• 제목/요약/키워드: Secure protocol

검색결과 993건 처리시간 0.028초

Improved Secure Remote User Authentication Protocol

  • 이지선;박지혜;장직현
    • 한국통신학회논문지
    • /
    • 제34권9B호
    • /
    • pp.931-938
    • /
    • 2009
  • Recently, Holbl et al. proposed an improvement to Peyravian-Jeffries's password-based authentication protocol to overcome some security flaws. However, Munilla et al. showed that Holbl et al.'s improvement is still vulnerable to off-line password guessing attack. In this paper, we provide a secure password-based authentication protocol which gets rid of the security flaws of Holbl et al.'s protocol.

소규모 멀티캐스트를 기반으로 한 멀티캐스트 보안구조 (Multicast Secure Architecture based on PIM-SM)

  • 김성선;이상순;정영목
    • 한국컴퓨터정보학회논문지
    • /
    • 제6권2호
    • /
    • pp.116-122
    • /
    • 2001
  • 기존의 멀티캐스트 보안 프로토콜은 DVMRP, CBT와 같이 비교적 규모가 큰 라우팅 프로토콜에 적합하도록 설계되어 있어서 사용자가 비교적 적고 호스트들간의 지역적인거리가 멀고 최단경로 라우팅 특성을 가지는 PIM-SM(Protocol Independent Multicast-Sparse Mode) 라우팅 프로토콜을 지원하는데 무리가 있다. 본 연구에서는 모든사용자간의 가입/탈퇴시 또는 서비스 사용 중에 사용자의 정당한 서비스 보호를 위해 서브그룹을 RP단위로 나누고, 송신자만의 비밀키를 따로 관리하는 보안 구조를 설계하였다. 그결과 데이터 전송 시 그룹 키에 의한 자료 변환 작업이 불필요하여 키 분배시간이 단축되고, 다른 보안 구조에 비해 구조가 보다 간단해졌다.

원격 헬스케어 모니터링 시스템에서 키 격리기법을 이용한 개선된 건강정보 전송 보안 프로토콜 (An Enhanced Secure Health Data Transmission Protocol using Key Insulation in Remote Healthcare Monitoring System)

  • 노시완;박영호;이경현
    • 한국멀티미디어학회논문지
    • /
    • 제19권12호
    • /
    • pp.1981-1991
    • /
    • 2016
  • In recent, the advancement of wearable devices and wireless body area networking technologies motivate researchers to pay attention to remote healthcare system for monitoring patients health and disease progression effectively. However, in order to implement a practical remote healthcare system, we must consider the security and privacy of patient's personal health information transmitted to healthcare servers through the network. Hence, in this paper, we propose a secure health data transmission protocol in remote healthcare monitoring system to protect patient's health information and prevent privacy from eavesdropping on the network. To achieve our security goals, we design an efficient secure protocol based on the identity-based cryptography with key evolution technique, and then confirm the superiority and the efficiency of the proposed protocol as compared with the existing protocol of Yang et al.

MKIPS: MKI-based protocol steganography method in SRTP

  • Alishavandi, Amir Mahmoud;Fakhredanesh, Mohammad
    • ETRI Journal
    • /
    • 제43권3호
    • /
    • pp.561-570
    • /
    • 2021
  • This paper presents master key identifier based protocol steganography (MKIPS), a new approach toward creating a covert channel within the Secure Real-time Transfer Protocol, also known as SRTP. This can be achieved using the ability of the sender of Voice-over-Internet Protocol packets to select a master key from a pre-shared list of available cryptographic keys. This list is handed to the SRTP sender and receiver by an external key management protocol during session initiation. In this work, by intelligent utilization of the master key identifier field in the SRTP packet creation process, a covert channel is created. The proposed covert channel can reach a relatively high transfer rate, and its capacity may vary based on the underlying SRTP channel properties. In comparison to existing data embedding methods in SRTP, MKIPS can convey a secret message without adding to the traffic overhead of the channel and packet loss in the destination. Additionally, the proposed covert channel is as robust as its underlying user datagram protocol channel.

The Analysis of New Video Conference System Based Secure Authentication

  • Jung Yong Deug;Kim Gil Choon;Jun Moon Seog
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 학술대회지
    • /
    • pp.600-607
    • /
    • 2004
  • The paper describes the implementation of the video conferencing system using public key infrastructure which is used for user authentication and media stream encryption. Using public key infrastructure, we are able to reinforce the authentication for conference participant and block several malicious hacking while protecting conference control information. The paper shows the implementation of the transportation layer secure protocol in conformity with Korea public key authentication algorithm standard and symmetric key encryption algorithm (RC2, SEED, DES and 3DES) for media stream encryption. The feature of the paper is transportation layer secure protocol that is implemented for protection of information on a user authentication and video conference and the media streaming encryption algorithm also can be envisioned with another block encryption algorithm. The key for media streaming encryption may be safely distributed by the transportation layer secure protocol.

  • PDF

분산 데이터베이스 환경에 적합한 Challenge-Response 기반의 안전한 RFID 인증 프로토콜 (Challenge-Response Based Secure RFID Authentication Protocol for Distributed Database Environment)

  • 이근우;오동규;곽진;오수현;김승주;원동호
    • 정보처리학회논문지C
    • /
    • 제12C권3호
    • /
    • pp.309-316
    • /
    • 2005
  • 최근 유비쿼터스 환경의 실현을 위한 핵심기술로서 RFR 시스템에 대한 연구가 활발히 진행되고 있다. 그러나 RFID 시스템이 가지고 있는 특성으로 인하여 사용자 프라이버시 침해 문제가 대두되고 있으며, 이를 해결하기 위한 프로토콜들이 개발되었다. 본 논문에서는 기존의 기법들이 가지고 있는 프라이버시 침해 문제를 분석하고 보다 안전하고 효율적으로 사용자의 프라이버시를 보호할 수 있는 인증 프로토콜을 제안한다. 또한 기존의 RFID 인증 기법들과 비교하여 제안하는 프로토콜이 안전하고 효율적임을 증명한다. 제안하는 프로토콜은 일방향 해쉬 함수와 난수를 이용한 Challenge-Response 방식에 기반하고 있으므로 공격자의 재전송 공격 및 스푸핑 공격 등에 안전하고, 분산 데이터베이스 환경에 적합하다.

Authentication and Key Agreement Protocol for Secure End-to-End Communications on Mobile Networks

  • Park, Jeong-Hyun;Kim, Jin-Suk;Kim, Hae-Kyu;Yang, Jeong-Mo;Yoo, Seung-Jae
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 2003년도 ISIS 2003
    • /
    • pp.256-259
    • /
    • 2003
  • This paper presents mutual authentication scheme between user and network on mobile communications using public key scheme based on counter, and simultaneously shows key agreement between user and user using random number for secure communications. This is also a range of possible solutions to authentication and key agreement problem-authentication and key agreement protocol based on nonce and count, and secure end-to-end protocol based on the function Y=f(.)$\^$1/, C$\^$i/ is count of user I, and f(.) is one way function.

  • PDF

NFC 결제 환경에서 양자 컴퓨팅에 안전한 인증 및 키 분배 프로토콜 (A Secure Quantum-Resistant Authentication and Key Distribution Protocol for NFC Payment Environments)

  • 김종현;박기성;박영호
    • 한국멀티미디어학회논문지
    • /
    • 제21권4호
    • /
    • pp.485-492
    • /
    • 2018
  • Recently, the numerous authentication and key distribution protocol for NFC payment environment have been proposed using public key cryptosystems. However, these protocol are vulnerable to quantum computing attack because quantum computing can solve factoring and discrete logarithm problem effectively using Grover and Shor's algorithm. For these reason, the secure authentication and key distribution have become a very important security issue in order to prevent quantum computing attacks. Therefore, to ensure user's payment information and privacy, we propose a secure quantum resistant authentication and key distribution protocol for NFC payment environments.

Ubiquitous Sensor Network에서 안전성 증가를 위한 신뢰모델과 신뢰값에 관한 프로토콜 설계 (Design of Secure Protocol based on trust model and trust values for Ubiquitous Sensor Networks)

  • 장근원;서장원
    • 디지털산업정보학회논문지
    • /
    • 제4권3호
    • /
    • pp.9-18
    • /
    • 2008
  • Mobile devices do not need the fixed network infrastructure in ad-hoc network, these devices communicate each other through the distributed control. Accordingly, mobile devices can discover several services using dynamic searching method and provide safely public ownership of these services. Ad-hoc network needs the distributed control and topology of dynamic network because the limited power for processing and network communication. This paper is devoted to provide the secure protocol that provides efficient services discovery using SDP(Service Discovery Protocol) and considers the security requirements. Proposed protocol provides the distributed control based on PKI without central server, the discovery of trusted service, secure telecommunication, the identification among mobile devices, and service access control by user authority.

양자 컴퓨팅 환경에 안전한 NTRU 기반 인증 및 키 분배 프로토콜 (Secure NTRU-based Authentication and Key Distribution Protocol in Quantum Computing Environments)

  • 정성하;이경근;박영호
    • 한국멀티미디어학회논문지
    • /
    • 제20권8호
    • /
    • pp.1321-1329
    • /
    • 2017
  • A quantum computer, based on quantum mechanics, is a paradigm of information processing that can show remarkable possibilities of exponentially improved information processing. This paradigm can be solved in a short time by calculating factoring problem and discrete logarithm problem that are typically used in public key cryptosystems such as RSA(Rivest-Shamir-Adleman) and ECC(Elliptic Curve Cryptography). In 2013, Lei et al. proposed a secure NTRU-based key distribution protocol for quantum computing. However, Lei et al. protocol was vulnerable to man-in-the-middle attacks. In this paper, we propose a NTRU(N-the truncated polynomial ring) key distribution protocol with mutual authentication only using NTRU convolution multiplication operation in order to maintain the security for quantum computing. The proposed protocol is resistant to quantum computing attacks. It is also provided a secure key distribution from various attacks such as man-in-the middle attack and replay attack.