• Title/Summary/Keyword: private key

Search Result 694, Processing Time 0.025 seconds

Non-Profiling Analysis Attacks on PQC Standardization Algorithm CRYSTALS-KYBER and Countermeasures (PQC 표준화 알고리즘 CRYSTALS-KYBER에 대한 비프로파일링 분석 공격 및 대응 방안)

  • Jang, Sechang;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1045-1057
    • /
    • 2022
  • Recently, the National Institute of Standards and Technology (NIST) announced four cryptographic algorithms as a standard candidates of Post-Quantum Cryptography (PQC). In this paper, we show that private key can be exposed by a non-profiling-based power analysis attack such as Correlation Power Analysis (CPA) and Differential Deep Learning Analysis (DDLA) on CRYSTALS-KYBER algorithm, which is decided as a standard in the PKE/KEM field. As a result of experiments, it was successful in recovering the linear polynomial coefficient of the private key. Furthermore, the private key can be sufficiently recovered with a 13.0 Normalized Maximum Margin (NMM) value when Hamming Weight of intermediate values is used as a label in DDLA. In addition, these non-profiling attacks can be prevented by applying countermeasures that randomly divides the ciphertext during the decryption process and randomizes the starting point of the coefficient-wise multiplication operation.

Strategies for Stimulating Customer Relationship: A Study of Some Public and Private Sector Banks

  • Kiran, Ravi;Sharma, Ridhima
    • Journal of Distribution Science
    • /
    • v.11 no.3
    • /
    • pp.31-37
    • /
    • 2013
  • Purpose - The present research has been undertaken to examine the Customer Relationship Management (CRM) strategies adopted by public and private sector banks in India. The initial part of research helps to identify the factors of overall satisfaction of customers. The study also tries to identify the key determinants of CRM of Indian banking. Research design, data, methodology - The present research uses a self-structured questionnaire having a reliability score of 0.817 to elicit responses from customers in New Delhi and surrounding areas in India to examine the CRM used by public and private sector banks for enhancing customer satisfaction. The scale had 32 questions covering customer perceptions related to overall satisfaction and factors contributing to CRM. Results - The results highlight that overall satisfaction comprises of two factors namely personalised Services; and reliability and dependability. The determinants of CRM as identified through survey are: Speed, safety and security; Employee CRM; on time services; customer targeting; and friendly and helpful staff. The results also highlight that safety and security was preferred to other factors by the respondents. Conclusions - The findings of this study show that in terms of performance private sector banks fared better in providing CRM services than public sector banks.

  • PDF

Public-Private Partnership in the System of Economic Development of the Country

  • Muliar, Volodymyr;Ryda, Tetyana;Dolot, Volodymyr;Didych, Oleg;Grechanyk, Bogdan;Chornysh, Iurii
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.83-88
    • /
    • 2022
  • The main purpose of the study is to determine the key aspects of the public-private partnership system in the context of the economic development of the state. At first glance, the mutually exclusive interests of the state and business do not contribute to the development of common and agreed development goals. At the same time, ignoring the versatility of interests and the aggravation of the discussion regarding the two sides under consideration, the study of the theoretical foundations of the interaction between the public and private sectors of the economy allows us to draw the following conclusion: world economic theory from classical political economy to new institutionalism has a clear structured position on the ancient historical depth of existence of the form of partnerships Based on the results of the study, the main elements of the public-private partnership system in the context of the economic development of the state were identified.

The Prospects of Metaverse in the Public vs. Private Sector by Millennials and Generation Z: Citizen/Customer Relationship Management

  • Yooncheong CHO
    • The Journal of Industrial Distribution & Business
    • /
    • v.15 no.2
    • /
    • pp.1-10
    • /
    • 2024
  • Purpose: The aim of this study is to examine the factors influencing prospects toward for the metaverse in both the public and private sectors, focusing on the perspectives of millennials and generation Z that were rarely examined in previous studies. Research design, data and methodology: This study employed an online survey as its research methodology utilizing factor analysis, ANOVA, and regression analysis to test the formulated hypotheses. Results: The findings of this study reveal that factors such as citizen/customer relationship management, the application of metaverse in both in the public and private sectors. Moreover, the effect size of applying the metaverse to cities on prospects toward the Metaverse was notably higher in the public sector. The effect size of metaverse management for customer relationship management showed a greater impact in the private sector. Conclusions: The results carry significant managerial and policy implications. They shed light on how millennials and generation Z perceive the applications of the metaverse in relation to cities, products, and brands. Notably, the results suggest that application of the metaverse for cities and management of customer relationships for products and brands emerge as key factors influencing the prospect of the metaverse in the public and private sectors.

Proposal of new GSM Authentication protocol (새로운 GSM의 인증프로토콜 제안)

  • Choi, Hyun;Song, Yun-Kyung;Park, Dong-Sun
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.113-116
    • /
    • 2003
  • Mobile communication network because information through radio channel is passed, information may be eavesdropped and need information security countermeasure in communication network dimension for safe information exchange because there is possibility that is manufactured. This paper used Public Key Cryptography for protection and authentication connected with user authentication. Use public key and private key that is asymmetry encryption key to quote that is used at encryption, decryption of Public key. Encrypt IMSI and authentication message that is transmitted MS, VLR and HLR interval to public key, wish to embody transmitted authentication protocol safety.

  • PDF

A Study on the Certification System in Electromic Commerce (전자상거래(電子商去來)의 인증체계(認證體系)에 관한 고찰(考察))

  • Ha, Kang Hun
    • Journal of Arbitration Studies
    • /
    • v.9 no.1
    • /
    • pp.367-390
    • /
    • 1999
  • The basic requirements for conducting electronic commerce include confidentiality, integrity, authentication and authorization. Cryptographic algorithms, make possible use of powerful authentication and encryption methods. Cryptographic techniques offer essential types of services for electronic commerce : authentication, non-repudiation. The oldest form of key-based cryptography is called secret-key or symmetric encryption. Public-key systems offer some advantages. The public key pair can be rapidly distributed. We don't have to send a copy of your public key to all the respondents. Fast cryptographic algorithms for generating message digests are known as one-way hash function. In order to use public-key cryptography, we need to generate a public key and a private key. We could use e-mail to send public key to all the correspondents. A better, trusted way of distributing public keys is to use a certification authority. A certification authority will accept our public key, along with some proof of identity, and serve as a repository of digital certificates. The digital certificate acts like an electronic driver's license. The Korea government is trying to set up the Public Key Infrastructure for certificate authorities. Both governments and the international business community must involve archiving keys with trusted third parties within a key management infrastructure. The archived keys would be managed, secured by governments under due process of law and strict accountability. It is important that all the nations continue efforts to develop an escrowed key in frastructure based on voluntary use and international standards and agreements.

  • PDF

Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol

  • Wei, Guiyi;Yang, Xianbo;Shao, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3352-3365
    • /
    • 2012
  • Group key agreement (GKA) is a cryptographic primitive allowing two or more users to negotiate a shared session key over public networks. Wu et al. recently introduced the concept of asymmetric GKA that allows a group of users to negotiate a common public key, while each user only needs to hold his/her respective private key. However, Wu et al.'s protocol can not resist active attacks, such as fabrication. To solve this problem, Zhang et al. proposed an authenticated asymmetric GKA protocol, where each user is authenticated during the negotiation process, so it can resist active attacks. Whereas, Zhang et al.'s protocol needs a partially trusted certificate authority to issue certificates, which brings a heavy certificate management burden. To eliminate such cost, Zhang et al. constructed another protocol in identity-based setting. Unfortunately, it suffers from the so-called key escrow problem. In this paper, we propose the certificateless authenticated asymmetric group key agreement protocol which does not have certificate management burden and key escrow problem. Besides, our protocol achieves known-key security, unknown key-share security, key-compromise impersonation security, and key control security. Our simulation based on the pairing-based cryptography (PBC) library shows that this protocol is efficient and practical.

A Method for Detecting the Exposure of an OCSP Responder's Session Private Key in D-OCSP-KIS (D-OCSP-KIS에서 OCSP Responder의 세션 개인키의 노출을 검출하는 방법)

  • Lee, Young-Gyo;Nam, Jung-Hyun;Kim, Jee-Yeon;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.83-92
    • /
    • 2005
  • D-OCSP-KIS proposed by Koga and Sakurai not only reduces the number or OCSP Responder's certificate but also criers the certificate status validation about OCSP Responder to the client. Therefore, D-OCSP-KIS is an effective method that can reduce the communication cost, computational time and storage consumption in client, but it has some problems. In case an attacker accidentally acquires an OCSP Responder's session private key in a time period (e.g., one day), she can disguise as the OCSP Responder in the time period unless the OCSP Responder recognizes. She can offer the wrong response to the client using the hash value intercepted. And the server and user on I-commerce can have a serious confusion and damage. And the computation and releasing of hash chain can be a load to CA. Thus, we propose a method detecting immediately the exposure of an OCSP Responder's session private key and the abuse of hash value in D-OCSP-KIS.

Test of Communication Distance Measurement of Fishing Gear Automatic System Based on Private LoRa (Private LoRa 기반 어구 자동식별 시스템의 거리 측정 시험)

  • Lee, Seong-Real;Kim, Se-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.2
    • /
    • pp.61-66
    • /
    • 2020
  • Since the ocean accounts for 70.8 percent of the earth's surface, the success of IoT technology in the marine industry is to collect information from devices placed in a wider range. LPWA is a feature with a wide range of communication and is very suitable for deployment in the ocean. In this paper, the real-sea performance distance experiment was carried out based on Private LoRa, a key technology for executing the electronic phrase real-name system. A private LoRa module based on sx1276 was developed, and Gateway was developed to transfer data received by private LoRa to the server using SKT Cat. M1. After installing gateways at 599 meters above sea level and experimenting with data transmission and reception at 25 km, 40 km and 60 km, we were able to see that the communication success rate was obtained to be 96.1%. 97.1% and 96.2% respectively.

Financial Analysis of Risk Reallocation in PPP Projects - Focusing on the Transactions between Private Investors in Korea - (국내 민간투자사업 리스크 재분담의 재무적 영향성 분석 - 민간투자자 간 지분거래 및 약정거래를 중심으로 -)

  • Chu, Chang Hwan;Kwon, Byungki;Lee, Hyun-soo;Park, Moonseo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.19 no.2
    • /
    • pp.25-37
    • /
    • 2018
  • In recent times, private sector allocates the risk between private sector investors in terms of equity transaction and agreement transaction. The additional risk-allocation have made the cash flows of private sector investors fluctuated and some of the PPP projects delayed. Therefore, analyzing the impact of the risk reallocation between private sector investors on their cash flows is critical for encouraging the private sector participants. In this study, a model to evaluate the financial viability of PPP project is developed based on the discounted cash flow analysis. The model can analyze the variability by equity and agreement transaction by identifying key variables of equity transaction, influence factors of agreement transaction, and relationship between the transactions and investor's profitability. It is expected that the private sector can determine the investment decision for PPP projects when the risk reallocation is occurred.