• Title/Summary/Keyword: Secure channel

Search Result 325, Processing Time 0.027 seconds

Mobile Payment System Design with Transaction Certificate Mode (거래 인증 모드를 사용한 이동 결제 시스템 설계)

  • Sung, Soon-Hwa;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.931-939
    • /
    • 2014
  • The Web or Mobile channel of previous Web access authentication system for a payment only provides the authentication of remote users, and does not provide the authentication between a user and a bank/financial institution. Therefore, this paper proposes the Transaction Certificate Mode(TCM) for a payment which can preserve the mutual authentication between a user and a bank/financial institution for Web-based payment systems. The proposed system has designed for wireless network instead of Secure Electronic Transaction (SET) designed for wired electronic transaction. In addition, this system with TCM is able to support an account-based transaction for wireless networks instead of a disadvantage of SET such as a card-based transaction for wired networks. Therefore, customers can check their balances without logging on their bank's web site again due to mutual authentication between a customer and his bank/financial institution.

An Efficient and Secure Group Key Distribution Protocol for IP-based Pay-TV Systems (IP기반의 Pay-TV 시스템을 위한 안전하고 효율적인 그룹 키 분배 프로토콜)

  • Kim, Jung-Yoon;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.199-208
    • /
    • 2009
  • Recently,IP-based broadcasting systems,such as Mobile-TV and IP-TV, have been widely deployed. These systems require a security system to allow only authorized subscribers access to broadcasting services. We analyzed the Conditional Access System, which is a security system used in the IP-based Pay-TV systems. A weakness of the system is that it does not scale well when the system experiences frequent membership changes. In this paper, we propose a group key distribution protocol which overcomes the scalability problem by reducing communication and computation overheads without loss of security strength. Our experimental results show that computation delay of the proposed protocol is smaller than one of the Conditional Access System. This is attributed to the fact that the proposed protocol replaces expensive encryption and decryption with relatively inexpensive arithmetic operations. In addition, the proposed protocol can help to set up a secure channel between a server and a client with the minimum additional overhead.

Novel Secure Hybrid Image Steganography Technique Based on Pattern Matching

  • Hamza, Ali;Shehzad, Danish;Sarfraz, Muhammad Shahzad;Habib, Usman;Shafi, Numan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.1051-1077
    • /
    • 2021
  • The secure communication of information is a major concern over the internet. The information must be protected before transmitting over a communication channel to avoid security violations. In this paper, a new hybrid method called compressed encrypted data embedding (CEDE) is proposed. In CEDE, the secret information is first compressed with Lempel Ziv Welch (LZW) compression algorithm. Then, the compressed secret information is encrypted using the Advanced Encryption Standard (AES) symmetric block cipher. In the last step, the encrypted information is embedded into an image of size 512 × 512 pixels by using image steganography. In the steganographic technique, the compressed and encrypted secret data bits are divided into pairs of two bits and pixels of the cover image are also arranged in four pairs. The four pairs of secret data are compared with the respective four pairs of each cover pixel which leads to sixteen possibilities of matching in between secret data pairs and pairs of cover pixels. The least significant bits (LSBs) of current and imminent pixels are modified according to the matching case number. The proposed technique provides double-folded security and the results show that stego image carries a high capacity of secret data with adequate peak signal to noise ratio (PSNR) and lower mean square error (MSE) when compared with existing methods in the literature.

A Study on the Application Direction of Financial Industry Metaverse Platform to secure MZ Generation Contact Points (MZ 세대 접점 확보를 위한 금융권 메타버스 플랫폼 활용 방향 연구)

  • Ki-Jung Ryu;Ki-Bum Park;Sungwon Cho;Dongho Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.127-137
    • /
    • 2023
  • COVID-19 has not only affected all sectors of society, economy and politics, but also had a huge impact on industry. The non-face-to-face exchange method was essential to prevent infectious diseases, and the generation who experienced it recognizes the importance of a platform that can be quickly accessed anytime, anywhere, and attention is focused on the Metaverse that can accommodate it well. Each financial industry uses a differentiated metabus platform strategy, focuses on new customer service and revenue generation, and is also used as an internal and external communication channel. This paper analyzes the theoretical background of the financial sector metaverse and domestic and international cases, and studies and describes the direction of using the financial sector metaverse platform to secure MZ generation contact points.

Key Bit-dependent Attack on Side-Channel Analysis-Resistant Hardware Binary Scalar Multiplication Algorithm using a Single-Trace (부채널 분석에 안전한 하드웨어 이진 스칼라 곱셈 알고리즘에 대한 단일 파형 비밀 키 비트 종속 공격)

  • Sim, Bo-Yeon;Kang, Junki;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1079-1087
    • /
    • 2018
  • Binary scalar multiplication which is the main operation of elliptic curve cryptography is vulnerable to the side-channel analysis. Especially, it is vulnerable to the side-channel analysis which uses power consumption and electromagnetic emission patterns. Thus, various countermeasures have been studied. However, they have focused on eliminating patterns of data dependent branches, statistical characteristic according to intermediate values, or the interrelationships between data. No countermeasure have been taken into account for the secure design of the key bit check phase, although the secret scalar bits are directly loaded during that phase. Therefore, in this paper, we demonstrate that we can extract secret scalar bits with 100% success rate using a single power or a single electromagnetic trace by performing key bit-dependent attack on hardware implementation of binary scalar multiplication algorithm. Experiments are focused on the $Montgomery-L{\acute{o}}pez-Dahab$ ladder algorithm protected by scalar randomization. Our attack does not require sophisticated pre-processing and can defeat existing countermeasures using a single-trace. As a result, we propose a countermeasure and suggest that it should be applied.

The Development of Multi-channel Electrical Conductivity Monitoring System and its Application in the Coastal Aquifer (다채널 전기전도도 모니터링 시스템의 개발과 연안지역 공내수 모니터링에 대한 적용 사례)

  • Shin, Je-Hyun;Hwang, Se-Ho;Park, Kwon-Gyu;Park, Yun-Seong;Byun, Joong-Moo
    • Geophysics and Geophysical Exploration
    • /
    • v.8 no.2
    • /
    • pp.156-162
    • /
    • 2005
  • Particularly in research related to seawater intrusion the change of fluid electrical conductivity is one of major concerns, and effective monitoring can help to optimize a water pumping performance in coastal areas. Special considerations should be given to the mounting of sensors at proper depth during the monitoring design since the vertical distribution of fluid electrical conductivity is sensitive to the characteristics of seawater intrusion zone. This tells us the multi-channel electrical conductivity monitoring is of paramount consequence. It, however, is a rare event when this approach becomes routinely available in that commonly used commercial stand-alone type sensors are very expensive and inadequate for a long term monitoring of electrical conductivity or water level due to their restricted storage and difficulty of real-time control. For this reason, we have developed a real-time monitoring system that could meet these requirements. This system is user friendly, cost-effective, and easy to control measurement parameters - sampling interval, acquisition range, and others. And this devised system has been utilized for the electrical conductivity monitoring in boreholes, Yeonggwang-gun, Korea. Monitoring has been consecutively executed for 24 hours, and the responses of electrical conductivity at some channels have been regularly increased or decreased while pumping up water. It, with well logging data implemented before/after pumping water, verifies that electrical conductivity changes in the specified depths originate from fluid movements through sand layer or permeable fractured rock. Eventually, the multi-channel electrical conductivity monitoring system makes an effective key to secure groundwater resources in coastal areas.

Cooperative Power Control Scheme for a Spectrum Sharing System

  • Ban, Tae-Won;Jung, Bang-Chul
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.641-646
    • /
    • 2011
  • In this paper, we investigate a power control problem which is very critical in underlay-based spectrum sharing systems. Although an underlay-based spectrum sharing system is more efficient compared to an overlay-based spectrum sharing system in terms of spectral utilization, some practical problems obstruct its commercialization. One of them is a real-time-based power adaptation of secondary transmitters. In the underlay-based spectrum sharing system, it is essential to adapt secondary user's transmit power to interference channel states to secure primary users' communication. Thus, we propose a practical power control scheme for secondary transmitters. The feedback overhead of our proposed scheme is insignificant because it requires one-bit signaling, while the optimal power control scheme requires the perfect information of channel states. In addition, the proposed scheme is robust to feedback delay. We compare the performance of the optimal and proposed schemes in terms of primary user's outage probability and secondary user's throughput. Our simulation results show that the proposed scheme is almost optimal in terms of both primary user's outage probability and secondary user's throughput when the secondary user's transmit power is low. As the secondary user's transmit power increases, the primary user's outage probability of the proposed scheme is degraded compared with the optimal scheme while the secondary user's throughput still approaches that of the optimal scheme. If the feedback delay is considered, however, the proposed scheme approaches the optimal scheme in terms of both the primary user's outage probability and secondary user's throughput regardless of the secondary user's transmit power.

Encryption Communication Protocol Design Using Unidirectional Synchronization of the Chaos System (혼돈계의 단방향 동기화를 이용한 보안 프로토콜 설계)

  • Cho, Chang-Ho;Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.10
    • /
    • pp.1125-1130
    • /
    • 2014
  • The quantity and quality of contents containing information are sharply increasing with the rising network speed. In line with this rapid growth of information volume, a new communication protocol using the chaotic signal that can protect contents in communication is proposed as follows. The chaos system has the characteristic of unpredictability due to the sensitive initial values and the similarity of the signals with noise. We configured two chaos systems $F(X_n,Y_n)$ and $G(A_n,B_n)$ that have such characteristics and designed a data communication method using as encryption channel the same chaos signals generated by synchronizing the chaos system G with the F signals. The proposed method was verified with the encryption and decryption of images. The proposed method is different from the existing encrypted communication methods and is expected to lay the foundation for future studies in related areas.is an example of ABSTRACT format.

Experimental Study of Interfacial Friction in NaBH4 Solution in Microchannel Dehydrogenation Reactor (마이크로채널 탈수소 화학반응기에서 수소화붕소나트륨 수용액의 계면마찰에 대한 실험연구)

  • Choi, Seok Hyun;Hwang, Sueng Sik;Lee, Hee Joon
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.38 no.2
    • /
    • pp.139-146
    • /
    • 2014
  • Sodium borohydride ($NaBH_4$) is considered as a secure metal hydride for hydrogen storage and supply. In this study, the interfacial friction of two-phase flow in the dehydrogenation of aqueous $NaBH_4$ solution in a microchannel with a hydraulic diameter of $461{\mu}m$ is investigated for designing a dehydrogenation chemical reactor flow passage. Because hydrogen gas is generated by the hydrolysis of $NaBH_4$ in the presence of a ruthenium catalyst, two different flow phases (aqueous $NaBH_4$ solution and hydrogen gas) exist in the channel. For experimental studies, a microchannel was fabricated on a silicon wafer substrate, and 100-nm ruthenium catalyst was deposited on three sides of the channel surface. A bubbly flow pattern was observed. The experimental results indicate that the two-phase multiplier increases linearly with the void fraction, which depends on the initial concentration, reaction rate, and flow residence time.

Transport and Deposition Characteristics of Coarse Grained Soil According to the Flow Velocity and Grain Size (유속 및 입경에 따른 조립토의 이동 및 퇴적 특성)

  • Bong, Tae-Ho;Son, Young-Hwan;Kim, Kyu-Sun;Park, Jae-Sung;Kim, Dong-Geun
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.58 no.1
    • /
    • pp.11-17
    • /
    • 2016
  • Dredging and land reclamation works has actively carried out for the efficient use of land and secure of agricultural and industrial site. During the reclamation, a portion of landfills are lost from the desired location due to a variety of causes. However, these causes has been rarely studied, and water flow velocity has a great influence on the movement of landfills. For the economical and efficient reclamation, it is important to predict the movement of landfills in water. In this paper, an experimental study was carried out to investigate the deposition distance according to the flow velocity and soil grain size. We have made a large open-channel apparatus that can reproduce a laminar flow, and the deposition test was carried out on the four grain size (0.638, 1.425, 3.375, 7.125 mm) and four flow velocity (0.1, 0.3, 0.5, 0.67 m/s) with high definition video recording. As a results, average deposition distance increased with the flow velocity, and its relationship is shown linearly. For the grain size, the average deposition distance were drastically increased as the grain size becomes smaller.