• Title/Summary/Keyword: Secure channel

Search Result 325, Processing Time 0.037 seconds

TRMA: Two-Round RFID Mutual Authentication Protocol (TRMA: 2-라운드 RFID 상호 인증 프로토콜)

  • Ahn, Hae-Soon;Bu, Ki-Dong;Yoon, Eun-Jun;Nam, In-Gil
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.5
    • /
    • pp.71-78
    • /
    • 2009
  • In RFID system, the communicated data can be easily eavesdropped and tampered with by an attacker because the communication between the reader and the tag is performed in an insecure channel. Therefore, authentication is an important role in RFID applications for providing security and privacy. In 2006, Lee, Asano and Kim proposed an RFID mutual authentication protocol (the LAK protocol) which utilizes a hash function and synchronized secret information. However, Cao and Shen showed that the LAK protocol is vulnerable to replay attack, and therefore an adversary can impersonate the tag. This paper proposes a new simple two-round RFID mutual authentication (TRMA) protocol based on secure one-way hash function. As a result, the proposed TRMA protocol not only can prevent various attacks and but also provides communication efficiency since they mutually authenticate by performing two-round between RFID tag and RFID reader.

Experimental Study on Dry Waterproofing Technology Using Synthetic Polymer Sheet Comprised of Synthetic Resin Metal Sheets and Tri-Layered Filler (합성수지 메탈시트와 3면겹침용 채움재가 공법화된 합성고분자계 시트를 이용한 건식화 방수기술에 대한 실험적 연구)

  • Koo, Ja-Ung;Kim, Bum-Soo;Lee, Jung-Hun;Song, Je-Young;Oh, Sang-Keun
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2017.11a
    • /
    • pp.139-140
    • /
    • 2017
  • This technology employs a method of forming a single-ply PLUS waterproofing sheet layer comprised of applying a single-ply synthetic polymer layer on a vibrating structure (steel frame, RC) or an inclined surface by using a T joint lap-filling coil and an embedded metal coated sheet. The T - joint reinforcing lap-filling coil was used to block the ingress channel of the rainwater by applying the material in the vulnerable area where the three sides of the waterproof sheet overlapped. Conventional waterproofing techniques have a problem in that the waterproof sheet is pierced because the end portion of the waterproof sheet applied to the vertical portion is fixed by a nail, and the sealant applied to the end portion of the sheet cannot easily secure long-term waterproof durability due to the influence of the external environment. Therefore, the developed technology secured the waterproof durability against the vertical part by using the embedded metal sheet. In addition, automatic hot-air fusing is used to improve the quality of waterproof construction and point fixation method using fixed hardware. This is a technology that is not significantly restricted in the high degradation level regions of domestic waterproof construction environments in Korea such as low-temperature environment, wet floor.

  • PDF

A Design Secure QR-Login User Authentication Protocol and Assurance Methods for the Safety of Critical Data Using Smart Device (스마트 기기를 이용한 안전한 QR-Login 사용자 인증 프로토콜의 설계 및 중요 정보의 안전성 보증을 위한 방법)

  • Lee, Jae-Sik;You, Han-Na;Cho, Chang-Hyun;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.949-964
    • /
    • 2012
  • Our PC have been under constant threat of malicious codes and viruses today. As many new ways of cyber attacks are being developed, such as zero-day-attack, nobody's PC is guaranteed to be safe from the attacks. In case where a user uses the existing verification protocol on a unsecured PC, the user's verification information may well be threatened by sniffing or man-in-the-middle attack. Especially, deadly attacks like memory hacking would give hard time for users to even recognize any symptom of virus infection. Therefore, this paper designs secured QR-Login user verification protocol for smart devices that are ready to communicate with QR-Code and proposes a way to keep critical data safe when using the internet. This way, user would be able to safeguard his/her critical data even when under attack by unknown attacks and safely carry out extremely sensitive task, like financial trading, on the device.

Countermeasure against Chosen Ciphertext Spa Attack of the Public-Key Cryptosystem Based on Ring-Lwe Problem (Ring-LWE 기반 공개키 암호시스템의 선택 암호문 단순전력분석 공격 대응법)

  • Park, Aesun;Won, Yoo-Seung;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1001-1011
    • /
    • 2017
  • A lattice-based cryptography is known as one of the post-quantum cryptographies. Ring-LWE problem is an algebraic variant of LWE, which operates over elements of polynomial rings instead of vectors. It is already known that post-quantum cryptography has side-channel analysis vulnerability. In 2016, Park et al. reported a SPA vulnerability of the public key cryptosystem, which is proposed by Roy et al., based on the ring-LWE problem. In 2015 and 2016, Reparaz et al. proposed DPA attack and countermeasures against Roy cryptosystem. In this paper, we show that the chosen ciphertext SPA attack is also possible for Lyubashevsky cryptosystem which does not use NTT. And then we propose a countermeasure against CCSPA(Chosen Ciphertext SPA) attack and we also show through experiment that our proposed countermeasure is secure.

Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment (NFC 모바일 환경에서 결제정보보호를 위한 NTRU 기반 인증 기법)

  • Park, Sung Wook;Lee, Im Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.3
    • /
    • pp.133-142
    • /
    • 2013
  • Recently, smart devices for various services have been developed using converged telecommunications, and the markets for near field communication (NFC) mobile services is expected to grow rapidly. In particular, the realization of mobile NFC payment services is expected to go commercial, and it is widely attracting attention both on a domestic and global level. However, this realization would increase privacy infringement, as personal information is extensively used in the NFC technology. One example of such privacy infringement would be the case of the Google wallet service. In this paper, we propose an mutual authentication scheme based on NTRU for secure channel in OTA and an zero-knowledge proof scheme NTRU based on for protecting user information in NFC mobile payment systems without directly using private financial information of the user.

Analysis of Bed Shear Stress Distributions in Compound Open Channels Using Large Eddy Simulation. (LES를 이용한 복단면 개수로의 바닥전단응력 분포특성 분석)

  • Lee, Du Han
    • Ecology and Resilient Infrastructure
    • /
    • v.5 no.4
    • /
    • pp.199-209
    • /
    • 2018
  • In river design, consideration of bed shear stresses is necessary to secure stability of levee and floodplain. In this study distributions of bed shear stresses in compound open channels are analyzed through numerical simulation for various width and depth. LES solver in OpenFOAM is applied to 12 cases of compound channel shapes considering secondary flow which effects distributions of bed shear stresses. By the results time averaged velocity distributions, secondary currents, and distributions of bed shear stresses are analyzed. Overall distributions of bed shears in floodplain show that higher shear stresses are seen in left of floodplain and the shears decrease toward right of floodplain. However, high local variations in shear stresses are shown due to the secondary flow effects. In shallow floodplain, bed shear stresses show low value below 0.8 times of averaged bed shear. In deep floodplain, bed shear stresses show high value over 1.2 - 1.4 times of averaged bed shear.

An Integrated Emergency Call System based on Public Switched Telephone Network for Elevators

  • Lee, Guisun;Ryu, Hyunmi;Park, Sunggon;Cho, Sungguk;Jeon, Byungkook
    • International journal of advanced smart convergence
    • /
    • v.8 no.3
    • /
    • pp.69-77
    • /
    • 2019
  • Today, most of elevators have an emergency call facility for emergency situations. However, if the network installed in the elevator is also out of power, it cannot be used for the elevator remote monitoring and management. So, we develop an integrated and unified emergency call system, which can transmit not only telephone call but also data signals using PSTN(Public Switched Telephone Network) in order to remote monitoring and management of elevators, even though a power outage occurs. The proposed integrated emergency call system to process multiple data such as voice and operational information is a multi-channel board system which is composed of an emergency phone signal processing module and an operational information processing module in the control box of elevator. In addition, the RMS(remote management server) systems based on the Web consist of a dial-up server and a remote monitoring server where manages the elevator's operating information, status records, and operational faults received via the proposed integrated and unified emergency call system in real time. So even if there's a catastrophic emergency, the proposed RMS systems shall ensure and maintain the safety of passengers inside the elevator. Also, remote control of the elevator by this system should be more efficient and secure. In near future, all elevator emergency call system need to support multifunctional capabilities to transmit operational data as well as phone calls for the safety of passengers. In addition, for safer elevators, it is necessary to improve them more efficiently by combining them with high-tech technologies such as the Internet of Things and artificial intelligence.

Analysing the Relationships between Tourists' Intention upon Unified Theory of Acceptance and Use of Technology and Purchase Intention on Tourism Omnichannel Service (관광옴니채널 서비스에 대한 관광객 통합기술수용의도와 구매의도에 대한 연구)

  • Park, Hyun-Jee;Park, Jung-Hwan;Lee, Joung-Sil;Kim, Young-Ha;Park, Bong-Gyu
    • Journal of Digital Convergence
    • /
    • v.17 no.5
    • /
    • pp.157-165
    • /
    • 2019
  • The objective of this study is to identify the relationship between tourists' intention upon UTAUT and purchase intention on tourism omnichannel considering moderating effect of trust and purchase propensity. As the results, 1) there are partially significant and positive relationship between tourists' intention and purchase intention. There are partially significant and positive moderating effect of 2) trust and 3) purchase propensity upon the relationship between tourists' intention and purchase intention on tourism omnichannel. In order to increase the purchase intention of diversified customers, it is necessary to secure the reliability of OmniChannel which integrates the on-off line, for the future, more in-depth study of purchase propensity of tourism omnichannel should be needed.

ID-based Proxy Signature Scheme from the Bilinear Map (Bilinear 함수를 이용한 ID 기반 대리서명 기법)

  • 이정연;천정희;김태성;진승헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.3-11
    • /
    • 2003
  • Proxy signatures are signature schemes in which an original signer delegates her signing capability to a proxy entity, who signs a message on behalf of the original signer. In this paper we propose the ID-based proxy signature schemes using a bilinear map. In the previous R-based proxy signature scheme, the proxy signer can misuse the right of the signing capacity and the public key directory is required. However, by inserting the warrant information such as the identity of the proxy signer and the limit of the signing capacity to the proxy signature, our scheme can prevent the misuse of the proxy key pair by the proxy signer and does not require a public key certificate. Furthermore, our scheme dose not need a secure channel to deliver the warrant. Consequently, the proposed scheme is more efficient and useful than the previous proxy signature schemes.

Stream Cipher Algorithm using the Modified S-box (변형된 S박스를 이용한 스트림 암호 알고리즘)

  • 박미옥;최연희;전문석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.137-145
    • /
    • 2003
  • Nowadays, people can communicate with each other on any time at my place by development of wireless communications. But, the openness of mobile communications Poses serious security threats and the security is necessary on mobile communications to support the secure communication channel. The most commonly method is stream cipher for mobile communications. Generally, this stream cipher is implemented by LFSR(Linear Feedback Shift Register). On this paper proposes the modified mechanism of the S box is usually used in block cipher to advance security og the stream cipher and this mechanism is the modified three one in consideration og the randomness. Generally, S box that is function with nonlinear property makes data more strong by attack. The randomness test of the proposed algorithm is used Ent Pseudorandom Number Sequence Test Program and by the test result it proves that it has better randomness and serial correlation value than the based stream cipher on respective test.