• Title/Summary/Keyword: key exchange system

Search Result 223, Processing Time 0.026 seconds

Design and Implementation of a Client Mail Security System for Secure Mail Exchange using Public Key Infrastructure (공개키 기반 구조에서 안전한 메일 전송을 위한 클라이언트 메일 보안 시스템 설계 및 구현)

  • 정창렬;고진광
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.1
    • /
    • pp.149-157
    • /
    • 2003
  • Recently, the Internet enhanced by development of IT makes the processing and exchanging of information, As the Internet is sending and receiving digitized documents over the Internet e-mail system. The security of document information is being threated when exchanging digitized documents over an open network such as the Internet. The degree of threat is even higher when sensitive documents are involved Therefore, in this paper, the secure e-mail system on a client is designed and implemented in order to make secure exchanging of digitized documents. By using the public key infrastructure in which encrypted mail transmission, proof of delivery and integrity of the message are garanted, unauthorized manipulation, illegal acquisition and mutual authentication problem can be prevented in order to secure the document information which is crucial and sensible when exchanging the digitized document over the Internet. Futhenmore, by using the SET protocol based on public key cryptography, the secure mail system is designed and implemented in order for the users not having any professional knowledge to deal with the system easily and friendly in GUI environment.

Design of RSA cryptographic circuit for small chip area using refined Montgomery algorithm (개선된 몽고메리 알고리즘을 이용한 저면적용 RSA 암호 회로 설계)

  • 김무섭;최용제;김호원;정교일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.5
    • /
    • pp.95-105
    • /
    • 2002
  • This paper describes an efficient method to implement a hardware circuit of RSA public key cryptographic algorithm, which is important to public-key cryptographic system for an authentication, a key exchange and a digital signature. The RSA algorithm needs a modular exponential for its cryptographic operation, and the modular exponential operation is consists of repeated modular multiplication. In a numerous algorithm to compute a modular multiplication, the Montgomery algorithm is one of the most widely used algorithms for its conspicuous efficiency on hardware implementation. Over the past a few decades a considerable number of studies have been conducted on the efficient hardware design of modular multiplication for RSA cryptographic system. But many of those studies focused on the decrease of operating time for its higher performance. The most important thing to design a hardware circuit, which has a limit on a circuit area, is a trade off between a small circuit area and a feasible operating time. For these reasons, we modified the Montgomery algorithm for its efficient hardware structure for a system having a limit in its circuit area and implemented the refined algorithm in the IESA system developed for ETRI's smart card emulating system.

An Information Sharing System for Product Design Data Using WWW and STEP (웹과 STEP을 이용한 제품 설계 정보 공유 시스템)

  • 김철영;김남국;김영호;강석호
    • Korean Journal of Computational Design and Engineering
    • /
    • v.1 no.3
    • /
    • pp.203-214
    • /
    • 1996
  • An information sharing system, namely World Design View, is developed for browsing product design data on the World Wide Web environment. For the last few years information sharing has been rapidly emerging as an important research issue in the areas of concurrent engineering, product data management, virtual manufacturing, and so on. Since we are mainly concerned with product development, the key information that needs be communicated and shared is product data. The developed system puts the major advantages of STEP, OODB, and VRML together. The STEP standard provides a consistent data exchange format and application interfaces among different CAD/CAM systems. OODB is efficient and effective in dealing with complex data structures often found in engineering applications. Virtual worlds for 3-D product models can be created by VRML which is networked via the global Internet and hyperlinked with WWW. The World Design View system can support for members of virtual design teams, possibly distributed all over the world, to share 3-D shape information quickly and easily.

  • PDF

An object-oriented design methodology for manufacturing information system (객체지향적 접근방법에 의한 생산정보시스템 설계방법)

  • 김철한;김광수
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10a
    • /
    • pp.595-600
    • /
    • 1991
  • A competitive automated manufacturing system integrates the various control processes and data used in service of products. design, manufacturing, and, sale. CIM is a way to achieve such integration through computers and computational techniques in manufacturing, planning, and design. Developing effective CIM architectures is hampered by integration problems. The key to resolving these problems lies in a better understanding of manufacturing function and how it is related to other manufacturing functions. Integration of CIM environment requires coordinated solutions to data management problems for individual application system as well as for exchange of data between these applications. This requires a common framework for data management throughout the CIM environment. This paper discusses the design paradigm as a framework for this purpose. Designing an organizational structure to meet those goals invloves 1) analyzing the functions through functional decomposition, 2) developing a data model to coordinate functions. As a result, we propose an object-oriented design methodology for manufacturing information system.

  • PDF

Design and FPGA Implementation of Scalar Multiplication for A CryptoProcessor based on ECC(Elliptic Curve Cryptographics) (ECC(Elliptic Curve Crptographics) 기반의 암호프로세서를 위한 스칼라 곱셈기의 FPGA 구현)

  • Hwang Jeong-Tae;Kim Young-Chul
    • Proceedings of the IEEK Conference
    • /
    • 2004.06b
    • /
    • pp.529-532
    • /
    • 2004
  • The ECC(Elliptic Curve Cryptogrphics), one of the representative Public Key encryption algorithms, is used in Digital Signature, Encryption, Decryption and Key exchange etc. The key operation of an Elliptic curve cryptosystem is a scalar multiplication, hence the design of a scalar multiplier is the core of this paper. Although an Integer operation is computed in infinite field, the scalar multiplication is computed in finite field through adding points on Elliptic curve. In this paper, we implemented scalar multiplier in Elliptic curve based on the finite field GF($2^{163}$). And we verified it on the Embedded digital system using Xilinx FPGA connected to an EISC MCU. If my design is made as a chip, the performance of scalar multiplier applied to Samsung $0.35 {\mu}m$ Phantom Cell Library is expected to process at the rate of 8kbps and satisfy to make up an encryption processor for the Embedded digital doorphone.

  • PDF

Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions

  • Kirsal-Ever, Yoney;Eneh, Agozie;Gemikonakli, Orhan;Mostarda, Leonardo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4604-4623
    • /
    • 2014
  • Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. In this study, Communicating Sequential Processes (CSP) which is an abstract language designed especially for the description of communication patterns is employed. Rank functions are also used for verification and analysis which are helpful to establish that some critical information is not available to the intruder. In order to establish this, by assigning a value or rank to each critical information, it is shown that all the critical information that can be generated within the network have a particular characterizing property. This paper presents an application of rank functions approach to an authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results are presented and discussed.

Evaluation of Optimal Transfer Capability in Power System Interconnection (연계된 계통간의 최적 송전 용량 산정)

  • Son, Hyun-Il;Bae, In-Su;Jeon, Dong-Hoon;Kim, Jin-O
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.59 no.4
    • /
    • pp.679-685
    • /
    • 2010
  • As the electrical power industry is restructured, the electrical power exchange is becoming extended. One of the key information used to determine how much power can be transferred through the network is known as available transfer capability (ATC). To calculate ATC, traditional deterministic approach is based on the severest case, but the approach has the complexity of procedure. Therefore, novel approach for ATC calculation is proposed using cost-optimization method, well-being method and risk-benefit method in this paper. This paper proposes the optimal transfer capability of HVDC system between mainland and a separated island in Korea through these three methods. These methods will consider production cost, wheeling charge through HVDC system and outage cost with one depth (N-1 contingency).

Evaluation of Optimal Transfer Capability in Power System interconnection (연계된 계통간의 최적 송전용량 산정)

  • Son, Hyun-Il;Choi, Ah-Reum;Lee, Sung-Hoon;Kim, Jin-O;Jeon, Dong-Hoon
    • Proceedings of the KIEE Conference
    • /
    • 2009.07a
    • /
    • pp.195_196
    • /
    • 2009
  • As the electrical power industry is restructured, the electrical power exchange is becoming extended. One of the key information used to determine how much power can be transferred through the network is known as available transfer capability (ATC). To calculate ATC, traditional deterministic approach is based on the severest case, but the approach has the complexity of procedure. Therefore, novel approach for ATC calculation is proposed using cost-optimization method in this paper, and is compared with well-being method and risk-benefit method. This paper proposes the optimal transfer capability of HVDC system between mainland and a separated island in Korea through these three methods. These methods will consider production cost, wheeling charge through HVDC system and outage cost with one depth (N-1 contingency).

  • PDF

An Information Modeling Methodolgy for CIM (통합생산을 위한 생산정보 모델에 관한 연구)

  • Kim, Cheol-Han;Kim, Kwang-Soo
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.17 no.2
    • /
    • pp.115-129
    • /
    • 1991
  • An ecconomically competitive automated manufacturing system integrates the various control processes and data used in design, manufacturing, sale and service of products. CIM is a way to achieve such integration through computers and computational techniques in design, planning, and manufacturing. Developing effective CIM architectures is hampered by integration problems. The key to resolving these problems lies in a better understanding of manufacturing function and how it is related to other manufacturing functions. Integration of CIM environment requires coordinated solutions to data management problems for individual application system as well as for exchange of data between these applications. This requires a common framework for data management throughout the CIM environment. This paper discusses the design paradigm as a framework for this purpose. Designing an organizational structure to meet those goals involves 1) analyzing the functions through functional decomposition, 2) developing a data model to coordinate functions. As a result, we propose an object-oriented design methodology for manufacturing information system.

  • PDF

Implementation of Secure Email System Using lava Crypto API (자바 암호 API를 사용한 안전한 전자메일 시스템의 설계 및 구현)

  • 이직수;김상국;이명선;이원구;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.744-747
    • /
    • 2004
  • Internet, media connecting global, has increased fast at every year. Many people have been used email as method of exchanging data. But, email has many problem. Existing email may reveal privacy and sensitive information because it ran read and modify email by simple method. So, It required development of strong cryptographic email system. This paper available that email system provide delivery and content proof and seure key-exchange using lava Crypto API

  • PDF