• Title/Summary/Keyword: 로컬패스

Search Result 6, Processing Time 0.023 seconds

패스워드 매니저의 보안성 분석

  • Kim, Soolin;Kim, Hyoungshick
    • Review of KIISC
    • /
    • v.28 no.1
    • /
    • pp.36-42
    • /
    • 2018
  • 사용자는 비밀번호를 외워야하는 불편함을 줄이고 로그인 과정을 편리하게 이용하기 위해 패스워드 매니저를 사용한다. 패스워드 매니저는 크게 브라우저 기반의 패스워드 매니저와 웹 기반의 패스워드 매니저로 나눌 수 있다. 브라우저 기반의 패스워드 매니저의 경우 로컬에 사용자의 계정 정보와 암호화 키를 저장하기 때문에, 비밀번호 복구 프로그램을 사용하거나 간단한 코드를 이용하여 사용자의 계정 정보를 평문 형태로 추출할 수 있다. 로컬에 저장하는 브라우저 기반의 패스워드 매니저와 달리 웹 기반 패스워드 매니저는 웹을 기반으로 실행된다. 웹 기반 패스워드 매니저는 암호화 키를 웹 서버에 저장하기 때문에, 로컬 기반의 패스워드 매니저에 비해 키 노출 우려가 적다. 하지만 웹 기반이기 때문에 공격자가 웹 취약점을 이용하면 사용자의 정보가 누출될 위험성이 있다. 본 논문에서는 사용자의 편의성을 개선하고자 사용되는 패스워드 매니저를 브라우저에서 사용되는 브라우저 기반 패스워드 매니저와 웹에서 사용되는 웹 기반 패스워드 매니저로 분류하고 각 패스워드 매니저가 사용자의 계정 정보를 저장 및 관리하는 방법을 분석하고, 해당 패스워드 매니저들에서 발생 가능한 취약점에 대해 조사하였다.

Security of Password Vaults of Password Managers (패스워드 매니저의 패스워드 저장소 보안 취약점 분석)

  • Jeong, Hyera;So, Jaewoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1047-1057
    • /
    • 2018
  • As the number of services offered on the Internet exponentially increases, password managers are increasing popular applications that store several passwords in an encrypted database (or password vault). Browser-integrated password managers or locally-installed password managers store the password vault on the user's device. Although a web-based password manager stores the password vault on the cloud server, a user can store the master password used to sign in the cloud server on her device. An attacker that steals a user's encrypted vault stored in the victim's device can make an offline attack and, if successful, all the passwords in the vault will be exposed to the attacker. This paper investigates the vulnerability of the password vault stored in the device and develops attack programs to verify the vulnerability of the password vault.

An Architecture of One-Dimensional Systolic Array for Full-Search Block Matching Algorithm (완전탐색 블럭정합 알고리즘을 위한 일차원 시스톨릭 어레이의 구조)

  • Lee, Su-Jin;Woo, Chong-Ho
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.39 no.5
    • /
    • pp.34-42
    • /
    • 2002
  • In this paper, we designed the VLSI array architecture for the high speed processing of the motion estimation used by block matching algorithm. We derived the one dimensional systolic array from the full search block matching algorithm. The data and control signals of the proposed systolic array are passed through adjacent processing element. So proposed architecture has temporal and spatial locality. The I/O ports exists only in the first and last processing elements of the array. This architecture has low pin counts and modular expandability. So the proposed array architecture can be cascaded for different block size and search range.

On Research of Certificates Management on Mobile Device (모바일 기기를 이용한 인증서 관리 연구)

  • Nam, Yong-su;Kim, Tae Yong;Jang, Won Tae;Lee, Hun Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.359-362
    • /
    • 2009
  • Qualified certificates in online financial and security transaction area are currently used for authentication of the user. The authorized user's public key certificates are stored in binary; the private key corresponding to the user's public key certificates is encrypted by the user password, and then is stored in a file. But the present management system to access the public certificates in local has some problems. In this study, we propose that the mobile public certificate management application to avoid the exist problems.

  • PDF

Slective Buffering Macro Handover Which Applies The F-SNOOP in Hierarchical structure (계층 구조에서 F-SNOOP을 적용한 선택적 버퍼링 매크로 핸드오버)

  • Ahn Chi-Hyun;Kim Dong-Hyun;Kim Hyoung-Chul;Ryou Hwang-Bin;Lee Dae-Young;Jun Kye-Suk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.5B
    • /
    • pp.413-420
    • /
    • 2006
  • HMIPv6 is designed to reduce the signaling load to external network and improve handover speed of MN by including Mobility Anchor Point(MAP) in local handover. However in this case of macro handover, it's just used pervious MIPv6 handover algorithm. So, it occurs packet loss and transmission delay problem. In this paper, we propose the mechanism applying the HMIPv6 for Fast Handover to choose suitable to the condition buffering handover. The condition for the selection is result distance measurement between MN and CN, between MN and NAR. Furthermore, using F-SNOOP protocol, it is possible to improve wireless network performance. Wireless network has high Bit Error Rate(BER) characteristic because of path loss, fading, noise and interference. TCP regards such errors as congestion and starts congestion control. This congestion control makes packet transmission rate low. However, F-SNOOP improves TCP performance based on SNOOP and Freeze TCP that use Zero Window Advertisement(ZWA) message when handoff occurs in wireless network.

Study on the mechanism for the dynamic traversing of multiple firewalls using the concept of one-time master key (일회용 마스터 키 개념을 이용한 다중 방화벽 동적 통과 메커니즘 연구)

  • Park, Hyoung-Woo;Kim, Sang-Wan;Kim, Jong-Suk Ruth.;Jang, Haeng-Jin
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.5
    • /
    • pp.103-110
    • /
    • 2010
  • If an exterior computer wants to join the Grid/cloud computing platform for a while, all of the related firewalls' filtering rule should be immediately updated. As the platform of Internet application is gradually evolving into the Grid/Cloud environment, the R&D requirement for the dynamic traversing of the multiple firewalls by a single try is also increasing. In this paper, we introduce the new mechanism for the dynamic traversing of the multiple firewalls using the concept of the one-time master key that can dynamically unlock the tiers of firewalls simultaneously instead of the existed filtering rule based method like a lock management at each firewall. The proposed master keys are like one-time password, consisted of IP addresses, port numbers, and TCP's initial sequence numbers, and generated by end users not administrators. They're exchanged mutually in advance and used to make a hole at local-side firewalls for the other's packet incoming. Therefore, the proposed mechanism can function regardless of the number or type of firewalls.

  • PDF