• Title/Summary/Keyword: agreement protocols

Search Result 115, Processing Time 0.028 seconds

Improved Password Change Protocol Using One-way Function (일방향 함수를 이용한 개선된 패스월드 변경 프로토콜)

  • Jeon Il-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.121-127
    • /
    • 2006
  • Recently, Chang et at.$^[9]$ proposed a new password-based key agreement protocol and a password change protocol to improve the efficiency in the password-based authenticated key agreement protocol proposed by Yeh et at.$^[8]$. However, Wang et al.$^[10]$ showed that their protected password change protocol is not secure under the denial of service attack and the dictionary attack This paper proposes an improved password change protocol to solve this problems in the Chang et al's protocol. In the proposed protocol, the format of communication messages is modified not to have any clue for the guessing of the password and verifying of the guessed password. The proposed protocol supports the advantages in the previous password-based protocols and solves the problems in them effectively.

Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things (사물 인터넷 환경에서 경량화 장치 간 상호 인증 및 세션키 합의 기술)

  • Park, Jiye;Shin, Saemi;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.9
    • /
    • pp.707-714
    • /
    • 2013
  • IoT, which can be regarded as an enhanced version of M2M communication technology, was proposed to realize intelligent thing to thing communications by utilizing Internet connectivity. Things in IoT are generally heterogeneous and resource constrained. Also such things are connected with each other over LLN(low power and lossy Network). Confidentiality, mutual authentication and message origin authentication are required to make a secure service in IoT. Security protocols used in traditional IP Networks cannot be directly adopted to resource constrained devices in IoT. Under the respect, a IETF standard group proposes to use lightweight version of DTLS protocol for supporting security services in IoT environments. However, the protocol can not cover up all of very constrained devices. To solve the problem, we propose a scheme which tends to support mutual authentication and session key agreement between devices that contain only a single crypto primitive module such as hash function or cipher function because of resource constrained property. The proposed scheme enhances performance by pre-computing a session key and is able to defend various attacks.

Improved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider (내부자에 의한 위장 공격을 방지하는 개선된 ID 기반 그룹 인증 및 키 합의 프로토콜)

  • Park, Hye-Won;Asano, Tomoyuki;Kim, Kwang-Jo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.25-34
    • /
    • 2009
  • Many conference systems over the Internet require authenticated group key agreement (AGKA) for secure and reliable communication. After Shamir [1] proposed the ID-based cryptosystem in 1984, ID-based AGKA protocols have been actively studied because of the simple public key management. In 2006, Zhou et al. [12] proposed two-round ID-based AGKA protocol which is very efficient in communication and computation complexity. However, their protocol does not provide user identification and suffers from the impersonation attack by malicious participants. In this paper, we propose improved ID-based AGKA protocol to prevent impersonation attack from Zhou et al.'s protocol. In our protocol, the malicious insider cannot impersonate another participants even if he knows the ephemeral group secret value. Moreover, our protocol reduces the computation cost from Zhou et al.'s protocol.

Secure Group Communications Considering Computational Efficiency of Mobile Devices in Integrated Wired and Wireless Networks (무선 단말기의 계산 효율성을 고려한 유.무선 통합 네트워크 환경에서의 안전한 그룹 통신)

  • Chang Woo-Suk;Kim Hyun-Jue;Nam Jung-Hyun;Cho Seok-Hyang;Won Dong-Ho;Kim Seung-Joo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.60-71
    • /
    • 2006
  • Group key agreement protocols are designed to allow a group of parties communicating over a public network to securely and efficiently establish a common secret key, Over the years, a number of solutions to the group key agreement protocol have been proposed with varying degrees of complexity, and the research relating to group key agreement to securely communicate among a group of members in integrated wired and wireless networks has been recently proceeded. Both features of wired computing machines with the high-performance and those of wireless devices with the low-power are considered to design a group key agreement protocol suited for integrated wired and wireless networks. Especially, it is important to reduce computational costs of mobile devices which have the limited system resources. In this paper, we present an efficient group key agreement scheme which minimizes the computational costs of mobile devices and is well suited for this network environment and prove its security.

Comparison of OC and EC Measurement Results Determined by Thermal-optical Analysis Protocols (열광학적 분석 프로토콜에 의한 유기탄소와 원소탄소 측정값 비교)

  • Kim, Hyosun;Jung, Jinsang;Lee, Jinhong;Lee, Sangil
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.31 no.5
    • /
    • pp.449-460
    • /
    • 2015
  • Carbonaceous aerosol is generally classified into OC (organic carbon) and EC (elemental carbon) by thermal optical analysis. Both NIOSH (National institute of occupational safety and health) with high temperature (HighT) and IMPROVE-A (Interagency monitoring of protected visual environments) with low temperature (LowT) protocols are widely used. In this study, both protocols were applied for ambient $PM_{2.5}$ samples (Daejeon, Korea) in order to underpin differences in OC and EC measurements. An excellent agreement between NIOSH and IMPROVE-A protocol was observed for TC (total carbon). However, significant differences between OC and EC appeared and the differences were larger for EC than OC. The main differences between two protocols are temperature profile and charring correction method. For the same charring correction method, HighT_OC was 10% higher than LowT_ OC, while HighT_EC was 15% and 33% lower than LowT_EC for TOT (thermal-optical transmittance) and TOR (thermal-optical reflectance), respectively. This difference may be caused by the temperature of OC4 in He step and possibly difference in POC (pryorilized OC) formation. For the same temperature profile, OC by TOT was about 26% higher than that by TOR. In contrast, EC by TOT was about 50% lower than that by TOR. POC was also dependent on both temperature profile and the charring correction method, showing much distinctive differences for the charring correction method (i.e., POC by TOT to POC by TOR ratio is about 2). This difference might be caused by different characteristics between transmittance and reflectance for monitoring POC formation within filters. Results from this study showed that OC and EC depends on applied analysis protocol as shown other studies. Because of the nature of the thermal optical analysis, it may not be possible to have an absolute standard analysis protocol that is applicable for any ambient $PM_{2.5}$. Nevertheless, in order to provide consistent measurement results for scientists and policy makers, future studies should focus on developing a harmonized standard analysis protocol that is suitable for a specific air domain and minimizes variations in OC and EC measurement results. In addition, future elaborate studies are required to find and understand the causes of the differences.

An Architecture for Key Management in Hierarchical Mobile Ad-hoc Networks

  • Rhee, Kyung-Hyune;Park, Young-Ho;Gene Tsudik
    • Journal of Communications and Networks
    • /
    • v.6 no.2
    • /
    • pp.156-162
    • /
    • 2004
  • In recent years, mobile ad-hoc networks have received a great deal of attention in both academia and industry to provide anytime-anywhere networking services. As wireless networks are rapidly deployed, the security of wireless environment will be mandatory. In this paper, we describe a group key management architecture and key agreement protocols for secure communication in mobile ad-hoc wireless networks (MANETs) overseen by unmanned aerial vehicles (UAVs). We use implicitly certified public keys method, which alleviates the certificate overhead and improves computational efficiency. The architecture uses a two-layered key management approach where the group of nodes is divided into: 1) Cell groups consisting of ground nodes and 2) control groups consisting of cell group managers. The chief benefit of this approach is that the effects of a membership change are restricted to the single cell group.

Practical use of Standard Key agreement protocols based on Discrete Logarithm (이산대수에 기반한 표준 키 분배 프로토콜의 응용분야에 관한 연구)

  • Kim, Kyung-Jin;Oh, Soo-Hyun;Kim, Hyun-Joo;Won, Dong-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.801-804
    • /
    • 2002
  • 최근 인터넷의 발달로 대량의 디지털 정보를 활용할 수 있는 기반이 성숙됨에 따라 이를 이용한 다양한 서비스가 증가하고 있으며, 이와 더불어 인터넷 상에서 전송되는 메시지에 대한 기밀성을 제공하기 위한 다양한 암호시스템의 사용 또한 증가하고 있다. 그러나, 암호 시스템 내에서 사용되고 있는 키 분배 프로토콜들에 대한 적절한 선택 기준이 미흡한 실정이다. 따라서, 본 논문에서는 표준으로 제정된 이산대수 기반의 키 분배 프로토콜들의 특징을 분석하고 이것을 바탕으로 가장 적합한 응용분야를 제시한다.

  • PDF

Comparison between different cone-beam computed tomography devices in the detection of mechanically simulated peri-implant bone defects

  • Kim, Jun Ho;Abdala-Junior, Reinaldo;Munhoz, Luciana;Cortes, Arthur Rodriguez Gonzalez;Watanabe, Plauto Christopher Aranha;Costa, Claudio;Arita, Emiko Saito
    • Imaging Science in Dentistry
    • /
    • v.50 no.2
    • /
    • pp.133-139
    • /
    • 2020
  • Purpose: This study compared 2 cone-beam computed tomography (CBCT) systems in the detection of mechanically simulated peri-implant buccal bone defects in dry human mandibles. Materials and Methods: Twenty-four implants were placed in 7 dry human mandibles. Peri-implant bone defects were created in the buccal plates of 16 implants using spherical burs. All mandibles were scanned using 2 CBCT systems with their commonly used acquisition protocols: i-CAT Gendex CB-500 (Imaging Sciences, Hatfield, PA, USA; field of view [FOV], 8 cm×8 cm; voxel size, 0.125 mm; 120 kVp; 5 mA; 23 s) and Orthopantomograph OP300 (Intrumentarium, Tuusula, Finland; FOV, 6 cm×8 cm; voxel size, 0.085 mm; 90 kVp; 6.3 mA; 13 s). Two oral and maxillofacial radiologists assessed the CBCT images for the presence of a defect and measured the depth of the bone defects. Diagnostic performance was compared in terms of the area under the curve (AUC), accuracy, sensitivity, specificity, and intraclass correlation coefficient. Results: High intraobserver and interobserver agreement was found (P<0.05). The OP300 showed slightly better diagnostic performance and higher detection rates than the CB-500 (AUC, 0.56±0.03), with a mean accuracy of 75.0%, sensitivity of 81.2%, and specificity of 62.5%. Higher contrast was observed with the CB-500, whereas the OP300 formed more artifacts. Conclusion: Within the limitations of this study, the present results suggest that the choice of CBCT systems with their respective commonly used acquisition protocols does not significantly affect diagnostic performance in detecting and measuring buccal peri-implant bone loss.

Use of Cylindrical Chambers as Substitutes for Parallel-Plate Chambers in Low-Energy Electron Dosimetry

  • Chun, Minsoo;An, Hyun Joon;Kang, Seong-Hee;Cho, Jin Dong;Park, Jong Min;Kim, Jung-in
    • Progress in Medical Physics
    • /
    • v.29 no.1
    • /
    • pp.16-22
    • /
    • 2018
  • Current dosimetry protocols recommend the use of parallel-plate chambers in electron dosimetry because the electron fluence perturbation can be effectively minimized. However, substitutable methods to calibrate and measure the electron output and energy with the widely used cylindrical chamber should be developed in case a parallel-plate chamber is unavailable. In this study, we measured the correction factors and absolute dose-to-water of electrons with energies of 4, 6, 9, 12, 16, and 20 MeV using Farmer-type and Roos chambers by varying the dose rates according to the AAPM TG-51 protocol. The ion recombination factor and absolute dose were found to be varied across the chamber types, energy, and dose rate, and these phenomena were remarkable at a low energy (4 MeV), which was in good agreement with literature. While the ion recombination factor showed a difference across chamber types of less than 0.4%, the absolute dose differences between them were largest at 4 MeV at approximately 1.5%. We therefore found that the absolute dose with respect to the dose rate was strongly influenced by ion-collection efficiency. Although more rigorous validation with other types of chambers and protocols should be performed, the outcome of the study shows the feasibility of replacing the parallel-plate chamber with the cylindrical chamber in electron dosimetry.

Diagnostic efficacy of a modified low-dose acquisition protocol for the preoperative evaluation of mini-implant sites

  • Tadinada, Aditya;Marczak, Alana;Yadav, Sumit
    • Imaging Science in Dentistry
    • /
    • v.47 no.3
    • /
    • pp.141-147
    • /
    • 2017
  • Purpose: The objective of this study was to compare the outcomes of surgical mini-implant placement when potential mini-implant sites were scanned using a lower-dose $180^{\circ}$ acquisition protocol versus a conventional $360^{\circ}$ acquisition protocol. Materials and Methods: Ten dentate human skulls were used to provide sites for potential mini-implant placement. The sites were randomly divided into 2 groups: $360^{\circ}$ and $180^{\circ}$ cone-beam computed tomography (CBCT) acquisition protocols. A small-volume $180^{\circ}$ CBCT scan and a $360^{\circ}$ CBCT scan of each site were acquired using a Morita Accuitomo-170 CBCT machine and then a mini-implant was placed. A follow-up $360^{\circ}$ CBCT scan was done as a gold standard to evaluate the location of the mini-implant and root perforation. Two raters evaluated the scans. Results: Ninety-eight percent of the mini-implants placed did not perforate any root structure. Two percent of the sites had an appearance suggestive of perforation. On a Likert scale, both raters agreed that their subjective evaluation of the diagnostic quality of the protocols, ability to make and read measurements of the sites, and preferences for the specified diagnostic task were comparable. The Cohen kappa showed high inter-rater and intrarater agreement. Conclusion: In this ex vivo study, we found that the $180^{\circ}$ rotational acquisition was as effective as the conventional $360^{\circ}$ rotational acquisition for the preoperative evaluation of potential mini-implant sites.