• Title/Summary/Keyword: Full authentication

Search Result 29, Processing Time 0.024 seconds

Software Implementation of WAVE Security Algorithms (WAVE 보안 알고리즘의 소프트웨어 구현)

  • Kang, Jung-Ha;Ok, Sung-Jin;Kim, Jae Young;Kim, Eun-Gi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.3
    • /
    • pp.1691-1699
    • /
    • 2014
  • IEEE developing WAVE specifications are able to support V2V and V2I wireless communications, and these functionalities can be used to enhance vehicle operational safety. To overcome any security weaknesses that are inherent in wireless communications, WAVE specification should support message encryption and authentication functions. In this study, we have implemented WAVE security algorithms in IEEE P1609.2 with openssl library and C language. We have verified the normal operation of implemented software, using the test vectors of related specifications, and measured their performance. Our software is platform independent, and can be used for the full implementation of WAVE specification.

Provably secure attribute based signcryption with delegated computation and efficient key updating

  • Hong, Hanshu;Xia, Yunhao;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2646-2659
    • /
    • 2017
  • Equipped with the advantages of flexible access control and fine-grained authentication, attribute based signcryption is diffusely designed for security preservation in many scenarios. However, realizing efficient key evolution and reducing the calculation costs are two challenges which should be given full consideration in attribute based cryptosystem. In this paper, we present a key-policy attribute based signcryption scheme (KP-ABSC) with delegated computation and efficient key updating. In our scheme, an access structure is embedded into user's private key, while ciphertexts corresponds a target attribute set. Only the two are matched can a user decrypt and verify the ciphertexts. When the access privileges have to be altered or key exposure happens, the system will evolve into the next time slice to preserve the forward security. What's more, data receivers can delegate most of the de-signcryption task to data server, which can reduce the calculation on client's side. By performance analysis, our scheme is shown to be secure and more efficient, which makes it a promising method for data protection in data outsourcing systems.

A Study of Patient's Privacy Protection in U-Healthcare (유헬스케어에서 환자의 프라이버시 보호 방안 연구)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.913-921
    • /
    • 2012
  • On the strength of the rapid development and propagation of U-healthcare service, the service technologies are full of important changes. However, U-healthcare service has security problem that patient's biometric information can be easily exposed to the third party without service users' consent. This paper proposes a distributed model according authority and access level of hospital officials in order to safely access patients' private information in u-Healthcare Environment. Proposed model can both limit the access to patients' biometric information and keep safe system from DoS attack using time stamp. Also, it can prevent patients' data spill and privacy intrusion because the main server simultaneously controls hospital officials and the access by the access range of officials from each hospital.

Network Architecture and Fast Vertical Handover Scheme for UMTS-WLAN Interworking (UMTS-WLAN 간 빠른 수직적 핸드오버 제공을 위한 연동망 모델 및 핸드오버 방식)

  • Kim, In-Cheol;Lee, Sung-Kuen;Kim, Eal-Lae;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.492-501
    • /
    • 2007
  • UMTS-WLAN interworking approach can make the best use of the advantages of both networks by eliminating the stand-alone defects of the two services. For the interworking mechanisms of WLANs and UMTS networks, two major solutions have been proposed, namely loose coupling and tight coupling. The loose coupling approach provides separate data paths for WLAN and UMTS. On the other hand, the tight coupling provides a full integration of the WLAN network and the UMTS core network. The loose coupling has been preferred due to the simplicity and less reconfiguration requirement. However, loose coupling is worse in seamless mobility, QoS provision, and network security. In order to lessen the problems involved in the UMTS-WLAN interworking approaches, we propose a new interworking network architecture and a fast vertical handover scheme by employing Mobility Anchor(MA) for interworking between the two different networks. MA can enable authentication and session initialization before L2 handover of the mobile terminal, so that the seamless and fast vertical handover become possible. Thru analysis and numerical experiments, we proved that the proposed scheme has been validated.

A Study of Message Communication Method Using Attribute Based Encryption in IoT Environment (IoT 환경에서 속성기반 암호화 기술을 활용한 메시지 통신 기법에 관한 연구)

  • Park, Jung-Oh
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.295-302
    • /
    • 2016
  • Many countries, especially ICT powers, are supporting IoT-based technology at a national level and this technology is actively being researched in the businesses and research institutes in an aim to develop technology and create an ecosystem. Roads in the Seoul city are building public facilities based on IoT to provide various services and conveniences for the users. However, for the full-fledged introduction and development of IoT, there are many cases where infringement on security and privacy and threat for life and safety happen. Also, as the IoT environment includes various environment technologies such as the existing sensor network, heterogeneous communication network, and devices optimized for the IoT environment, it inherits the existing security threat and various attack techniques. This paper researches the attribute based encryption technology for safe communication in the IoT environment. The data collected from the device is transmitted utilizing the attribute based encryption and by designing the key generation protocol, grades and authorities for the device and users are identified to transmit safe messages.

Development of SSR markers for genetic mapping of Korean ginseng and authentication of Korean ginseng cultivars

  • Kim, Nam-Hoon;Choi, Hong-Il;Jung, Ju-Yeon;Choi, Beom-Soon;Ahn, In-Ok;Lee, Joon-Soo;Yang, Tae-Jin
    • Proceedings of the Plant Resources Society of Korea Conference
    • /
    • 2010.10a
    • /
    • pp.11-11
    • /
    • 2010
  • The Korean ginseng, Panax ginseng C. A. Meyer is a popular medicinal herb in Araliaceae. Genetic map in crops provides valuable information for breeding, genetic and genomic researches. However, little information is available for construction of genetic map in ginseng. Up to now, we have produced large amounts of expressed sequence tags (ESTs) from four ginseng cultivars (37Mb, 49Mb, 39Mb, 47Mb from Gopoong, Gumpoong, Chunpoong and Yunpoong respectively using pyrosequencing technique and 5Mb from normalized full-length cDNA library of Chunpoong) to obtain comprehensive information of gene expression, and constructed EST database including ESTs from public database. Till now, we designed 261 SSR primer sets using EST sequences and identified 106 intergenic polymorphic markers. And 44 of the 106 showed polymorphisms among panax ginseng cultivars. Among 44 markers, 27 SSR polymorphic markers were inspected to 51 $F_2$ population from Yunpoong x Chunpoong, which showed good at the fitness of Mendellian segregation ratio 1:2:1. To enrich the number of markers, and thus construct high resolution genetic map which can be used as frame map for further genome sequencing. we are planning to develop large scale EST-derived SNP markers which are available in the F2 population. This study provides genetic information as well as foundation for ginseng researches such as genetics, genomics, breeding, and the final goal for whole genome sequencing. This study was supported by Technology Development Program for Agriculture and Forestry, Ministry for Food, Agriculture, Forestry and Fisheries, Republic of Korea (Grant No. 609001-051SB210).

  • PDF

Policy agenda proposals from text mining analysis of patents and news articles (특허 및 뉴스 기사 텍스트 마이닝을 활용한 정책의제 제안)

  • Lee, Sae-Mi;Hong, Soon-Goo
    • Journal of Digital Convergence
    • /
    • v.18 no.3
    • /
    • pp.1-12
    • /
    • 2020
  • The purpose of this study is to explore the trend of blockchain technology through analysis of patents and news articles using text mining, and to suggest the blockchain policy agenda by grasping social interests. For this purpose, 327 blockchain-related patent abstracts in Korea and 5,941 full-text online news articles were collected and preprocessed. 12 patent topics and 19 news topics were extracted with latent dirichlet allocation topic modeling. Analysis of patents showed that topics related to authentication and transaction accounted were largely predominant. Analysis of news articles showed that social interests are mainly concerned with cryptocurrency. Policy agendas were then derived for blockchain development. This study demonstrates the efficient and objective use of an automated technique for the analysis of large text documents. Additionally, specific policy agendas are proposed in this study which can inform future policy-making processes.

Improved Security Analysis of Reduced SMS4 Block Cipher (축소된 SMS4 블록 암호에 대한 향상된 안전성 분석)

  • Kim, Tae-Hyun;Kim, Jong-Sung;Hong, Seok-Hie;Sung, Jae-Chul;Lee, Chang-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.3-10
    • /
    • 2009
  • In this paper, we introduce improved differential and linear attacks on the SMS4 block cipher which is used in the Chinese national standard WAPI (WLAN Authentication and Privacy Infrastructure, WLAN - Wireless Local Area Network): First, we introduce how to extend previously known differential attacks on SMS4 from 20 or 21 to 22 out of the full 32 rounds. Second, we improve a previously known linear attack on 22-round reduced SMS4 from $2^{119}$ known plaintexts, $2^{109}$ memory bytes, $2^{117}$ encryptions to $2^{117}$ known plaintexts, $2^{l09}$ memory bytes, $2^{112.24}$ encryptions, by using a new linear approximation.

Characterizing a full spectrum of physico-chemical properties of (20S)-and (20R)-ginsenoside Rg3 to be proposed as standard reference materials

  • Kim, Il-Woung;Sun, Won Suk;Yun, Bong-Sik;Kim, Na-Ri;Min, Dongsun;Kim, Si-Kwan
    • Journal of Ginseng Research
    • /
    • v.37 no.1
    • /
    • pp.124-134
    • /
    • 2013
  • The authentication of the physico-chemical properties of ginsenosides reference materials as well as qualitative and quantitative batch analytical data based on validated analytical procedures is a prerequisite for certifying good manufacturing practice (GMP). Ginsenoside Rb1 and Rg1, representing protopanaxadiol and protopanaxatriol ginsenosides, respectively, are accepted as marker substances in quality control standards worldwide. However, the current analytical methods for these two compounds recommended by Korean, Chinese, European, and Japanese pharmacopoeia do not apply to red ginseng preparations, particularly the extract, because of the relatively low content of the two agents in red ginseng compared to white ginseng. In manufacturing fresh ginseng into red ginseng products, ginseng roots are exposed to a high temperature for many hours, and the naturally occurring ginsenoside Rb1 and Rg1 are converted to artifact ginsenosides such as Rg3, Rg5, Rh1, and Rh2 during the heating process. The analysis of ginsenosides in commercially available ginseng products in Korea led us to propose the inclusion of the (20S)- and (20R)-ginsenoside Rg3, including ginsenoside Rb1 and Rg1, as additional reference materials for ginseng preparations. (20S)- and (20R)-ginsenoside Rg3 were isolated by Diaion HP-20 adsorption chromatography, silica gel flash chromatography, recrystallization, and preparative HPLC. HPLC fractions corresponding to those two ginsenosides were recrystallized in appropriate solvents for the analysis of physico-chemical properties. Documentation of those isolated ginsenosides was achieved according to the method proposed by Gaedcke and Steinhoff. The ginsenosides were subjected to analyses of their general characteristics, identification, purity, content quantification, and mass balance tests. The isolated ginsenosides showed 100% purity when determined by the three HPLC systems. Also, the water content was found to be 0.534% for (20S)-Rg3 and 0.920% for (20R)-Rg3, meaning that the net mass balances for (20S)-Rg3 and (20R)-Rg3 were 99.466% and 99.080%, respectively. From these results, we could assess and propose a full spectrum of physico-chemical properties of (20S)- and (20R)-ginsenoside Rg3 as standard reference materials for GMP-based quality control.