Browse > Article
http://dx.doi.org/10.13089/JKIISC.2016.26.2.345

Digital Legal Seal for Message Authentication Code  

Jung, ChangHun (Inha University)
Shin, DongOh (Inha University)
Jang, RhongHo (Inha University)
Nyang, DaeHun (Inha University)
Lee, KyungHee (The University of Suwon)
Youm, Heung-Youl (Soonchunhyang University)
Abstract
In this paper, we present a security tool which called Digital Legal Seal. The Digital Legal Seal scans a barcode on a paper and print it with the tag generated by Hash-based Message Authentication Code(HMAC) in text format on a display device. The result of HMAC can be used for user authentication or secure message transmission on both online and offline. We examine not only how the Digital Legal Seal can make up the weak points of security card and OTP (One Time Password), but also the possibility of reducing the forgery of promissory note on offline.
Keywords
Authentication Protocol; Hash-based Message Authentication Code; Digital Legal Seal; Online Banking; Promissory Note;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Payment & Settlement Systems Departm ent, "Payment & Settlement Newsletter," http://www.bok.or.kr/contents/total/ko/boardView.action?menuNaviId=109&boardBean.brdid=119573&boardBean.menuid=109, The Bank of Korea, Vol. 2015, No. 8, Aug. 2015.
2 H. Seo and H. Kim, "Design and Implementation of Physical Secure Card for Financial Security," Journal of the Korea Institute of Information and Communication Engineering, Vol. 19, No. 4, pp. 855-863, Apr. 2015.   DOI
3 H. Lee, "Press Releases," http://www.ofthepeople.kr/bbs/board.php?bo_table=b_0203&wr_id=188, Republic of Korea Nat ional Assembly, Sep. 2015.
4 M. Wu, S. Garfinkel and R. Miller, "Secure Web Authentication with Mobile Phones," DIMACS Workshop on Usable Privacy and Security Software, 2014.
5 Y. Maeng, D. Shin, S. Kim, D. Nyang and M. Lee, "A Vulnerability Analysis of MITB in Online Banking Transactions in Korea," Internet and Information Security, Vol. 1, No. 2, pp. 101-118, Nov. 2010.
6 Electronic Finance Division, "Press Releases," http://www.fsc.go.kr/info/ntc_news_view.jsp?bbsid=BBS0030&page=1&sch1=&sword=&r_url=&menu=7210100&chk=29613&no=29612, Financial Services Commission, Jan. 2014.
7 M. Bellare, J. Kilian and P. Rogaway, "The Security of the Cipher Block Chaining Message Authentication Code," Journal of Computer and System Sciences, Vol. 61, Issue 3, pp. 362-399, Dec. 2000.   DOI
8 M. Bellare, R. Canetti and H. Krawczyk, "Keying Hash Functions for Message Authentication," Lecture Notes in Computer Science, Vol. 1109, pp. 1-15, July. 2001.
9 Arduino UNO, http://www.arduino.cc/en/Main/ArduinoBoardUno
10 TCRT5000, http://www.vishay.com/docs/83760/tcrt5000.pdf
11 T. Kim, J. Lee and D. Lee, "Study on Mobile OTP(One Time Password) Mechanism based PKI for Preventing Phishing Attacks and Improving Availability," Korea Institute of Information Security and Cryptology, Vol. 21, No. 1, pp. 15-26, Feb. 2011.
12 B. Kang and H. Kim, "A study on the vulnerability of OTP implementation by using MITM attack and reverse engineering," Korea Institute of Information Security and Cryptology, Vol. 21. No. 6, pp. 83-99, Dec. 2011.