• Title/Summary/Keyword: smartcard

Search Result 59, Processing Time 0.026 seconds

A GF($2^{163}$) Scalar Multiplier for Elliptic Curve Cryptography for Smartcard Security (스마트카드 보안용 타원곡선 암호를 위한 GF($2^{163}$) 스칼라 곱셈기)

  • Jeong, Sang-Hyeok;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2154-2162
    • /
    • 2009
  • This paper describes a scalar multiplier for Elliptic curve cryptography for smart card security. The scaler multiplier has 163-bits key size which supports the specifications of smart card standard. To reduce the computational complexity of scala multiplication on finite field, the non-adjacent format (NAF) conversion algorithm which is based on complementary recoding is adopted. The scalar multiplier core synthesized with a 0.35-${\mu}m$ CMOS cell library has 32,768 gates and can operate up to 150-MHz@3.3-V. It can be used in hardware design of Elliptic curve cryptography processor for smartcard security.

A Design of HAS-160 Processor for Smartcard Application (스마트카드용 HAS-160 프로세서 설계)

  • Kim, Hae-ju;Shin, Kyung-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.913-916
    • /
    • 2009
  • This paper describes a hardware design of hash processor which implements HAS-160 algorithm adopted as a Korean standard. To achieve a high-speed operation with small-area, the arithmetic operation is implemented using a hybrid structure of 5:3 and 3:2 carry-save adders and a carry-select adder. The HAS-160 processor synthesized with $0.35-{\mu}m$ CMOS cell library has 17,600 gates. It computes a 160-bit hash code from a message block of 512 bits in 82 clock cycles, and has 312 Mbps throughput at 50 MHz@3.3-V clock frequency.

  • PDF

The Distributed Authentication and Key Exchange Protocols for Smartcard (스마트카드에 적용가능한 분산형 인증 및 키 교환 프로토콜)

  • Oh Heung-Ryongl;Yoon Ho-Sun;Youm Heung-Youl
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.17-30
    • /
    • 2005
  • A PAK(Password-Authenticated Key Exchange) protocol is used as a protocol to provide both the mutual authentication and allow the communication entities to share the session key for the subsequent secure communication, using the human-memorable portable short-length password, In this paper, we propose distributed key exchange protocols applicable to a smartcard using the MTI(Matsumoto, Takashima, Imai) key distribution protocol and PAK protocol. If only one server keeps the password verification data which is used for password authentication protocol. then It could easily be compromised by an attacker, called the server-compromised attack, which results in impersonating either a user or a server, Therefore, these password verification data should be distributed among the many server using the secret sharing scheme, The Object of this paper Is to present a password-based key exchange protocol which is to allow user authentication and session key distribution, using the private key in a smartcard and a password typed by a user. Moreover, to avoid the server-compromised attack, we propose the distributee key exchange protocols using the MTI key distribution protocol, And we present the security analysis of the proposed key exchange protocol and compare the proposed protocols with the existing protocols.

  • PDF

Multi User-Authentication System using One Time-Pseudo Random Number and Personal DNA STR Information in RFID Smart Card (RFID 스마트카드내 DNA STR Information과 일회용 의사난수를 사용한 다중 사용자 인증시스템)

  • Sung, Soon-Hwa;Kong, Eun-Bae
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.747-754
    • /
    • 2003
  • Thia paper suggests a milti user-authentication system comprises that DNA biometric informatiom, owner's RFID(Radio Frequency Identification) smartcard of hardware token, and PKI digital signqture of software. This system improved items proposed in [1] as follows : this mechanism provides one RFID smartcard instead of two user-authentication smartcard(the biometric registered seal card and the DNA personal ID card), and solbers user information exposure as RFID of low proce when the card is lost. In addition, this can be perfect multi user-autentication system to enable identification even in cases such as identical twins, the DNA collected from the blood of patient who has undergone a medical procedure involving blood replacement and the DNA of the blood donor, mutation in the DNA base of cancer cells and other cells. Therefore, the proposed system is applied to terminal log-on with RFID smart card that stores accurate digital DNA biometric information instead of present biometric user-authentication system with the card is lost, which doesn't expose any personal DNA information. The security of PKI digital signature private key can be improved because secure pseudo random number generator can generate infinite one-time pseudo randon number corresponding to a user ID to keep private key of PKI digital signature securely whenever authenticated users access a system. Un addition, this user-authentication system can be used in credit card, resident card, passport, etc. acceletating the use of biometric RFID smart' card. The security of proposed system is shown by statistical anaysis.

Experimental Analysis of MESD Attack on Smartcard. (스마트카드의 MESD 공격에 대한 실험적 분석)

  • 안만기;이훈재;하재철;김동렬;문상재
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.575-579
    • /
    • 2002
  • 스마트카드는 내부의 암호 알고리듬이 수행될 때, 비밀키와 관련된 여러 가지 물리적인 정보가 누출될 가능성이 있다. 이러한 물리적 정보 중에서 소비되는 전력을 측정하고 분석하는 차분 전력분석 공격은 매우 강력한 방법이다. 본 논문에서는 시차공격과 단순전력분석 공격에 대응하는 몽고메리 멱승 알고리듬과 스칼라 상수배 알고리듬이 구현된 스마트카드에서 차분 전력 분석 공격의 방법 중에서 동일한 메시지를 이용하는 MESD 공격을 실험하고 실험과정에서 소모전력의 측정 개수와 표본화율 그리고 잡음의 관계를 분석한다.

  • PDF

Mondex Electronic Cash

  • Kim, Do-Hyung
    • Proceedings of the CALSEC Conference
    • /
    • 2002.01a
    • /
    • pp.233-237
    • /
    • 2002
  • The smartcard is a processing platform & a store or data it can perform calculations and run programs It contains its own memory (RAM), storage (ROM and EEPROM). and (Central Processing Unit) CPU like a PC If it had its own power supply. keyboard and screen. it would be a fully independent computer Requires an Interface Device (IFD) to supply the power and provide suitable input and display mechanisms. Some examples of IFDs are: point of sale terminal(POS) telephone ATM etc.(omitted)

  • PDF

On the Design of Smartcard-based Cyber Education systems (스마트 카드 기반 사이버 교육시스템)

  • Lee, Jeong-Woo;Jun, Sung-Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10a
    • /
    • pp.681-684
    • /
    • 2001
  • 뛰어난 보안성과 다기능성으로 금융, 교통 등 각종 분야에서 스마트카드의 활용이 점차 늘어나고 있다. 이런 스마트 카드의 장점을 사이버 상에서 이루어지는 교육시스템에 적응시켜 보고자 한다. 기존의 사이버 교육시스템을 중심으로 보안성이 중요시되는 지불 및 교육컨텐츠 보호관련 부분들과 기타 시스템 이용에 관련된 부분들에 스마트 카드를 도입하여 보다 편리하고 안전한 시스템을 구성해 보았다.

  • PDF

The Design of Smartcard Authentication System Using Fingerprint Orientation (지문의 방향성정보를 이용한 스마트카드 인증시스템 설계)

  • 민경진;손인구;이원호;유기영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.524-526
    • /
    • 2003
  • 지문은 사람에 있어서 유일한 특징과 변하지 않는 특성으로 인하여 개인의 인증이나 식별에 많이 사용되고 있다. 이러한 특성을 가진 지문을 스마트카드의 인증과정에 이용함으로써 보안성을 높이고 사용에 편리함을 추가할 수 있다. 본 논문에서는 스마트카드와 서비스시스템 간에 지문을 이용한 인증시스템을 제안하였다. 제안된 시스템은 카드와 서비스시스템이 각각 특징점 정보와 방향성정보를 매칭 함으로서 스마트카드의 계산부하를 줄일 수 있고, 본인 거부율과 타인 수락율의 오류를 줄일 수 있다.

  • PDF

ID-based User Authentication Protocol using Smartcard (스마트카드를 이용한 ID기반의 사용자 인증 프로토콜)

  • Lee, Won-Jin;Kim, Eun-Ju;Jeon, Il-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.166-168
    • /
    • 2005
  • 최근 김등[1]은 스마트카드와 패스워드 그리고 지문 정보를 이용한 ID 기반의 사용자 인증 프로토콜을 제시하였다. 그러나 Scott[2]은 그 프로토콜이 보안에 취약함을 보였다. 본 논문에서는 Scott이 제안한 공격에 안전할 뿐만 아니라 다양한 공격에 안전한 패스워드와 스마트카드를 이용한 ID기반의 사용자 인증 프로토콜을 제안한다.

  • PDF

Estimating the Trip Purposes of Public Transport Passengers Using Smartcard Data (스마트카드 자료를 활용한 대중교통 승객의 통행목적 추정)

  • JEON, In-Woo;LEE, Min-Hyuck;JUN, Chul-Min
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.1
    • /
    • pp.28-38
    • /
    • 2019
  • The smart card data stores the transit usage records of individual passengers. By using this, it is possible to analyze the traffic demand by station and time. However, since the purpose of the trip is not recorded in the smart card data, the demand for each purpose such as commuting, school, and leisure is estimated based on the survey data. Since survey data includes only some samples, it is difficult to predict public transport demand for each purpose close to the complete enumeration survey. In this study, we estimates the purposes of trip for individual passengers using the smart card data corresponding to the complete enumeration survey of public transportation. We estimated trip purposes such as commute, school(university) considering frequency of O-D, duration, and departure time of a passenger. Based on this, the passengers are classified as workers and university students. In order to verify our methodology, we compared the estimation results of our study with the patterns of the survey data.