• Title/Summary/Keyword: secure card

Search Result 198, Processing Time 0.023 seconds

User Authentication Mechanism for using a Secure IPTV Service in Mobile Device (이동 장비에서 안전한 IPTV 서비스를 사용하기 위한 사용자 인증 메커니즘)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.377-386
    • /
    • 2009
  • IPTV technology for providing multimedia content with high-speed is the network which combines existing network, multimedia and internet technology etc. But internet, broadcasting and web technologies which is now being used is not optimized to IPTV because the security problem between user who gets content service through mobile units and content server is not guaranteed. This paper proposes user certification mechanism between mobile device and content server to receive the service which the user for the content chooses by mobile device safely. The proposed mechanism uses the random number which user creates and certification token for preventing illegal user who uses other's service that already paid. Also the proposed protocol encrypts the delicate data like user's information or profile using shared-key between java card attached on user's mobile device and grant sewer and then prevents reply attack which happens often in wireless section and man-in-the-middle attack by MAC.

Security Analysis and Improvements of a Biometrics-based User Authentication Scheme Using Smart Cards (스마트 카드를 이용한 생체인식 기반 사용자 인증 스킴의 안전성 분석 및 개선)

  • An, Young-Hwa
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.159-166
    • /
    • 2012
  • Many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2010, Chang et al. proposed an improved biometrics-based user authentication scheme without concurrency system which can withstand forgery attack, off-line password guessing attack, replay attack, etc. In this paper, we analyze the security weaknesses of Chang et al.'s scheme and we have shown that Chang et al.'s scheme is still insecure against man-in-the-middle attack, off-line biometrics guessing attack, and does not provide mutual authentication between the user and the server. And we proposed the improved scheme to overcome these security weaknesses, even if the secret information stored in the smart card is revealed. As a result, the proposed scheme is secure for the user authentication attack, the server masquerading attack, the man-in-the-middle attack, and the off-line biometrics guessing attack, does provide the mutual authentication between the user and the remote server. And, in terms of computational complexities, the proposed scheme is more effective than Chang et al.'s scheme.

New Simple Power Analysis on scalar multiplication based on sABS recoding (sABS 형태의 스칼라 곱셈 연산에 대한 새로운 단순전력 공격)

  • Kim, Hee-Seok;Kim, Sung-Kyoung;Kim, Tae-Hyun;Park, Young-Ho;Lim, Jong-In;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.115-123
    • /
    • 2007
  • In cryptographic devices like a smart-card whose computing ability and memory are limited, cryptographic algorithms should be performed efficiently. Scalar multiplication is very important operation in Elliptic Curve Cryptosystems, and so must be constructed in safety against side channel attack(SCA). But several countermeasures proposed against SCA are exposed weaknesses by new un-dreamed analysis. 'Double-and-add always scalar multiplication' algorithm adding dummy operation being known to secure against SPA is exposed weakness by Doubling Attack. But Doubling Attack cannot apply to sABS receding proposed by Hedabou, that is another countermeasure against SPA. Our paper proposes new strengthened Doubling Attacks that can break sABS receding SPA-countermeasure and a detailed method of our attacks through experimental result.

User Authentication Protocol preserving Enhanced Anonymity and Untraceability for TMIS

  • Mi-Og Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.10
    • /
    • pp.93-101
    • /
    • 2023
  • In this paper, as a result of analyzing the TMIS authentication protocol using ECC and biometric information proposed by Chen-Chen in 2023, there were security problems such as user impersonation attack, man-in-the-middle attack, and user anonymity. Therefore, this paper proposes an improved authentication protocol that provides user anonymity to solve these problems. As a result of analyzing the security of the protocol proposed in this paper, it was analyzed to be secure for various attacks such as offline password guessing attack, user impersonation attack, smart-card loss attack, insider attack, perfect forward attack. It has also been shown to provided user privacy by guaranteeing user anonymity and untraceability, which must be guaranteed in TMIS. In addition, there was no significant increase in computational complexity, so the efficiency of execution time was achieved. Therefore, the proposed protocol in this paper is a suitable user authentication protocol for TMIS.

Current Issues between Korean & Japan : Dokdo and Historical Distortion in Japanese Textbooks (한·일 간의 현안 : 독도와 일본 교과서의 역사왜곡)

  • Kim, Joo-Sik
    • Strategy21
    • /
    • s.31
    • /
    • pp.190-219
    • /
    • 2013
  • Since Korea and Japan established diplomatic relationship, Relationship between Korea and Japan has not been easygoing. There are two most explosive, and noticeable ones among topics which have affected the relationship ; Dokdo and Historical Distortion. Without these issues, relationship between two countries will take a turn for the better. However, unfortunately, it seems that it is almost never going to happen. There is the Japanese conservative right-wing who has an influence on those two issues. The right-wing takes regard getting negative view or finding out dark past as an action from Self-torture view of history, and tries to dilute the Japanese sense of guilt on past invasions to neighbor countries. Moreover, to become a "normal country", they are trying to revise Constitution of the Japan so that Japan can possess the military and re-arm, dispatch troops abroad, and get the right to break the war. In other words, they expect Japan to become a powerful nation with great influence on Asia and world, as the period in which Japan conquered Korean peninsula, China, and South-Eastern nations. Japan still harbours secret romanticism for bygone days of imperialist glory. That is why neighbors want to never make the painful history happen again. In order to deal with this effort, most of all, it is required to assert better argument with a careful, thorough analysis on Japanese opinion about Dokdo. There might be a hidden card which can be accepted in the international society considering Japanese persistent effort to make Dokdo disputed area, and that is why we have to know that it is. In addition, it is needed to secure a high-quality professional manpower because the issues of Dokdo and Historical Distortion are primarily the matter of logic and references. The professional manpower should have open-minded to break down walls of their own majors. We have to introduce our achievements and stances to the international society vigorously. As a definite way to solve these problems, we have to develop national power. We have to possess naval forces and coast guard to protect our territory and Koreans overseas. There are not many options Korea can do to Japan, except protesting denunciation, and pressing a joint efforts. Most of the suggestions stated before are what have to be conducted domestically. It is a miserable condition, because two problems are Japanese domestic issues, but they become international issues and we have to seek a solution for ourselves.

  • PDF

Catalog use study : with reference to universities in Daegu (대학도서관의 목록이용연구)

  • 최달현
    • Journal of Korean Library and Information Science Society
    • /
    • v.9
    • /
    • pp.241-266
    • /
    • 1982
  • This paper gives a summary and overview of a survey conducted at the catalogues of five universities in Daegu during November 1982. The major objective of this study was to secure information about user needs in order to improve the catalogue in Korean university libraries. Data was collected by a combined method of questionnaire and interview. A total of 379 respondents were taken on a randomly selected sample of catalogue users. Results of the survey can be summarized as follows: 1. Eighty-eight percent of the students answered that they had used the library more than twice a month. Nevertheless the number of students consulting the catalogue with the same frequency was only 220, or a n.0, pproximately 58 percent. Those who used the library most tended to use the catalogue more than those who rarely came to the library. 2. Those who had been shown how to use their own catalogue were only 32.5percent of which the students found the instruction sufficient for them to be able to use the catalogue were only 37.5 percent. In particular, they stated that instructions by printed materials and/or library orientation were so poor that they didn't give much help in using the catalogue. This problem makes many libraries to review their own method of instruction in order to encourage patrons to use the catalogue more effectively. 3. Most of the students consulted the catalogue in order to locate library materials. Known-item searches and subject searches were 84 and 16 percent respectively. While 70.5 percent of the students used the author-title catalogue without any difficulties, only 35.5 percent of those stated that using the classed catalogue was easy. 4. It was surprising that the number of students using title access in the search was far greater than that of students using author access. In contrast with this, other studies conducted by many earlier overseas investigators revealed that the great majority of patrons tended to use the latter first. Therefore, we should put more emphasis on the title entries in the catalogue itself as well as cataloging rules. 5. Most useful bibliographic elements in the entry were author, title, call number, date and publisher whereas edition, series statement and the location of publisher were rarely used compared with the other elements. Content note was the most desirable element in the entry to be involved, for many catalogers were used not to describe it on the note area. 6. The chief reason given for not using the catalogue was "I can manage without it" with "It's difficult to understand contents of the card entry." The other one was "It's useless to search materials by the catalogue because I've failed so many times to obtain them out of the stock." In response to this, circulation and acquisition system should be improved not to make such complaints any more.

  • PDF

An authentication service application using Context-awareness (상황인식 기법을 이용한 인증 서비스 응용)

  • Lee, Myung-jun;Lee, Tae-sik;Hong, Ho-jung;Hwang, Hyeon-seo;Oh, Young-jun;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.169-172
    • /
    • 2013
  • In this paper, we develop an application service of user authentication system using context awareness technology. The proposed security printer system service is applying 'NFC(Near Field Communication) technology', 'authentication system using communication with server, according to context awareness to application system. Our system extracts several context-awareness elements that happen through the user's printing with server communication. The proposed system property elements contain as print time, number of printing and name of document, etc. based on working memory operation as DB. This proposed system provide with context-awareness weight algorithm and analyzes the service which decides success or failure of user's printing. The develop app service is formed and applied when approved user who gets request. Approved user according to these context awareness tech will be provided with final service after authenticating again for the certain NFC card to reader. This results cab be contributed an authentication service based on context awareness weight algorithm and improved performance of management service in secure service applications.

  • PDF

Development of A Turn Label Based Optimal Path Search Algorithm (Turn Label 기반 최적경로탐색 알고리즘 개발)

  • Meeyoung Lee
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.23 no.2
    • /
    • pp.1-14
    • /
    • 2024
  • The most optimal route-search algorithm thus far has introduced a method of applying node labels and link labels. Node labels consider two nodes simultaneously in the optimal route-search process, while link labels consider two links simultaneously. This study proposes a turn-label-based optimal route-search technique that considers two turns simultaneously in the process. Turn-label-based optimal route search guarantees the optimal solution of dynamic programming based on Bellman's principle as it considers a two-turn search process. Turn-label-based optimal route search can accommodate the advantages of applying link labels because the concept of approaching the limit of link labels is applied equally. Therefore, it is possible to reflect rational cyclic traffic where nodes allow multiple visits without expanding the network, while links do not allow visits. In particular, it reflects the additional cost structure that appears in two consecutive turns, making it possible to express the structure of the travel-cost function more flexibly. A case study was conducted on the metropolitan urban railway network consisting of transportation card terminal readers, aiming to examine the scalability of the research by introducing parameters that reflect psychological resistance in travel with continuous pedestrian transfers into turn label optimal path search. Simulation results showed that it is possible to avoid conservative transfers even if the travel time and distance increase as the psychological resistance value for continuous turns increases, confirming the need to reflect the cost structure of turn labels. Nevertheless, further research is needed to secure diversity in the travel-cost functions of road and public-transportation networks.