• Title/Summary/Keyword: 상호인증

Search Result 904, Processing Time 0.029 seconds

A Suggest for Mobile Agent Security in Cross-Certification (상호인증이 가능한 Mobile Agent 보안기법에 관한 연구)

  • 서대희;박희운;이임영
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2001.06a
    • /
    • pp.477-480
    • /
    • 2001
  • 무선 정보 환경의 변화에 따라 다양한 정보에 대한 풍족함이 요구되면서 양질의 정보를 정확하고 빠르게 선별하여 획득하는 기술이 점점 중요하게 되었으며, 이러한 페러다임의 요구에 Mobile Agent는 중요한 연구가 된다. 본 논문에서는 Mobile Agent가 가져야 할 보안적 요구사항 중 신뢰할 수 있는 Proxy Server를 이용한 인증을 통해 Sever와 Mobile Agent간의 안전한 통신 방법을 제시하며, Server나 Mobile Agent의 부정이 발견되었을 경우 DSS(Digital Signature Standard) 방식의 서명값을 이용하여 이를 증명함으로써 보다 안전하고 효율적인 상호인증 방식을 제안하였다.

  • PDF

RFID Authentication Protocol using Polynomial Hash Function (다항식 해쉬함수를 이용한 RFID 인증 프로토콜)

  • Yon, Yong-Ho;Lee, Sun-Yong;Lee, Jong-Yun;Shin, Moon-Sun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.05a
    • /
    • pp.742-745
    • /
    • 2009
  • RFID 시스템은 RFID 태그, RFID 리더, Back-end 서버로 이루어져서 짧은 거리의 무선통신을 통해 정보를 인식하는 시스템이다. 최근 RFID기술은 다양한 응용 분야에서 활용되고 있으며 보안과 프라이버시 침해에 대한 우려와 문제점을 해결해야한다는 논의가 높아지고 있다. 본 논문에서는 중간자 공격 및 재생공격에 대응할 수 있는 다항식 해쉬함수를 이용한 강력한 상호인증 프로토콜을 제안한다. 본 논문에서는 대량의 RFID 태그와 리더간 상호인증을 위해 다항식을 이용한 해쉬함수를 적용한다. 제안된 다항식 해쉬함수를 적용한 RFID 인증 프로토콜은 전체 시스템에 부담을 주지 않으면서 보안강화를 할 수 있는 인증 프로토콜이며 특히 태그 쪽에 컴퓨팅 오버헤드가 추가되지 않는다. 또한 공격자에게 공격이 어렵거나 불가능한 복잡도를 가지는 프로토콜이다.

  • PDF

One-time Pattern Mutual Authentication Method by using Digital Holography (디지털 홀로그래피를 이용한 one-time pattern 상호 인증 방법)

  • Gil, Sang-Keun
    • Journal of IKEEE
    • /
    • v.20 no.3
    • /
    • pp.291-294
    • /
    • 2016
  • A new optical one-time pattern password(OTPT) mutual authentication method is proposed, which presents a two-factor authentication by 2-step phase-shifting digital holography and performs a two-way authentication by a challenge-response handshake of the optical OTPT in both directions. Because a client and a server use OTPT once as a random number and encrypt it for mutual authentication, it protects against a replay or a man-in-the middle attack and results in higher security level.

Robust Matrix-based RFID Mutual Authentication Protocol (견고한 행렬기반 RFID 상호인증 프로토콜)

  • Yoon, Eun-Jun;Ha, Kyeoung-Ju;Yoo, Kee-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.11C
    • /
    • pp.883-891
    • /
    • 2008
  • In 2006, Lee and Ahn proposed a matrix-based RFID authentication protocol which eliminates the security problems in HB and $HB^+$ RFID authentication protocols. Their proposed protocol provides the following three merits: (1) it reduces the computational costs of the RFID tag. (2) it reduces the communication overhead between the reader and the tag. (3) it protects the user privacy. However, this paper points out that Lee and Ahn's proposed protocol is insecure to various attacks because it does not provide mutual authentication which the RFID tag does not authenticate the legality of the RFID reader unlike their claims. In addition, this paper proposes an improved matrix-based RFID mutual authentication protocol that can provide the mutual authentication. As a result, the proposed protocol not only can provide strong security and but also guarantee high efficiency because it reduces the communication rounds compare with Lee-Ahn's protocol.

A Light-weight PKM Mutual Authentication Protocol for Improving Initial Authentication in WiMAX (WiMAX 초기 인증을 향상시킨 경량화된 PKM 상호 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.257-266
    • /
    • 2009
  • Now a days, as increased the use of mobile units like a laptop computer and PDA, the demand for high speed internet service is increasing. On the other hand, PKMv2 which is provided from IEEE 802.16e cannot support fully on the security of high speed internet service. This paper proposes light-weight mutual authentication protocol which solved security problem of PKMv2 related to integrity of mobile node for transmission of safe high speed data of mobile node operating in mobile WiMAX environment. Proposed mutual authentication protocol increases the efficiency as the user in network can move in network safely without additional procedure of authentication between subscriber and base station after user's initial authentication. Also, the proposed mutual authentication protocol is safe from the security attack (the man-in-the-middle attack and reply attack) between subscriber and base station by generating a key adopt to PRF() function using random number and secret value in order to secure certification.

Security Improvements on Smart-Card Based Mutual Authentication Scheme (스마트카드 기반 상호인증 스킴의 보안성 개선)

  • Joo, Young-Do
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.91-98
    • /
    • 2012
  • Password-based authentication schemes have been widely adopted in order to protect resources from unauthorized access. In 2008, Liu et al. proposed a new mutual authentication scheme using smart cards which can withstand the forged attack. In this paper, author has proven that Liu et al.'s scheme is still vulnerable to the various attacks by analyzing the security of their scheme. This paper introduces an enhanced scheme to overcome these security weakness and to provide mutual authentication between the user and the server, even if the secrete information stored in the smart card is revealed by an attacker. The comparative result from the security analysis demonstrates that the proposed scheme is more secure against the possible attacks than Liu et al.'s scheme.

Design of RFID Mutual Authentication Protocol using One Time Random Number (일회성 난수를 이용한 안전한 RFID 상호인증 프로토콜 설계)

  • Kim, Dae-Jung;Jun, Moon-Seog
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.3
    • /
    • pp.243-250
    • /
    • 2008
  • Recently, researched RFID authentication protocols still have vulnerability of attack, such as location tracking attack, replay attack. spoofing attack etc. This paper designed method of making one time random number in DB server side unlike previously researched protocols, and it protects RFID communication from location tracking, replay attack and spoofing attack.

Development of Inter-Service Mutual Authentication and Communication Encryption in Multi-Cluster Environments (다중 클러스터 환경에서의 서비스 간 상호인증 및 통신 암호화 체계 구축)

  • Kyungpyo Ryu;Jaehyun Nam
    • Annual Conference of KIPS
    • /
    • 2024.05a
    • /
    • pp.112-113
    • /
    • 2024
  • 컨테이너 기반 애플리케이션 개발의 증가와 마이크로서비스 아키텍처의 보급으로 컨테이너 클러스터 내 워크로드 간 안전한 통신이 중요해지고 있다. 또한, 최근에는 단일 클러스터 환경이 아닌 멀티 클라우드 등의 도입과 함께 다중 클러스터 환경이 점차 증가하면서 서로 다른 클러스터의 서비스 간 통신에 대한 보안 역시 강조되고 있다. 따라서, 본 논문에서는 이러한 요구사항을 충족시키기 위해 다중 클러스터 환경에서의 서비스 간 상호 인증 및 통신 암호화를 구현하고자 한다. 특히, 서비스 간 상호 인증이 가능한 mTLS (Mutual TLS)를 SPIFFE/ SPIRE 를 이용하여 구현하고, 이를 다시 확장하여 단일 클러스터 뿐만 아니라 다중 클러스터에서도 동일한 상호 인증 체계 및 통신 암호화를 사용할 수 있도록 하므로 컨테이너 환경 전반에 걸친 보안성과 신뢰성을 향상시키고자 한다.

RFID Mutual Authentication Protocol Providing Stronger Security (강력한 보안성을 제공하는 RFID 상호 인증 프로토콜)

  • Ahn, Hae-Soon;Bu, Ki-Dong;Yoon, Eun-Jun;Nam, In-Gil
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.325-334
    • /
    • 2009
  • This paper demonstrates that an attacker can impersonate a random RFID tag and then perform the spoofing attack in the previous RFID authentication protocol. To resolve such a security problem, we also propose a new secure and efficient RFID mutual authentication protocol. The proposed RFID mutual authentication protocol is not only to resolve many security problems with the existing RFID authentication mechanism and the vulnerability against spoofing attack, but also to guarantee reliable authentication time as reducing computational overhead performing by tag. As a result, the proposed RFID mutual authentication protocol provides stronger security including the forward secrecy and more efficiency.

Design of an Advanced Kerbros P2P Authentication System to Share Digital Content (디지털 콘텐츠 공유를 위한 개선된 Kerberos P2P 인증시스템 설계)

  • Kim Jong-Woo;Han Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.7
    • /
    • pp.1516-1523
    • /
    • 2004
  • In the paper, an algorithm fitted to P2P system was proposed by improving Kerberos which is an algorithm for mutual authentication. To keep the role of Kerberos and minimize load to server, the proposed algorithm imposed the server role of ticket recognition to the opposite peer. Using this method, the number of sewers as ticket recognition server was averted and function of server for authentication was minimized so that server load was mininized. The proposed algorithm enables the server to play the minimum of the role and to perform strong mutual authentication, while imposeing on the peers the role of authentication. To make suitable to P2P system, trial number oriented authentication limit was given, not time-oriented authentication expiration time. In the paper, a new P2P system was designed using this algorithm.