystem (타원곡선 암호 시스템을 이용한 보안 메일 시스템의 설계 및 구현)

  • Lee, Won-Goo;Kim, Sung-Jun;Lee, Hee-Gyu;Mun, Ki-Young;Lee, Jae-Kwang
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.333-345
    • /
    • 2002
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. Also, the explosion of the Internet, of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. But secure mail is gaining popularity abroad and domestically because of their nature of providing security. That is. It has been used a variety of fields such as general mail and e-mail for advertisement. But, As the data transmitted on network can be easily opened or forged with simple operations. Most of existing e-mail system don't have any security on the transmitted information. Thus, security mail system need to provide security including message encryption, content integrity, message origin authentication, and non-repudiation. In this paper, we design and implement secure mail system with secure key agreement algorithm, non-repudiation service, and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services.

Authentication of Sesame Oil with Addition of Perilla Oil Using Electronic Nose Based on Mass Spectrometry (전자코-Mass spectrometry를 이용한 들기름이 혼합된 참기름의 판별 분석)

  • Son, Hee-Jin;Kang, Jin-Hee;Hong, Eun-Jeung;Lim, Chae-Lan;Choi, Jin-Young;Noh, Bong-Soo
    • Korean Journal of Food Science and Technology
    • /
    • v.41 no.6
    • /
    • pp.609-614
    • /
    • 2009
  • Sesame oil was sometimes replaced by mixed oil due to high price in Korean market. To find out authentic sesame oil, electronic nose (E-nose) based on mass spectrometer system was used. Sesame oil was blended with perilla oil at the ratio of 97:3, 94:6, 91:9, 88:12 and 85:15, respectively. Intensities of each fragment from sesame oil by E-nose based on MS were completely different from those of perilla oil. The obtained data was used for discriminant function analysis. For quantitative analysis, the partial least square algorithm was used. The added concentration of perilla oil to sesame oil was correlated with discriminant function first score (DF1) and second score (DF2). From this relationship it could be found out how much perilla oil added. DFA plot indicated a significant separation of pure sesame oil and pure perilla oil. The different geographical origin of sesame oil was used for blending with perilla oil were closed to that of sesame oil. Korean sesame oil mixture and Indian sesame oil one were well separated. And the correlation between mixing ratios and DF1 values was found at the ratio of 97:3, 91:9, and 85:15 (SE vs PE oil), respectively. But the added concentration of perilla oil to sesame oil was correlated with discriminant function first score (DF1). E-nose based on MS system could be used as an efficient method for purity of oil quality.

Construction of DNA Profile Data Base of Strawberry Cultivars Using Microsatellite Markers (Microsatellite 마커를 이용한 딸기 품종의 DNA Profile Database 구축)

  • Hong, Jee-Hwa;Choi, Keun-Jin;Kwon, Yong-Sham
    • Horticultural Science & Technology
    • /
    • v.32 no.6
    • /
    • pp.853-863
    • /
    • 2014
  • This study was carried out to construct a DNA profile database of 100 strawberry cultivars using microsatellite markers. Two hundred seventy four microsatellite primer pairs were screened with a set of 21 strawberry cultivars with different morphological traits. Twenty five primer pairs were selected because they produced reliable and reproducible fingerprints. These primer pairs were used to develop DNA profiles of 100 strawberry cultivars. Three to thirteen alleles were detected by each marker with an average of 7.50. The average polymorphism information content varied from 0.331 to 841 (average 0.706). Cluster analysis showed that the 100 cultivars were divided into 7 major groups reflecting geographic origin and pedigree information. Moreover, most of the cultivars could be discriminated by marker genotypes. These markers will be useful as a tool for the protection of plant breeders' intellectual property rights in addition to providing the means to intervene seed disputes relating to variety authentication.