• Title/Summary/Keyword: repudiation

Search Result 158, Processing Time 0.026 seconds

A Forgery detection protocol for protection of mobile agent execution results (이동 에이전트 수행 결과에 대한 부정 검출 프로토콜)

  • Kim, Hee-Yeon;Shin, Jung-Hwa;Shin, Weon;Rhee, Kyung-Hyune
    • The KIPS Transactions:PartB
    • /
    • v.9B no.5
    • /
    • pp.517-522
    • /
    • 2002
  • Mobile agent systems offer a new paradigm for distributed computation and a one of solution for limitation of existent Client-server model. Mobile agent systems provide interface that can migrate from host to host in a heterogenous network. For secure execution, it must solve security problem of mobile code before. In this paper, we are propose the protocol that applied signature technique and hash chain technique. This protocol enable one to offer forward integrity, non-repudiation, and forgery detection, when mobile agents are perform the task by migrating a network.

Design and Implementation of a new XML-Signcryption scheme to protect the XML document (XML 문서 보안을 위한 새로운 XML-Signcryption scheme 설계 및 구현)

  • Han, Myung-Jin;Lee, Young-Kyung;Shin, Jung-Hwa;Rhee, Kyung-Hyung
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.405-412
    • /
    • 2003
  • As the XML is approved standard language by the UN, the progress which complemented the XML security has being processed rapidly. In this paper, we design and implement the "XML-Signcryption" as a security mechanism to protect the XML document that can operate between other platforms. The signature and encryption which is the standard specification in W3C needs to be able to proceed them separately. Generally the signature and encryption require four times modular exponential operation, however the signcryption only needed three times modular exponential operation. This will benefit overall system effectiveness in terms of cost. And this scheme offers to convenient the user, because the signature and encryption implement as a single XML format. This tool can save the parsing time as a number of tags is few within a document. And also, in this paper, based on a research of Web Services security, we can apply XML-Signcryption to the SOAP message to provide the security services. Based on the XML-Signcryption scheme which provides confidentiality, integrity, authentication and non-repudiation to the XML document and Web Service security simultaneously.

An Efficient Authentication Scheme for Multicast Packet using Recovery Layer (복구 계층을 이용한 멀티캐스트 패킷 인증)

  • 홍기훈;정수환
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.63-73
    • /
    • 2004
  • This paper proposes an efficient authentication scheme for multicast packet using recovery layer to provide source authentication. The problems of the existing schemes are as follows : TESLA requires time synchronization between the sender and the receiver, md hash-based schemes have high communication overheads due to additional hash values and require many buffers and delay for verification on receivers. Our main focus is reducing the buffer size, communication and computation burden of the receiver. The proposed scheme in this paper is highly robust to packet loss using the recovery layer based on XOR operation. It also provides low communication overhead, low verification cost, non-repudiation of the origin, immediate verification and robustness against DoS attack on the receiver.

An Efficient MIPv4 Registration Protocol With Minimal Overheads Of AAA (AAA 오버헤드를 최소화한 효율적인 MIPv4 등록 프로토롤)

  • Kang Hyun-Sun;Park Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.3
    • /
    • pp.43-52
    • /
    • 2005
  • MIPv4 supports node mobility, manages MN's binding list and provides seamless communication through registration protocol. Since the registration protocol usually operating in the wireless environment involves authenticating MNs, it is a general approach to introduce the AAA infrastructure as key distribution center for the purpose of authentication. In this paper, we propose an efficient registration protocol with lightweight AAA based on domain key. Proposed protocol also withstands various replay attacks, and provides non-repudiation service for the accounts of the usage of the network service.

A PERFORMANCE IMPROVEMENT OF ANEL SCHEME THROUGH MESSAGE MAPPING AND ELLIPTIC CURVE CRYPTOGRAPHY

  • Benyamina Ahmed;Benyamina Zakarya
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.169-176
    • /
    • 2023
  • The vehicular ad hoc network (VANET) is currently an important approach to improve personal safety and driving comfort. ANEL is a MAC-based authentication scheme that offers all the advantages of MAC-based authentication schemes and overcomes all their limitations at the same time. In addition, the given scheme, ANEL, can achieve the security objectives such as authentication, privacy preservation, non-repudiation, etc. In addition, our scheme provides effective bio-password login, system key update, bio-password update, and other security services. Additionally, in the proposed scheme, the Trusted Authority (TA) can disclose the source driver and vehicle of each malicious message. The heavy traffic congestion increases the number of messages transmitted, some of which need to be secretly transmitted between vehicles. Therefore, ANEL requires lightweight mechanisms to overcome security challenges. To ensure security in our ANEL scheme we can use cryptographic techniques such as elliptic curve technique, session key technique, shared key technique and message authentication code technique. This article proposes a new efficient and light authentication scheme (ANEL) which consists in the protection of texts transmitted between vehicles in order not to allow a third party to know the context of the information. A detail of the mapping from text passing to elliptic curve cryptography (ECC) to the inverse mapping operation is covered in detail. Finally, an example of application of the proposed steps with an illustration

THE PROTESTANT CHURCH AND RELIGIOUS SYNCRETISM IN SOUTH KOREA (한국개신교와 종교 혼합주의)

  • Kim, Eun-Gi
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.19
    • /
    • pp.125-143
    • /
    • 2005
  • This study offers an analysis of how Protestant Christianity in South Korea incorporated many beliefs and practices of Korean traditional religions in order to make the new faith more appealing to the masses. The paper also examines the way in which specific Protestant doctrines and practices were modified or accentuated to suit the disposition of the Korean people. In agreement with Confucianism, for example, Protestant churches in general emphasized the values of diligence, self-cultivation, righteous living, and, most importantly, filial piety. By overtly and subtly permitting ancestral rites to be conducted by Christians, moreover, Protestant Christianity evaded successfully the potential alienation of the tradition-bound Koreans. From Buddhism, Protestant Christianity syncretized such elements as the daily dawn prayer and all-night prayer as well as the practices of baekilgido ("a hundred-day prayer") and chunilgido ("a thousand-day prayer"). Hundreds of prayer centers that exist deep in the mountains also manifest a Buddhist influence. Shamanistic influences are also evident in Korean Protestantism, replete with the latter's emphasis on this-worldly success (health, prosperity, long life, etc.), faith healing, and conceptualization of God as being merciful and generous. What all of this reveals is that Christian conversion in South Korea did not involve an exclusivistic change of religious affiliation, meaning that it did not require the repudiation of traditionally held beliefs. Instead, millions of South Koreans eagerly embraced Protestant Christianity precisely because the new faith was advanced as an extension or continuation of traditional religious practices.

  • PDF

Key-based dynamic S-Box approach for PRESENT lightweight block cipher

  • Yogaraja CA;Sheela Shobana Rani K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.12
    • /
    • pp.3398-3415
    • /
    • 2023
  • Internet-of-Things (IoT) is an emerging technology that interconnects millions of small devices to enable communication between the devices. It is heavily deployed across small scale to large scale industries because of its wide range of applications. These devices are very capable of transferring data over the internet including critical data in few applications. Such data is exposed to various security threats and thereby raises privacy-related concerns. Even devices can be compromised by the attacker. Modern cryptographic algorithms running on traditional machines provide authentication, confidentiality, integrity, and non-repudiation in an easy manner. IoT devices have numerous constraints related to memory, storage, processors, operating systems and power. Researchers have proposed several hardware and software implementations for addressing security attacks in lightweight encryption mechanism. Several works have made on lightweight block ciphers for improving the confidentiality by means of providing security level against cryptanalysis techniques. With the advances in the cipher breaking techniques, it is important to increase the security level to much higher. This paper, focuses on securing the critical data that is being transmitted over the internet by PRESENT using key-based dynamic S-Box. Security analysis of the proposed algorithm against other lightweight block cipher shows a significant improvement against linear and differential attacks, biclique attack and avalanche effect. A novel key-based dynamic S-Box approach for PRESENT strongly withstands cryptanalytic attacks in the IoT Network.

A Selective Encryption/Decryption Method of Sensitive Music Usage History Information on Theme, Background and Signal Music Blockchain Network

  • Youngmo Kim;Byeongchan Park;Seok-Yoon Kim
    • Journal of Web Engineering
    • /
    • v.21 no.4
    • /
    • pp.1265-1282
    • /
    • 2022
  • The theme, background, and signal music usage history information consists of general information such as music information, platform information, and music usage information, and sensitive information such as rights management information, music usage permission range, and contract information. If sensitive information among these is disclosed, disputes such as trade secrets and infringement of personal information protection between companies or between companies and individuals may arise. We propose a selective encryption/decryption method to secure the confidentiality, integrity, reliability and non-repudiation of sensitive music usage history information used in the theme, background, and signal music blockchain environment. In the proposed method, a monitoring company encrypts sensitive information using a secret key for usage history information, which is combined with general information, and digitally signs it using a private key to register it in a block. A trust group can view and access the information at the time of inquiry by verifying the digital signature with the public key of the monitoring company and then can decrypt the sensitive information using the private key.

Convergence of Related Standard of CC and ISO for Security Evaluation of VPN (VPN의 보안성 평가를 위한 CC와 ISO 관련 표준의 융합)

  • Lee, Ha-Young;Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.341-348
    • /
    • 2016
  • Because VPN(Virtual Private Network) uses internet network, the security technique should support it and evaluation technique based on standard should support it. Therefore the method should be organized that can evaluate the security of VPN based on the related standard. In this study, we intended to construct the security evaluation model through combining CC(Common Criteria) which is a evaluation standard and a part of security(Confidentiality, Integrity, Non-repudiation, Accountability, Authenticity) evaluation of ISO which is the standard of software quality evaluation. For this, we analyzed the quality requirements about intra-technology and security of VPN and constructed the evaluation model related to the quality characteristics of two international standard. Through this, we are able to construct a convergence model for security evaluation of VPN. Through accumulating the evaluation practices for VPN in the future, the suitability and validity of the evaluation model must be improved.

A Study on the Expressional Characteristic of the Machine Aesthetics in the Fashion Design(I) (패션 디자인에 나타난 기계미학의 표현 특성에 관한 연구(I))

  • 이효진
    • The Research Journal of the Costume Culture
    • /
    • v.6 no.2
    • /
    • pp.109-126
    • /
    • 1998
  • The purpose of this study was to analyze the expressional characteristics of the machine aesthetics in the fashion design. First, this study was started from analyzing mechanical beauty represented on the early 20th century art style. Machine aesthetics has influenced on the art and fashion design from modern to now. Futurism was grounded in the complete renewal of human sensibility brought about by the great discoveries of science. Especially, Russia avant-garde was inspired by the Futurism, that is Rayonism, Constructivism, Suprematism. Kasimir Malevich moved on immediately to purely abstract paintings of which the first was a black square on a white canvas. He had begun the art he called 'Suprematism'. Malevich's geometry was funded on the straight line, the supremely elemental form which symbolized man's ascendancy over the chaos of nature. The square was the basic suprematist element and was a repudiation of the world of appearances, and of past art. He repudiated any marriage of convenience between the artist and the engineer. Vladimir Tatlin made some of the most revolutionary works of modern art, these were the first works to be called 'construction'. Constructivists believed that the essential conditions of the machine and the consciousness of man inevitably create an aesthetic which would reflect their time. They eulogized simple shapes. That believed that buildings and objects should be freed from the ornamental excrescences and the accumulated barnacles of past art. Consequently, under the theoretical background, the result is as follows. First, The functional formativeness of machine aesthetics was expressed as a geometrical silhouette, construction line, non-ornamental construction, simple color in the 20th century design. Second, The mechanical formativeness of machine aesthetics was expressed as a construction of new material-iron, aluminium, plastic, glass-, geometrical form of material in he 20th century design. That is, machine beauty has more concerned with the expressional ideology of the art style and the formativeness of fashion design by silhouette, construction line, material, form.

  • PDF