• Title/Summary/Keyword: 공인 인증

Search Result 958, Processing Time 0.031 seconds

국내 상용 제품의 인증 취약성 분석

  • Jeon, Woong-Ryul;Won, Dong-Ho;Kim, Seung-Joo
    • Review of KIISC
    • /
    • v.19 no.4
    • /
    • pp.53-58
    • /
    • 2009
  • 초고속 인터넷이 널리 보급되면서 오프라인에서만 가능했던 많은 서비스들을 이제 온라인에서도 사용할 수 있게 되었다. 온라인 서비스는 상대방을 대면하지 않기 때문에 적절한 사용자 인증과정이 반드시 필요하다. 현재 사용자 인증은 패스워드를 비롯하여 공인인증서, 보안토큰 등 다양한 방법을 사용하여 구현되고 있다. 그러나 공격방법이 다양화되고 지능화되면서 인증과정 역시 많은 취약점을 드러내고 있으며, 이를 극복하기 위한 개선방안에 대한 연구가 현재까지 활발하게 진행되고 있다. 따라서 본 고에서는 성균관대학교 정보보호 인증기술 연구센터가 지난 2008년 12월 종료된 ITRC 과제를 수행하면서 발표한 다양한 인증 프로토콜 취약점과, 취약점 발표 이후 대응 결과에 대해 서술한다. 본 고에서 다루어진 모든 취약점들은 발표 후 모두 패치되어 해결되었다.

Authentication Mechanism using Threshold Secret Sharing and CGA in MANET (MANET에서 Threshold Secret Sharing과 CGA를 이용한 인증 메커니즘)

  • Cho, Shin-Young;Lim, Hun-Jung;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1304-1307
    • /
    • 2010
  • 안전한 통신을 위해 단말기 간에 인증이 제공되어야 하는데 MANET 환경에서는 무선 환경이라는 특징으로 보안상 취약하고, 중앙단말기의 부재로 인해 인증을 제공하는 것에 어려움이 있다. 이러한 어려움을 해결하기 위한 많은 기법 중에 단말기 간의 구조를 Local로 나누어 인증 서비스를 제공하는 Localized Certification Service가 있다. 본 논문에서는 Localized Certification Service을 상에서 Threshold Secret Sharing을 이용한 인증 메커니즘을 제안한다. 또한 제안한 메커니즘은 CGA의 재생성 후 재발급 문제 역시 해결하게 된다. 본 논문에 결론에서는 제안한 방식을 다양한 위협 시나리오에 적용하여 위협에도 안전한 인증을 제공함을 보였다.

A Efficient and Secure RFID Mutual Authentication Protocol based on Hash Function (효율적이고 안전한 해쉬함수 기반의 RFID 상호 인증 프로토콜)

  • Hae-Soon Ahn;Eun-Jun Yoon;In-Gil Nam;Ki-Dong Bu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1508-1509
    • /
    • 2008
  • 본 논문에서는 기존에 제안된 RFID 인증 프로토콜이 임의의 RFID 태그로 위장한 공격자로부터 스푸핑 공격을 당할 수 있음을 증명하고, 이러한 보안 문제점을 해결한 안전하고 효율적인 RFID 상호 인증 프로토콜을 제안한다. 제안한 RFID 상호 인증 프로토콜은 기존의 RFID 인증 메커니즘들이 가지고 있는 보안 문제점들을 해결할 뿐만 아니라, 스푸핑 공격에 대한 취약점을 해결하고, 해쉬함수 연산 오버헤드를 줄여줌으로써 빠른 인증 시간을 보장하여 더욱 강력한 안전성과 효율성을 제공한다.

Type Test at KEMA for 400kV XLPE Cable and Accessories (400kV XLPE 케이블 시스템의 해외 인증시험)

  • Kim, J.H.;Kang, C.H.;Baik, S.Y.;Choi, S.G.;Huh, G.D.;Park, W.K.
    • Proceedings of the KIEE Conference
    • /
    • 1999.11d
    • /
    • pp.1028-1030
    • /
    • 1999
  • 전 세계적으로 송전 용량의 증대 요구에 따라 송전 시스템이 초고압화 되어 가고 있으며 환경친화성 및 여러 특성에 있어 OF(Oii filled) 케이블에 비하여 우수한 성능을 지닌 XLPE(Crosslinked Polyethylene) 케이블의 사용이 급속하게 증가하고 있는 추세이다. 최근 345kV급 이상의 XLPE 케이블 시스템 개발이 해외 선진업체들에 의해 활발히 진행되고 있으며 이의 평가를 해외공인 인증기관에서 수행하여 개발된 제품의 디자인 검증 및 장기간 신뢰성을 입증하고 있다. 이러한 추세에 맞추어 LG 전선은 400kV 케이블 및 접속함의 사내 개발시험후 해외공인 인증기관인 네덜란드의 KEMA에서 IEC 62067에 따른 인증시험을 완료하여 개발된 제품의 높은 신뢰성을 인증 받았으며, 자사의 초고압 기술을 한 단계 상승시켜 세계 선진업체들과 경쟁할 수 있는 발판을 마련하였다.

  • PDF

Development and Qualification of an Auxiliary Power Unit for Helicopter (헬리콥터용 보조동력장치 개발 및 인증)

  • Lim, ByeungJun
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2017.05a
    • /
    • pp.198-200
    • /
    • 2017
  • An Auxiliary Power Unit (APU) is a small gas turbine engine that is mounted on an aircraft and serves to supply energy for ground and air starting of the main engine. APU also supplies emergency and auxiliary power for the aircraft. APU for aircraft is simple and compact in structure, but because it is mounted on manned aircraft, high reliability is required, so it must be proved its reliability through qualification procedure. The Korea Aerospace Research Institute and Hanwha Techwin successfully completed the design / analysis, fabrication, assembly, development test and certification test of APU for helicopter based on accumulated domestic R & D capability and experience from 2007 to 2012. In this paper, the development and certification process of auxiliary power unit for helicopter is summarized.

  • PDF

Secure Management Method for Private Key using Smartphon's Information (스마트폰 고유정보를 이용한 안전한 개인키 관리 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.90-96
    • /
    • 2016
  • The 3390 million people, around 83% of the adult population in Korea use smartphone. Although the safety problem of the certificate has been occurred continuously, most of these users use the certificate. These safety issues as a solution to 'The owner of a mobile phone using SMS authentication technology', 'Biometric authentication', etc are being proposed. but, a secure and reliable authentication scheme has not been proposed for replace the certificate yet. and there are many attacks to steal the certificate and private key. For these reasons, security experts recommend to store the certificate and private key on usb flash drive, security tokens, smartphone. but smartphones are easily infected malware, an attacker can steal certificate and private key by malicious code. If an attacker snatchs the certificate, the private key file, and the password for the private key password, he can always act as valid user. In this paper, we proposed a safe way to keep the private key on smartphone using smartphone's unique information and user password. If an attacker knows the user password, the certificate and the private key, he can not know the smart phone's unique information, so it is impossible to use the encrypted private key. Therefore smartphone user use IT service safely.

A Study on the Implication from Reform of HLC Institutional Accreditation Model (미국 고등학습위원회 기관평가인증제 평가모형 개혁의 시사점에 관한 연구)

  • Lee, Young-Hak
    • Korean Journal of Comparative Education
    • /
    • v.24 no.3
    • /
    • pp.245-265
    • /
    • 2014
  • The purpose of this research is to find the features of HLC institutional accreditation model and the implication on the second period institutional accreditation of Korea. This research focus on accreditation model, accreditation period, comprehensive evaluation, criteria, decision making for accreditation status and accreditation supporting system. This research draws following suggestions to the second period institutional accreditation of Korea. 1. The institutional accreditation should apply various accreditation models according to the features of institute. 2. The institutional accreditation should focus on the autonomous quality improvement of institute with the quality assurance. 3. The quantitative evaluation should be reduced and qualitative evaluation based on mission and objects should be reinforced. 4. The interim evaluation should be strictly enforced for quality improvement. 5. The government should enlarge reflection the results of accreditation on financial aid to universities. 6. The web-based accreditation supporting system interworking with "Higher Education in Korea" service is needed.

Improved RFID Authentication Protocol Providing Mutual Authentication (상호인증을 제공하는 개선된 RFID 인증 프로토콜)

  • Jeon, Seo-Kwan;Eun, Sun-Ki;Oh, Soo-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.113-120
    • /
    • 2010
  • RFID system is the contact-less recognition technology and use for distribution system, environment, transport, security and so on. However, it may create many security relevant problems such as privacy because constraints of RFID communication environment. So several methods of resolving these problems have been proposed. Recently, Shin and Park proposed an efficient RFID authentication protocol with protecting user's privacy using hash function and exclusive-OR.. But Ahn and Bu et al. poia problem that a attacker can to masquerade as malicious reader because their protocol can't providing mutual authentication.nted out weakness of Shin and Park's protocol and proposed more secure and efficient protocol. Unfortunately, Ahn and But's protocol has In this paper, We propose an improved RFID authentication protocol providing mutual authentication. The proposed protocol has advantages that providing mutual authentication between a tag and a reader, secure against replay attack and spoofing attack. Also, it guarantees anonymity of RFID tag and secure against location tracking attack by collusion of malicious readers.

Strong Password Mutual Authentication Protocol (강력한 패스워드 상호인증 프로토콜)

  • Yoon, Eun-Jun;Hong, You-Sik;Kim, Cheon-Shik;Yoo, Kee-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.11-19
    • /
    • 2009
  • Recently, user authentication is the most important part as far as security to provide confidentiality and integrity over untrusted networks like the Internet. Especially, password-based user authentication method is the most widely-used user authentication method due to various advantages, such as human-memorable simplicity, convenience, mobility, low-cost operations and efficiency. In this paper, we propose a new strong password mutual authentication protocol. As a result, the proposed authentication protocol provides more security and efficiency compare with the previously related protocols. So that, it can be used practically as the Internet authentication protocol.

A Study on Online Authenticate Themselves Techniques according to Resident Registration Number collect Prohibited (주민등록번호 수집금지에 따른 온라인 본인인증 기법 연구)

  • Son, Seung-wan;Kim, Kwang-seok;Lee, Gang-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.271-274
    • /
    • 2013
  • From February 18, 2013, an information and communications service provider, we will not be able to collect the resident registration number by paragraph 2 of Article 23 of the Act on the Promotion of the use and protection of information and information network. Rather than a revision in accordance with resident registration number, than these laws, it had been used in the alternative, such as OTP authentication phone authentication I-PIN authentication of certificates that are recognized as such authentication. In this paper, we propose a new online identity authentication technology was and Utilization of IMEI, the OTP to introduce online identity authentication technology replacing the resident registration number.

  • PDF