• Title/Summary/Keyword: Key Encapsulation Mechanism

Search Result 7, Processing Time 0.026 seconds

Key Encapsulation Mechanism

  • 박제홍;권대성
    • Review of KIISC
    • /
    • v.14 no.5
    • /
    • pp.44-49
    • /
    • 2004
  • 비밀키 암호의 키 관리 문제를 해결하기 위해 제안된 공개키 암호는 효율성이나 제한된 메시지 영역으로 인해, 실제로는 메시지의 암호화에는 비밀키 암호를 사용하고 이때 사용되는 키를 메시지를 보낼 상대방과 안전하게 공유하기 위한 용도로 공개키 암호를 사용하는 하이브리드 형태가 일반적으로 사용된다. 최근 Shoup에 의해 제안된 Key Encapsulation Mechanism (KEM)은 이러한 공개키 암호의 실제 사용 용도를 감안하여 제안된 모델로 Data Encapsulation Mechanism (DEM)과 함께 안전한 하이브리드 공개키 암호를 설계하는 하나의 이론적인 모델을 제시하며, 이를 이용하여 만들어진 하이브리드 암호는 최근의 공개키 암호 표준화 작업에서 하나의 주류로 받아들여지고 있다. 본 논문에서는 최근 공개키 암호의 새로운 적용 방식으로 주목받고 있는 KEM과 함께, 이와 관련된 공개키 암호 표준화 작업에 대해서 구체적으로 알아본다.

Biometric Authentication Protocol Using Hidden Vector Key Encapsulation Mechanism (HV-KEM을 이용한 생체 정보 기반 인증 프로토콜)

  • Seo, Minhye;Hwang, Jung Yeon;Kim, Soo-hyung;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.69-79
    • /
    • 2016
  • Biometric authentication is considered as being an efficient authentication method, since a user is not required to possess or memorize any other information other than biometrics. However, since biometric information is sensitive and could be permanently unavailable in case of revealing that information just once, it is essential to preserve privacy of biometrics. In addition, since noise is inherent in the user of biometric recognition technologies, the biometric authentication needs to handle the noise. Recently, biometric authentication protocols using fuzzy extractor have been actively researched, but the fuzzy extractor-based authentication has a problem that a user should memorize an additional information, called helper data, to deal with their noisy biometric information. In this paper, we propose a novel biometric authentication protocol using Hidden Vector Key Encapsulation Mechanism(HV-KEM) which is one of functional encryption schemes. A primary advantage of our protocol is that a user does not need to possess or memorize any additional information. We propose security requirements of HV-KEM necessary for constructing biometric authentication protocols, and analyze our proposed protocol in terms of correctness, security, and efficiency.

Encapsulation of 2,4-Dihydroxybenzophenone into Dodecylbenzenesulfonate Modified Layered Double Hydroxide for UV Absorption Properties

  • Li, Shifeng;Shen, Yanming;Liu, Dongbin;Fan, Lihui;Wu, Keke
    • Bulletin of the Korean Chemical Society
    • /
    • v.35 no.2
    • /
    • pp.392-396
    • /
    • 2014
  • New organic-inorganic composite of 2,4-dihydroxybenzophenone (BP-1) encapsulation into dodecylbenzenesulfonate (DBS) modified layered double hydroxide (LDH) was successfully prepared. The surface, structural, thermal and absorption properties of the BP-1/DBS-LDH nanohybrid was characterized by BET analysis, scanning electron microscopy (SEM), X-ray diffraction (XRD), Fourier transform infrared spectroscopy (FT-IR), thermogravimetric analysis (TG) and diffuse reflectance UV-Vis absorbance spectra (DRUV-vis). The interlayer configuration of composite and the adsorption mechanism of BP-1 on MgAl-DBS-LDH were discussed. It was suspected that DBS anions located in the form of monolayer arrangement with a $75^{\circ}$ anti parallel angle between dodecylbenzenesulfonate chain axis. The diffuse reflectance UV-Vis absorbance results revealed that the UV absorbing wavelength of BP-1/DBS-LDH evidently extends to about 400 nm, which shows that the BP-1/DBS-LDH has the potential application as a UV absorber.

KpqC 공모전 1 라운드 격자 기반 PKE/KEM 알고리즘 분석

  • Joohee Lee
    • Review of KIISC
    • /
    • v.33 no.3
    • /
    • pp.39-47
    • /
    • 2023
  • 양자컴퓨팅 기술이 발전함에 따라, 양자컴퓨터를 이용한 공격에도 안전한 암호인 양자내성암호(Post-Quantum Cryptography, PQC) 기술의 중요성이 대두되고 있다. NIST에서는 2016년부터 시작된 표준화 공모 1,2,3 라운드를 통해 2022년 공개키 암호 및 Key-establishment, 전자서명 분야의 양자내성암호 표준을 선정한 바 있으며, 현재는 4 라운드와 전자서명 분야 추가 선정 공모를 진행 중이다. 이러한 배경에서 2022년 국내에서도 양자내성암호 알고리즘 표준화 공모인 KpqC 공모전 1라운드를 시작하였고, 공개키 암호 및 Key-establishment 7종, 전자서명 9종의 알고리즘이 표준 후보로 제출되었다. 본고에서는 KpqC 공모전 1 라운드 공개키 암호 및 Key-establishment 알고리즘 중 격자 기반 공개키 암호/KEM(Key Encapsulation Mechanism) 알고리즘 3종 NTRU+, SMAUG, TiGER에 대해 분석 및 소개한다. 각 알고리즘의 기반 문제, 설계 방식, 특징, 안전성 분석 방식 등을 분석하고, 구현성능을 비교 분석한다.

Security Analysis on TiGER KEM in KpqC Round 1 Competition Using Meet-LWE Attack (KpqC 1 라운드 TiGER KEM의 Meet-LWE 공격에 대한 안전성 분석)

  • Joohee Lee;Eun-min Lee;Jiseung Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.709-719
    • /
    • 2023
  • Recently, Post-Quantum Cryptography (PQC), which is secure against attacks using quantum computers, has been actively studied. In 2022, the KpqC competition, a competition for domestic PQC standardization, was launched, and a total of 16 candidate algorithms were received, and the first round is underway. In this paper, we apply Alexander May's Meet-LWE attack to TiGER, a lattice-based key encapsulation mechanism that is a candidate for the first round of the KpqC competition, and analyze its concrete attack complexity. The computational results of applying the Meet-LWE attack to each of the proposed parameters of TiGER show that the proposed TiGER192 parameter, which targets 192-bit quantum security, actually achieves 170-bit classical security. In addition, we propose a parameter setting to increase the attack complexity against the Meet-LWE attack.

Compression Method for IPSec over 6LoWPAN

  • Wang, Huqing;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1819-1831
    • /
    • 2018
  • This paper focuses on a header compression method for the Authentication Header (AH) and Encapsulation Security Payload (ESP) for application to 6LoWPAN. Based on the context, an extendible compression method is developed by analysing each field of the AH and ESP. The method is carried out by resetting the AH and ESP header compression formats, adding a MOD field, and setting different working modes. Authentication, encryption, and a mixture of certification and encryption are provided as flexible options. In addition, the value of the original IPv6 extensible header ID (EID) field can be retained, while the number of occupied NHC_ID values can be decreased for future extendibility. The experimental results show the feasibility and validity of the current compression method. By comparison with other solutions, the new mechanism is demonstrated to be advantageous in terms of compression ratio, flexibility and extendibility.

A Experimental Study on the Translation from Korean Digital Topographic Maps to Distributed Objects (수치지형도의 객체화 변환에 관한 연구)

  • 황철수
    • Spatial Information Research
    • /
    • v.7 no.2
    • /
    • pp.255-269
    • /
    • 1999
  • This is an experimental study to translate the Korean digital topographic maps into distributable information-hide objects, which are designed with object-oriented development's key features ; encapsulation, polymorphism, inheritance, In order to achieve this goal , the characteristics of the data mode and inter-relationships of digital topographic maps are investigated . As a result, it is revealed that the current Korean digital topographic maps, which is organized into so many individual layers of mixed spatial and attributed data, have to explicit and concrete hierarchies in spatial data model and data definition . Due to this limitation , data layer stage and object class stage are integrated. And ISCO(the is-computer -of relationships) mechanism is mainly used to develop the objects of digital topogrpahic maps, which is implemented with spatial primitive classes. the designed objects are coded with JAVA and then testified in web interface.

  • PDF