• Title/Summary/Keyword: secret communication

Search Result 273, Processing Time 0.028 seconds

Secure Mobile-in-Vehicle System with CBC-MAC authentication (CBC-MAC 방식을 적용한 보안 모바일기기 제어시스템)

  • Hwang, Jae-Young;Choi, Dong-Wook;Chung, Yeon-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2657-2662
    • /
    • 2010
  • Demand on information security in mobile devices based control system grows rapidly with a view to counteracting information hacking and leakage. Among these techniques, encryption and authentication are most common. This paper presents CBC-MAC (Cipher Block Chaining-Message Authentication Code) based mobile devices control system. The system is termed as Secure Mobile in Vehicle (SMIV)We use CBC-MAC that is one of the most efficient authentication modes to protect information against any malicious attacks. By sharing the secret key of CBC-MAC between the transmitter and receiver, it asserts authentic information. The proposed system is verified in such a way that we develop mobile devices control system, apply the CBC-MAC algorithm to the control system and validate the received data. Unlike conventional systems where the development of control mechanism in mobile devices based control systems is main concern, this proposed system offers a secure communication link of the data in mobile devices control system and therefore would be useful to the design and implementation of various mobile devices based control systems.

TRMA: Two-Round RFID Mutual Authentication Protocol (TRMA: 2-라운드 RFID 상호 인증 프로토콜)

  • Ahn, Hae-Soon;Bu, Ki-Dong;Yoon, Eun-Jun;Nam, In-Gil
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.5
    • /
    • pp.71-78
    • /
    • 2009
  • In RFID system, the communicated data can be easily eavesdropped and tampered with by an attacker because the communication between the reader and the tag is performed in an insecure channel. Therefore, authentication is an important role in RFID applications for providing security and privacy. In 2006, Lee, Asano and Kim proposed an RFID mutual authentication protocol (the LAK protocol) which utilizes a hash function and synchronized secret information. However, Cao and Shen showed that the LAK protocol is vulnerable to replay attack, and therefore an adversary can impersonate the tag. This paper proposes a new simple two-round RFID mutual authentication (TRMA) protocol based on secure one-way hash function. As a result, the proposed TRMA protocol not only can prevent various attacks and but also provides communication efficiency since they mutually authenticate by performing two-round between RFID tag and RFID reader.

A Study on Secure Key Backup/Recovery Scheme for Device based on Mobile Trusted Module (Mobile Trusted Module 기반 단말에서의 안전한 키 백업 및 복구 방안에 대한 연구)

  • Kang, Dong-Wan;Jun, Sung-Ik;Lee, Im-Yeoung
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.335-346
    • /
    • 2009
  • Mobile environments are evolving the main communication environment as a develops of communication technology. In mobile environments, sensitive information can be compromised on-line, so demand for security has increased. Also, mobile devices that provide various services are in danger from malware and illegal devices, phishing and sniffing etc, and the privacy. Therefore, MTM(Mobile Trusted Module) is developed and promoted by TCG(Trusted Computing Group), which is an industry standard body to enhance the security level in the mobile computing environment. MTM protects user privacy and platform integrity, because it is embedded in the platform, and it is physically secure. However, a security approach is required when secret data is migrated elsewhere, because MTM provides strong security functions. In this paper, we analyze the TCG standard and migration method for cryptographic key, then we propose a secure migration scheme for cryptographic key using key Backup/Recovery method.

Analysis of Pseudorandom Sequences Generated by Maximum Length Complemented Cellular Automata (최대길이 여원 CA 기반의 의사랜덤수열 분석)

  • Choi, Un-Sook;Cho, Sung-Jin
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.5
    • /
    • pp.1001-1008
    • /
    • 2019
  • A high-quality pseudorandom sequence generation is an important part of many cryptographic applications, including encryption protocols. Therefore, a pseudorandom number generator (PRNG) is an essential element for generating key sequences in a cryptosystem. A PRNG must effectively generate a large, high-quality random data stream. It is well known that the bitstreams output by the CA-based PRNG are more random than the bitstreams output by the LFSR-based PRNG. In this paper, we prove that the complemented CA derived from 90/150 maximum length cellular automata(MLCA) is a MLCA to design a PRNG that can generate more secure bitstreams and extend the key space in a secret key cryptosystem. Also we give a method for calculating the cell positions outputting a nonlinear sequence with maximum period in complemented MLCA derived from a 90/150 MLCA and a complement vector.

Improved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider (내부자에 의한 위장 공격을 방지하는 개선된 ID 기반 그룹 인증 및 키 합의 프로토콜)

  • Park, Hye-Won;Asano, Tomoyuki;Kim, Kwang-Jo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.25-34
    • /
    • 2009
  • Many conference systems over the Internet require authenticated group key agreement (AGKA) for secure and reliable communication. After Shamir [1] proposed the ID-based cryptosystem in 1984, ID-based AGKA protocols have been actively studied because of the simple public key management. In 2006, Zhou et al. [12] proposed two-round ID-based AGKA protocol which is very efficient in communication and computation complexity. However, their protocol does not provide user identification and suffers from the impersonation attack by malicious participants. In this paper, we propose improved ID-based AGKA protocol to prevent impersonation attack from Zhou et al.'s protocol. In our protocol, the malicious insider cannot impersonate another participants even if he knows the ephemeral group secret value. Moreover, our protocol reduces the computation cost from Zhou et al.'s protocol.

Selective Shuffling for Hiding Hangul Messages in Steganography (스테가노그래피에서 한글 메시지 은닉을 위한 선택적 셔플링)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.3
    • /
    • pp.211-216
    • /
    • 2022
  • Steganography technology protects the existence of hidden information by embedding a secret message in a specific location on the cover medium. Security and resistance are strengthened by applying various hybrid methods based on encryption and steganography. In particular, techniques to increase chaos and randomness are needed to improve security. In fact, the case where the shuffling method is applied based on the discrete cosine transform(DCT) and the least significant bit(LSB) is an area that needs to be studied. I propose a new approach to hide the bit information of Hangul messages by integrating the selective shuffling method that can add the complexity of message hiding and applying the spatial domain technique to steganography. Inverse shuffling is applied when extracting messages. In this paper, the Hangul message to be inserted is decomposed into the choseong, jungseong and jongseong. It improves security and chaos by applying a selective shuffling process based on the corresponding information. The correlation coefficient and PSNR were used to confirm the performance of the proposed method. It was confirmed that the PSNR value of the proposed method was appropriate when compared with the reference value.

A Study on the Japanese Military Installations of Oiyang-po in Gadeok-do - Focused on the Architectural Characteristics and Constructional Process of an Army Barracks and Artillery Position - (가덕도 외양포의 일본군사시설에 관한 연구 -군막사 및 포대진지의 구축과정과 건축특성을 중심으로-)

  • Lee, Ji-Young;Seo, Chi-Sang
    • Journal of architectural history
    • /
    • v.19 no.3
    • /
    • pp.51-70
    • /
    • 2010
  • This paper aims to examine the constructional background and process of the Japanese military installations of Oiyang-po(外洋浦), especially based on the military secret documents. Furthermore, it aims to analyze the characteristics of the remains. The results are as follow; 1) The number of the Japanese military secret documents concerning with the installations of Oiyang-po, summed up to 33s. Especially, 14 documents about the expropriation of the lands and houses, and the constructions of the artillery position are reserved in "Mildae-ilgi"(密大日記)written from 1893 to 1942. 2) Imperialist Japan constructed firstly the military installations of Oiyang-po against the Russo-Japanese War. After the moving of the artillery headquarters into Masan in 1911, these installations had been maintained for the defense of Busan and Jinhae Bays. 3) As soon as 1904, the lands and houses of Oiyang-po were forcibly expropriated according to (韓日議定書). The Korean Government payed the expropriation prices to the dwellers. But the amount of money were too small and were lately payed. Moreover the dwellers' fishery right were never recompensed. 4) In 1904, the artillery headquarters and position were constructed by the 3rd Chookseong-dan(築城團) under the command of Matsui, a military engineer officer. The executional constructions were accomplished by the Japanese construction contractors. 5) After the moving of the artillery headquarters into Masan in 1911, the 3rd Chookseong-dan had usually repaired and consolidated the explosive warehouses and artillery facilities. 6) The artillery position constructed with the thick concrete walls was located at the foot of the mountain in back. It's plan was similar to the rectangular shape. It reserved six 280㎜ howizers and several explosive warehouses. 7) The reserve funds and arsenal funds were used for the constructions. And the items of expenses such as the establishments of the electric lights and communication networks, and the repairs of the explosive warehouses were mainly recoded in "Mildae-ilgi".

The story structure characteristic of the "Shinbi Apartment" animation and meaning of contents of the traditional ghost story (애니메이션 <신비아파트: 고스트볼의 비밀>의 구성적 특징과 전통귀신담의 콘텐츠화의 의미)

  • Song, So-ra
    • Journal of Korean Classical Literature and Education
    • /
    • no.39
    • /
    • pp.137-180
    • /
    • 2018
  • This article examines the constitutional characteristics of the works in the "Shinbi Apartment" (Mysterious Apartment) series produced by Tooniverse, a domestic animation channel, and considers the meaning of the contents of the ghoststory (鬼神談). The "Shinbi Apartment" series is a horror animation for children. It was produced for the first time in Korea and recorded high ratings. Additionally, it is different from Japanese horror animations that were dubbed and broadcast in Korea in terms of composition and narrative direction, and it succeeds in the form and direction of the traditional Korean ghost story. "Shinbi Apartment - The Secret of Ghost Ball" enriches narrative stories by embracing the structure of the "female ghost story" in traditional ghost stories while following the form of ghosts that suddenly pop up in the daily routines of contemporary ghost stories. The ghost's shape, which has a bizarre and unpredictable aspect, embodies the ghost as the object of fear that modern horror stories intend. However, it does not stop there, but puts the attention on the hero who focuses on the emerging ghost and listens and communicates with it, placing the emphasis of the story on communication, understanding, forgiveness, and reconciliation. The structure and contents of the unique story of "The Secret of Ghost Ball" contribute to the transformation of the ghost into a subject of friendliness and entertainment, not merely as one of shock, fear, and anxiety. Additionally, as the concept of "child" is being created, the custom of modernity, which deals with the story of ghosts in the dimension of teaching and edification, is also manifested in "The Secret of Ghost Ball." In other words, through the figure of the devil, it is to continue the lesson of the story by revealing the adventure, the courage necessary for the "child," and the boundaries for substance and appearance. The "Shinbi Apartment" series has also contributed to the success of ghosts as commercial contents. The structure of the story and its characters have been actively used as educational tools and toys for children. It can be said that ghost culture contributed to this popularization by establishing a base for enjoying ghosts for amusement and entertainment.

Device Mutual Authentication and Key Management Techniques in a Smart Home Environment (스마트 홈 환경에서 디바이스 상호 인증 및 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.661-667
    • /
    • 2018
  • Recently, the smart home market is growing due to the development of wireless communication technology and sensor devices, and various devices are being utilized. Such an IoT environment collects various vast amount of device information for intelligent services, receives services based on user information, controls various devices, and provides communication between different types of devices. However, with this growth, various security threats are occurring in the smart home environment. In fact, Proofpoint and HP warned about the cases of damage in a smart home environment and the severity of security vulnerabilities, and cases of infringement in various environments were announced. Therefore, in this paper, we have studied secure mutual authentication method between smart nodes used in smart home to solve security problems that may occur in smart home environment. In the case of the proposed thesis, security evaluations are performed using random numbers and frequently updated session keys and secret keys for well-known vulnerabilities that can occur in IoT environments and sensor devices such as sniffing, spoofing, device mutual authentication, And safety. In addition, it is confirmed that it is superior in security and key management through comparison with existing smart home security protocol.

A Study on the Therapists' Protective Actions of Medical Information Privacy - With a focus on physical and occupational therapists - (환자 프라이버시 보호행동 실천에 관한 연구 - 물리치료사와 작업치료사를 중심으로 -)

  • Kim, Jeong-Ja;Kweon, Eun-Ha
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.447-455
    • /
    • 2012
  • The present study was carried out with a view to examine the protective actions of physical and occupational therapists for patients's privacy. For this purpose, a survey was conducted with the questionnaires that were distributed to 297 physical and occupational therapists engaged in general hospitals as well as in rehabilitation clinics across the country from January 2 to 13, 2012. From the survey, it was made known that the overall extent of protective actions practiced by them was $3.54{\pm}.733$ in average. Divided by area, the average protective action in communication was $3.62{\pm}.776$, followed by $3.57{\pm}1.013$ in direct contact and $3.53{\pm}.780$ in maintenance and management, respectively. The analysis of general characteristics by each area showed that the older their age gets and the longer their career is, the more the protective action is practiced by them. Although they are well aware of the fact that the medical information of patients should be kept 100% secret and they practice it to almost excellent grade (5), the physical and occupational therapists, as key experts in charge of improving functions of patients, were found to have little concern for and little knowledge about contents of protecting medical information. It is thus required to perform public relation and instruction continuously to intensify their awareness of needs to protect patients' privacy and to implant ethical sense in this regard deep in their mind.