• Title/Summary/Keyword: Secure channel

Search Result 325, Processing Time 0.033 seconds

Provably-Secure and Communication-Efficient Protocol for Dynamic Group Key Exchange (안전성이 증명 가능한 효율적인 동적 그룹 키 교환 프로토콜)

  • Junghyun Nam;Jinwoo Lee;Sungduk Kim;Seungjoo Kim;Dongho Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.163-181
    • /
    • 2004
  • Group key agreement protocols are designed to solve the fundamental problem of securely establishing a session key among a group of parties communicating over a public channel. Although a number of protocols have been proposed to solve this problem over the years, they are not well suited for a high-delay wide area network; their communication overhead is significant in terms of the number of communication rounds or the number of exchanged messages, both of which are recognized as the dominant factors that slow down group key agreement over a networking environment with high communication latency. In this paper we present a communication-efficient group key agreement protocol and prove its security in the random oracle model under the factoring assumption. The proposed protocol provides perfect forward secrecy and requires only a constant number of communication rounds for my of group rekeying operations, while achieving optimal message complexity.

Applied Method to Trusted Digital Content Distribution Architecture (신뢰할 수 있는 디지털 콘텐츠 유통 아키텍처 방안)

  • Kim, Hye-Ri;Hong, Seng-Phil;Lee, Chul-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.151-162
    • /
    • 2008
  • As the innovative internet technologies and multimedia are being rapidly developed, digital content is a remarkable new growth industry and supplied by various channel. For example, domestic sales volume in digital contents marked an annual increase of 14.7% since 2003. Against the merits of digital content distribution, Information reengineering aspects are getting more serious issues in these days such as infringement of copyright, flood of inappropriate content, invasion and infringement of privacy, etc. In this paper, we are making a suggestion of the TDCDA-Trusted Digital Content Distribution Architecture in order to solve above problems. TDCDA is provided to how well-define and design the trusted path in digital contents distribution in internet environments using a secure distribution mechanism, digital content integrity and copyright protection. Finally, we also proposed the TDCDA algorithm and applicable guidelines for feasible approach in real computing environment.

DPA-Resistant Logic Gates and Secure Designs of SEED and SHA-1 (차분 전력분석 공격에 안전한 논리 게이트 및 SEED 블록 암호 알고리즘과 SHA-1 해쉬 함수에의 응용)

  • Baek, Yoo-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.17-25
    • /
    • 2008
  • The differential power attack (DPA)[8] is a very powerful side-channel attack tool against various cryptosystems and the masking method[10] is known to be one of its algorithmic countermeasures. But it is non-trivial to apply the masking method to non-linear functions, especially, to arithmetic adders. This paper proposes simple and efficient masking methods applicable to arithmetic adders. For this purpose, we use the fact that every combinational logic circuit (including the adders) can be decomposed into basic logic gates (AND, OR, NAND, NOR, XOR, XNOR, NOT) and try to devise efficient masking circuits for these basic gates. The resulting circuits are then applied to the arithmetic adders to get their masking algorithm. As applications, we applied the proposed masking methods to SEED and SHA-1 in hardware.

New Simple Power Analysis on scalar multiplication based on sABS recoding (sABS 형태의 스칼라 곱셈 연산에 대한 새로운 단순전력 공격)

  • Kim, Hee-Seok;Kim, Sung-Kyoung;Kim, Tae-Hyun;Park, Young-Ho;Lim, Jong-In;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.115-123
    • /
    • 2007
  • In cryptographic devices like a smart-card whose computing ability and memory are limited, cryptographic algorithms should be performed efficiently. Scalar multiplication is very important operation in Elliptic Curve Cryptosystems, and so must be constructed in safety against side channel attack(SCA). But several countermeasures proposed against SCA are exposed weaknesses by new un-dreamed analysis. 'Double-and-add always scalar multiplication' algorithm adding dummy operation being known to secure against SPA is exposed weakness by Doubling Attack. But Doubling Attack cannot apply to sABS receding proposed by Hedabou, that is another countermeasure against SPA. Our paper proposes new strengthened Doubling Attacks that can break sABS receding SPA-countermeasure and a detailed method of our attacks through experimental result.

Efficient and Secure User Authentication and SDP Encryption Method in SIP (일회성 암호를 이용한 효율적이고 안전한 SIP 사용자 인증 및 SDP 암호화 기법)

  • Kim, Jung-Je;Chung, Man-Hyun;Cho, Jae-Ik;Shon, Tae-Shik;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.463-472
    • /
    • 2012
  • This paper propose a security method that performs mutual authentication between the SIP UA and the server, check for integrity of the signaling channel and protection of SDP information for VoIP using a One-Time Password. To solve the vulnerability of existing HTTP Digest authentication scheme in SIP, Various SIP Authentication schemes have been proposed. But, these schemes can't meet security requirements of SIP or require expensive cryptographic operations. Proposed method uses OTP that only uses hash function and is updated each authentication. So Proposed method do not require expensive cryptographic operations but performs user authentication efficiently and safely than existing methods. In addition, Proposed method verifies the integrity of the SIP messages and performs SDP encryption/decryption through OTP that used for user authentication. So Proposed method can reduce communication overhead when applying S/MIME or TLS.

An investigation into the Online Sales Channels of Small Business Fashion Retailers on Portal Shopping and Fashion Shopping Malls (소상공인 패션판매업자의 온라인 판매채널 연구: 포털쇼핑몰과 패션쇼핑몰(종합물/전문몰)을 중심으로)

  • Son, Mi Young
    • Human Ecology Research
    • /
    • v.59 no.4
    • /
    • pp.449-463
    • /
    • 2021
  • The aim of this study was to analyze the perceptions and entering status of small business online fashion retailers on portal shopping and fashion shopping malls. Case studies were conducted on a total of 10 research samples. The results were as follows: first, regarding the strategic factors of online fashion stores, 'price competitiveness' is important, especially in portal shopping and low-cost brands; 'product assortment' is important but not essential in all platforms; and 'differentiation' is important to continuously secure loyal customers in fashion shopping malls. Customer satisfaction leads to customer loyalty, and customer loyalty affects the sales conversion rate and brand growth of online sales channels. Factors that promoted sales activities in online sales channels were exposure, advertisements, SNS, events, special exhibitions, and events. Hindrance factors were low price competition, overheated competition, and the MD of sales channels. Second, the research samples used multiple online sales channels, including portal shopping malls and fashion shopping malls, in addition to their own malls. The selection factors were platform reputation and commission, branding, and customer inflow through exposure. Portal shopping malls were perceived as providing easy access, advertising/customer communication, exposure/search, price competitiveness, scalability, and intense competition, whereas fashion shopping malls were perceived as providing a brand image and concept, brand promotion, high commissions, difficult entry, and low profits. The factors for success in portal shopping malls were exposure/search, price competitiveness, and brand recognition, whereas the factors for success in fashion shopping malls were differentiation, brand, exposure/advertisement, product assortment, and MD.

Quality Improvement Strategy Development based on Competitor Analysis of Manufacturing Companies: Application to the Dashboard Camera Market (제조업 경쟁사 분석을 통한 품질 개선 전략 수립: 대시보드 카메라 시장에 적용)

  • Kang, Chang Dong;Choi, Il Young;Kim, Jae Kyeong;Park, Jae Seung
    • Journal of Information Technology Services
    • /
    • v.21 no.2
    • /
    • pp.27-41
    • /
    • 2022
  • In a fiercely competitive environment, quality is a key factor that enables dashboard camera makers to maintain their competitive advantage. Quality affects consumer satisfaction, brand loyalty, and firm performance. Therefore, to remain competitive, it is important that manufacturers maintain product quality that meets consumer expectations. To this end, it is necessary to investigate customer preferences and product performance in terms of product quality and to properly allocate resources to improve the quality level such that the firm can maintain a competitive advantage. In this paper, we proposed the various ways in which manufacturing firms can determine which quality dimensions need improvement in order to secure competitiveness. To this end, we analyzed a case study of Urive to develop a quality improvement strategy through importance performance competitor analysis (IPCA). Urive's IPCA results showed that 14 quality dimensions, namely performance, size, price, ease of use, country of origin, manufacturer, brand, product certificate, warranty, distribution channel, market share, reliability, durability, and conformance, were not absolutely competitive compared with those of Mando, Inavi, and Finevu. In terms of color, Urive had an absolute competitive advantage over Mando, but not Inavi and Finevu. Urive's appearance was more competitive than Mando's, but not Inavi's and Finevu's. In terms of advertisement and serviceability, Urive was absolutely less competitive than Mando and Inavi, but had a competitive advantage over Finevu. Therefore, it is necessary to put resources and time as the first priority for performance, reliability, and durability, which have a large performance difference in common among the three brands. The quality dimensions in which resources and time need to be put in second place are price and ease of use, which have a large performance difference in common among the two brands.

New Distribution Strategies of Korean SMEs in Post COVID-19 Pandemic Era: Focusing on the Innovation of Official Distribution Channels

  • Lee, Min-Jae;Jung, Jin-Sup
    • Journal of Korea Trade
    • /
    • v.25 no.3
    • /
    • pp.153-168
    • /
    • 2021
  • Purpose - In this study, we aim to explore new distribution strategies for sustainable growth in the era of the 4th industrial revolution, focusing on SMEs (small and medium-sized enterprises) in Korea, and suggest ways to upgrade the government's official distribution channel to the next level. Design/methodology - First of all, this paper explored the prior research, the current status of sales support for SMEs, and the changes in the distribution industry due to COVID-19 pandemic. Based on Moon (2016)'s ABCD strategic model - Agility, Benchmarking, Convergence, and Dedication, the study then derived directions in which official distribution channels should move and the new distribution strategy for Korean SMEs to secure competitive advantage. Findings - First, in terms of 'Agility', in order to upgrade official distribution channels, which are currently at some competitive disadvantages compared to private distribution companies, we must quickly introduce technologies for the 4th industrial revolution, such as AI, Big Data, etc., and establish precise strategies to strengthen the capabilities of SMEs. Second, in terms of 'Benchmarking', the use of "Chamelezones" has been increasing to enhance the competitiveness of offline stores in line with recent ontact trends. Therefore, official distribution channels should also benchmark such cases, strengthening their competitiveness by utilizing offline spaces more efficiently and effectively. Third, in terms of 'Convergence', in line with the rapidly changing trend of the times, official distribution channels should also promote active partnerships with media commerce, e-commerce and ICT platforms, as well as cooperation with private retailers, and focus on creating synergy effects through them. Finally, from the perspective of 'Dedication', digitalization should be promoted step by step, finding the sector that can accelerate digital among the value chains of official distribution channels, and continuing to discuss how to digitize it realistically. Originality/value - Based on this analysis, we have presented strategies and implications for innovating official distribution channels for SMEs, which will contribute to enhancing the competitive advantage of official distribution channels in the post COVID-19 pandemic era.

Image Steganography for Securing Hangul Messages based on RS-box Hiding Model (RS-box 은닉 모델에 기반한 한글 메시지 보안을 위한 이미지 스테가노그래피)

  • Seon-su Ji
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.2
    • /
    • pp.97-103
    • /
    • 2023
  • Since most of the information is transmitted through the network, eavesdropping and interception by a third party may occur. Appropriate measures are required for effective, secure and confidential communication in the network. Steganography is a technology that prevents third parties from detecting that confidential information is hidden in other media. Due to structural vulnerabilities, information protected by encryption and steganography techniques can be easily exposed to illegitimate groups. In order to improve the limitations of LSB where the simplicity and predictability of the hiding method exist, I propose a technique to improve the security of the message to be hidden based on PRNG and recursive function. To enhance security and confusion, XOR operation was performed on the result of selecting a random bit from the upper bits of the selected channel and the information transformed by the RS-box. PSNR and SSIM were used to confirm the performance of the proposed method. Compared to the reference values, the SSIM and PSNR of the proposed method were 0.9999 and 51.366, respectively, confirming that they were appropriate for hiding information.

QR-Code Based Mutual Authentication System for Web Service (웹 서비스를 위한 QR 코드 기반 상호 인증 시스템)

  • Park, Ji-Ye;Kim, Jung-In;Shin, Min-Su;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.207-215
    • /
    • 2014
  • Password based authentication systems are most widely used for user convenience in web services. However such authentication systems are known to be vulnerable to various attacks such as password guessing attack, dictionary attack and key logging attack. Besides, many of the web systems just provide user authentication in a one-way fashion such that web clients cannot verify the authenticity of the web server to which they set access and give passwords. Therefore, it is too difficult to protect against DNS spoofing, phishing and pharming attacks. To cope with the security threats, web system adopts several enhanced schemes utilizing one time password (OTP) or long and strong passwords including special characters. However there are still practical issues. Users are required to buy OTP devices and strong passwords are less convenient to use. Above all, one-way authentication schemes generate several vulnerabilities. To solve the problems, we propose a multi-channel, multi-factor authentication scheme by utilizing QR-Code. The proposed scheme supports both user and server authentications mutually, thereby protecting against attacks such as phishing and pharming attacks. Also, the proposed scheme makes use of a portable smart device as a OTP generator so that the system is convenient and secure against traditional password attacks.