• Title/Summary/Keyword: Secure channel

Search Result 325, Processing Time 0.028 seconds

A Study on Appropriate S-box of DES in Radio Channel (무선채널에 적합한 DES의 S박스에 관한 연구)

  • Park, Mi-Og;Choi, Yeon-Hee;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1C
    • /
    • pp.18-24
    • /
    • 2004
  • Nowadays, the development of wireless communications provides a convenience for many people. On the other hand, the openness of wireless communications poses serious security threats and the security of wireless communications is necessary to support the secure communication channel. The common security method on wireless is the stream cipher that generates the pseudorandom number. In this paper, we propose the usage of the nonlinear function S-box and the mechanism according to it in stream cipher as the study to securely protect data transferred on wireless communications. Besides, it goes abreast a study on S-box with the best random characteristic among the used S-boxes on wireless communications. By means of test, we investigate the most appropriate S-box of DES on wireless communications environment and prove the efficiency of the proposed model by comparing and analysis of the randomness of the based stream cipher and the proposed model.

A Study on the Problems on ISDN Implementation Caused by the Conversion of Transmission System into Duropean Style in Korea (유럽 전송방식 도입에 따른 국내 ISDN 구축의 문제점 고찰)

  • 조규섭
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.2
    • /
    • pp.202-206
    • /
    • 1993
  • To secure the 64 kbps clear channel capability in the ISDN, it was decided to convert its North American digital transmission system into the European system especially in DS1 level. But their different companding law became an issue in the process of R&D in the existing time division digital switch such as TDX-1 to incorporate it into the ISDN. TDX-1 has been installed with North American ${\mu}$ companding law and its ISDN capability is under development now. Thus, because of the ${\mu}$ law/A law conversion for the interworking of two different transmission system, it is difficult to maintain the ISDN B channel transparency between TDX-1 and new European system with A companding law. Among some solutions for it, European frame format with ${\mu}$ law companding is recommended. Those problems and solutions are presented in this paper.

  • PDF

A Case Study of Tunnel Stability due to the Shallow Shaft and Change Penetrating Location (터널 갱구부 저토피 및 관통부 변경에 따른 안정성 검토 사례 연구)

  • Lee, Saik;Choi, Youngchul;Jung, Wooyong;Kim, Kookhan;Kim, Dongin
    • Tunnel and Underground Space
    • /
    • v.23 no.2
    • /
    • pp.87-98
    • /
    • 2013
  • Around 70% of Korea is mountainous, an increase in tunnel construction. It's due to the growing interest of the public for the environment and land required for the road construction is very scarce. During construction of 'Daedong 1 tunnel' in the expressway expansion project between Naengjeong and Busan, there are shallow shaft due to this tunnel located in the valley and the shafts are separated, and penetrating location change was inevitable for construction was delayed because of complaint. So, we change the position of the penetrating by applying multi-channel TSP, and conducted a stability analysis. The analysis results showed that there is no problem on the stability of the tunnel. To secure the construction of additional stability, We installed instrument, performed mechanical excavation, added reinforcement at shallow shaft and conducted bench cut.

Practical Password-Authenticated Three-Party Key Exchange

  • Kwon, Jeong-Ok;Jeong, Ik-Rae;Lee, Dong-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.6
    • /
    • pp.312-332
    • /
    • 2008
  • Password-based authentication key exchange (PAKE) protocols in the literature typically assume a password that is shared between a client and a server. PAKE has been applied in various environments, especially in the “client-server” applications of remotely accessed systems, such as e-banking. With the rapid developments in modern communication environments, such as ad-hoc networks and ubiquitous computing, it is customary to construct a secure peer-to-peer channel, which is quite a different paradigm from existing paradigms. In such a peer-to-peer channel, it would be much more common for users to not share a password with others. In this paper, we consider password-based authentication key exchange in the three-party setting, where two users do not share a password between themselves but only with one server. The users make a session-key by using their different passwords with the help of the server. We propose an efficient password-based authentication key exchange protocol with different passwords that achieves forward secrecy in the standard model. The protocol requires parties to only memorize human-memorable passwords; all other information that is necessary to run the protocol is made public. The protocol is also light-weighted, i.e., it requires only three rounds and four modular exponentiations per user. In fact, this amount of computation and the number of rounds are comparable to the most efficient password-based authentication key exchange protocol in the random-oracle model. The dispensation of random oracles in the protocol does not require the security of any expensive signature schemes or zero-knowlegde proofs.

Enhanced Local Directional Pattern based video shot boundary detection and automatic synchronization for STB quality inspection (STB 품질검사를 위한 개선된 지역 방향 패턴 기반 비디오 샷 경계 검출 및 자동 동기화)

  • Cho, Youngtak;Chae, Oksam
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.8-15
    • /
    • 2019
  • Recently, the importance of pre-shipment quality inspection has been emphasized due to the increase of STB supply. In this paper, we propose a method to support automation of quality inspection through simultaneous multi-channel input of STB video signal. The proposed method extracts a fingerprint using the center scan line of the image after stable video shot boundary detection using CeLDP combining color information and LDP code and performs synchronization between input video channels. The proposed method shows stronger shot boundary detection performance than the conventional shot detection method. Through the experiments applied to the real environment, it is possible to secure reliability and real-time quality check for synchronization between multi-channel inputs required for STB quality inspection. Also, based on the proposed method, we intend to study a large-scale quality inspection method in the future and propose a more effective quality inspection system.

DTLS-based CoAP Security Mechanism Analysis and Performance Evaluation (DTLS 기반의 CoAP 보안 메커니즘 분석 및 성능평가)

  • Han, Sang woo;Park, Chang seop;Cho, Jung mo
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.3-10
    • /
    • 2017
  • Standard Protocol Optimized for Resource-Constrained IoT Environment Constrained Application Protocol (CoAP) supports web-based communication between a sensor node in the IoT environment and a client on the Internet. The CoAP is a Request / Response model that responds to the client's CoAP Request message by responding with a CoAP Response message from the server. CoAP recommends the use of CoAP-DTLS for message protection. However, validation of the use of DTLS in the IoT environment is underway. We analyze CoAP and DTLS security mode, evaluate performance of secure channel creation time, security channel creation step time, and RAM / ROM consumption through Cooja simulator and evaluate the possibility of real environment application.

Implementation and Evaluation of Secure VoIP Conference System (DTLS 기반의 안전한 VoIP 컨퍼런스 시스템 구현 및 평가)

  • Kang, Seong-Ku;Kim, Kyou-Young;Kim, Joong-Man;Won, Yoo-Jae;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.45-57
    • /
    • 2009
  • In this paper, we implemented the conference system based on DTLS for saving securely the VoIP, which is served sprightly in the latest, securely and tested (and also analyzed) the system. As VoIP technology development, demand of conference system is increased and the related technologies are growed. But Security protocol to protect conference service is getting late than conference technology. In this paper, we studied based on DTLS protocol that can provide function of signaling, channel security, media channel security and application of group key and apply to VoIP conference system based UDP unchanged. In this paper, we searched suggested security protocols based on DTLS can apply to conference system and implement and apply the protocol to conference system. And we tested (and also alayzed) overhead of encryption and key management mechanism.

Efficient Message Authentication Scheme for VANET (차량 애드혹 네트워크 환경에서 효율적인 메시지 인증 기법)

  • Yoo, Young-Jun;Lee, Jun-Ho;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.37-47
    • /
    • 2009
  • In VANET, each vehicle can obtain traffic information from other vehicles or infrastructure, and they frequently exchange life-critical safety message. Therefore, it is necessary among vehicles to establish a secure channel for keeping the driver's safe and protecting the channel against several attack challenges. TSVC is a representative scheme which needs low communication and computation to be performed. But, there is a delay when verifying the messages because it is designed based on TESLA. Thus, it is not acceptable to use TSVC for sending the time-critical messages. In this paper, we propose a novel message authentication scheme which reduces a delay for the verification of messages. Therefore, the proposed scheme can be suitable to transmitting time-critical messages. Furthermore, the scheme supports to privacy preservation and can robust against DoS attacks.

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

Analysis and Response of SSH Brute Force Attacks in Multi-User Computing Environment (다중 사용자 컴퓨팅 환경에서 SSH 무작위 공격 분석 및 대응)

  • Lee, Jae-Kook;Kim, Sung-Jun;Woo, Joon;Park, Chan Yeol
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.6
    • /
    • pp.205-212
    • /
    • 2015
  • SSH provides a secure, encrypted communication channel between two end point systems using public key encryption. But SSH brute force attack is one of the most significant attacks. This kind of attack aims to login to the SSH server by continually guessing a large number of user account and password combinations. In this paper, we analyze logs of SSH brute force attacks in 2014 and propose a failed-log based detection mechanism in high performance computing service environment.