• Title/Summary/Keyword: One-time Random number

Search Result 134, Processing Time 0.025 seconds

Improving an RFID Mutual Authentication Protocol using One-time Random Number (개선한 일회성 난수를 이용한 RFID 상호인증 프로토콜)

  • Yoon, Eun-Jun;Yoo, Kee-Young
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.2
    • /
    • pp.90-97
    • /
    • 2009
  • In 2008, Kim-Jun proposed a RFID mutual authentication protocol using one-time random number that can withstand malicious attacks by the leakage of important information and resolve the criminal abuse problems. Through the security analysis, they claimed that the proposed protocol can withstand various security attacks including the replay attack. However, this paper demonstrates that Kim-Jun' s RFID authentication protocol still insecure to the replay attack. In addition, this paper also proposes a simply improved RFID mutual authentication protocol using one-time random number which not only provides same computational efficiency, but also withstands the replay attack.

Design of RFID Mutual Authentication Protocol using One Time Random Number (일회성 난수를 이용한 안전한 RFID 상호인증 프로토콜 설계)

  • Kim, Dae-Jung;Jun, Moon-Seog
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.3
    • /
    • pp.243-250
    • /
    • 2008
  • Recently, researched RFID authentication protocols still have vulnerability of attack, such as location tracking attack, replay attack. spoofing attack etc. This paper designed method of making one time random number in DB server side unlike previously researched protocols, and it protects RFID communication from location tracking, replay attack and spoofing attack.

Random number sensitivity in simulation of wind loads

  • Kumar, K. Suresh
    • Wind and Structures
    • /
    • v.3 no.1
    • /
    • pp.1-10
    • /
    • 2000
  • Recently, an efficient and practical method has been developed for the generation of univariate non-Gaussian wind pressure time histories on low building roofs; this methodology requires intermittent exponential random numbers for the simulation. On the other hand, the conventional spectral representation scheme with random phase is found suitable for the generation of univariate Gaussian wind pressure time histories on low building roofs; this simulation scheme requires uniform random numbers. The dependency of these simulation methodologies on the random number generator is one of the items affecting the accuracy of the simultion result; therefore, an attempt has been made to investigate the issue. This note presents the observed sensitivity of random number sets in repetitive simulations of Gaussian and non-Gaussian wind pressures.

Design variation serial test using binary algorithm (이진 알고리즘을 이용한 변형 시리얼테스트 설계에 관한 연구)

  • Choi, Jin-Suk;Lee, Sung-Joo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.1
    • /
    • pp.76-80
    • /
    • 2010
  • It is floating to security of information and the early assignment that it is important it processes and to transmit in inundations of information that I changed suddenly. I used the encryption/decryption process that applied simple substitution and mathematical calculation algorithm at theory and encryption transmission steps protective early information. Hardware and financial loss are using spurious random number to be satisfied with the random number anger that isn't real random number to size so much perfect information protection using One-time pad for applying this. I was transformed into serial test under a test to prove spurious random number anger, and it is into random number anger stronger, and the transformation serial test that proposes is proving it in algorithm speed and efficiency planes.

Control of Visual Tracking System with a Random Time Delay (랜덤한 시간 지연 요소를 갖는 영상 추적 시스템의 제어)

  • Oh, Nam-Kyu;Choi, Goon-Ho
    • Journal of the Semiconductor & Display Technology
    • /
    • v.10 no.3
    • /
    • pp.21-28
    • /
    • 2011
  • In recent years, owing to the development of the image processing technology, the research to build control system using a vision sensor is stimulated. However, a random time delay must be considered, because it works of a various time to get a result of an image processing in the system. It can be seen as an obstacle factor to a control of visual tracking in real system. In this paper, implementing two vision controllers each, first one is made up PID controller and the second one is consisted of a Smith Predictor, the possibility was shown to overcome a problem of a random time delay in a visual tracking system. A number of simulations and experiments were done to show the validity of this study.

ONLINE TEST BASED ON MUTUAL INFORMATION FOR TRUE RANDOM NUMBER GENERATORS

  • Kim, Young-Sik;Yeom, Yongjin;Choi, Hee Bong
    • Journal of the Korean Mathematical Society
    • /
    • v.50 no.4
    • /
    • pp.879-897
    • /
    • 2013
  • Shannon entropy is one of the widely used randomness measures especially for cryptographic applications. However, the conventional entropy tests are less sensitive to the inter-bit dependency in random samples. In this paper, we propose new online randomness test schemes for true random number generators (TRNGs) based on the mutual information between consecutive ${\kappa}$-bit output blocks for testing of inter-bit dependency in random samples. By estimating the block entropies of distinct lengths at the same time, it is possible to measure the mutual information, which is closely related to the amount of the statistical dependency between two consecutive data blocks. In addition, we propose a new estimation method for entropies, which accumulates intermediate values of the number of frequencies. The proposed method can estimate entropy with less samples than Maurer-Coron type entropy test can. By numerical simulations, it is shown that the new proposed scheme can be used as a reliable online entropy estimator for TRNGs used by cryptographic modules.

Marginal distribution of crossing time and renewal numbers related with two-state Erlang process

  • Talpur, Mir Ghulam Hyder;Zamir, Iffat;Ali, M. Masoom
    • Journal of the Korean Data and Information Science Society
    • /
    • v.20 no.1
    • /
    • pp.191-202
    • /
    • 2009
  • In this study, we drive the one dimensional marginal transform function, probability density function and probability distribution function for the random variables $T_{{\xi}N}$ (Time taken by the servers during the vacations), ${\xi}_N$(Number of vacations taken by the servers) and ${\eta}_N$(Number of customers or units arrive in the system) by controlling the variability of two random variables simultaneously.

  • PDF

The Random Number Generator for the P.D.F of the Blocks ind the Buffer (버퍼내전송블럭의 확률밀도함수 추적을 위한 Random Number의 발생기에 관한 연구)

  • Park, Yhl
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.7 no.3
    • /
    • pp.130-134
    • /
    • 1982
  • In computer communication network, it is assumed that blocks are served at a rate of u messages per sec. The message blocks will be stayed in the buffer during the service time. In this case, the probability density distribution of the number of message blocks in the buffer space has been studied. When the average buffer space needed is minimum, the average block size will be specified by the relation between the input data and link infromation length. This relation proves to be perfect. The random number generator for this probability distribution is designed. The test result by making use of the random number generator has shown that is has little difference from the theoretical one.

  • PDF

Viscous Effect by Random Walk Method in VIC Method (Vortex-in-Cell법에 있어 랜덤워크법에 의한 점성효과)

  • No, Gi-Deok
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.26 no.2
    • /
    • pp.194-200
    • /
    • 2002
  • A method for simulating flow of extremely low Reynolds number in a vortex-in-cell (VIC) was studied. The viscous diffusion was represented by the random walk method. The validity of this method was proven by applying it to the flows passing over a fence placed vertically at an extremely low Reynolds number. The effects of parameters of the VIC method on the random walk method, such as the number of point vortices, the mesh density and the time increment, were investigated by numerical analysis using a one-dimensional diffusion equation. Changes in the relative error of vorticity depending on those parameters were clarified.

Improved RFID Mutual Authentication Protocol using One-Time Pad and One-Time Random Number Based on AES Algorithm (OTP와 일회성 난수를 사용한 AES 알고리즘 기반의 개선된 RFID 상호 인증 프로토콜)

  • Yun, Tae-Jin;Oh, Se-Jin;Ahn, Kwang-Seon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.163-171
    • /
    • 2011
  • Because RFID systems use radio frequency, they have many security problems such as eavesdropping, location tracking, spoofing attack and replay attack. So, many mutual authentication protocols and cryptography methods for RFID systems have been proposed in order to solve security problems, but previous proposed protocols using AES(Advanced Encryption Standard) have fixed key problem and security problems. In this paper, we analyze security of proposed protocols and propose our protocol using OTP(One-Time Pad) and AES to solve security problems and to reduce hardware overhead and operation. Our protocol encrypts data transferred between RFID reader and tag, and accomplishes mutual authentication by one time random number to generate in RFID reader. In addition, this paper presents that our protocol has higher security and efficiency in computation volume and process than researched protocols and S.Oh's Protocol. Therefore, our protocol is secure against various attacks and suitable for lightweight RFID tag system.