• Title/Summary/Keyword: 설계인증

Search Result 1,668, Processing Time 0.031 seconds

Implementation of 3GPP AKA protocol in USIM (USIM 에서의 3GPP 상호인증 프로토콜 구현)

  • Kim, Keon-Woo;Lee, Hang-Rok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1933-1936
    • /
    • 2003
  • 2 세대 GSM 통신에서는 SIM 을 이용하여 망이 사용자를 인식하는 단방향 인증 서비스만 제공한다. 하지만, 3 세대 비동기 방식의 IMT-2000 에서는 2 세대 인증 메커니즘의 취약성 보완 및 양방향 인증을 위해서 새로운 인증 프로토콜을 설계하였다. 이에 3GPP 는 인증 메커니즘의 핵심 알고리즘으로 Milenage를 사용할 것을 권고하고 사업자는 이를 사용하여 인증 서비스를 제공할 것으로 예상된다. 본 논문은 JCOS 기반의 USIM 플랫폼에서 상호인증 기능을 수행하는 자바 애플릿 구현에 관한 것이다. 결과에 관해 에뮬레이터 환경에서 테스트하여 표준문서에서 제시하는 값과 동일함을 확인하였다.

  • PDF

Design of an Advanced Kerbros P2P Authentication System to Share Digital Content (디지털 콘텐츠 공유를 위한 개선된 Kerberos P2P 인증시스템 설계)

  • Kim Jong-Woo;Han Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.7
    • /
    • pp.1516-1523
    • /
    • 2004
  • In the paper, an algorithm fitted to P2P system was proposed by improving Kerberos which is an algorithm for mutual authentication. To keep the role of Kerberos and minimize load to server, the proposed algorithm imposed the server role of ticket recognition to the opposite peer. Using this method, the number of sewers as ticket recognition server was averted and function of server for authentication was minimized so that server load was mininized. The proposed algorithm enables the server to play the minimum of the role and to perform strong mutual authentication, while imposeing on the peers the role of authentication. To make suitable to P2P system, trial number oriented authentication limit was given, not time-oriented authentication expiration time. In the paper, a new P2P system was designed using this algorithm.

Design of E-Mail Group Authentication API using Blockchain and Rotten Tomato Method (블록체인과 Rotten Tomato 방식을 활용한 이메일 집단 인증 API 설계)

  • Kim, Semin;Hong, Sunghyuk
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.227-232
    • /
    • 2020
  • The one of the biggest challenges in using e-mail is that it is difficult to filter out unconfirmed senders. Therefore, in this study, an email group authentication API was designed using blockchain technology, which has been widely used as an authentication method. As the proposed model, the node-node weighting index was obtained through the relationship association network, and after designing the email reliability model, the reliability calculation model of the Rotten Tomato method was obtained. Based on this, the system structure was designed, chain code methods were defined, and API was developed. Through this study, it is expected that it will be used in various fields requiring authentication as well as email user authentication, and it is expected that the relationship of group authentication can be proved by allowing a large number of users to use the API in the future.

Authentication and Key Exchange Protocol for Wireless Internet using Passwords (무선 인터넷을 위한 패스워드 기반의 인증 및 키 교환 프로토골)

  • Nyang, Dae-Hun;Lee, Sok-Joon
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.324-332
    • /
    • 2002
  • We design authentication protocols for wireless internet not using certificates but using passwords. The target protocols include WTLS and the certificate request protocol in the wireless PKI(Public Key Infrastructure). When a password based protocol is designed and implemented for authentication and key exchange, care mutt be taken of the short length and of the not-so-randomness of passwords. To frustrate the offline guessing attack that makes use of those weaknesses, our two protocols are dependent on the password based authentication protocol that has security proof. In this paper, how to design systematically the security protocols for authentication and key exchange using passwords is presented, and the methodology hopes to be useful in some other area that needs authentication using passwords.

Single Sign-On for Distributed Computing Environment (분산 컴퓨팅 환경을 위한 통합 인증 시스템)

  • 정연식;김인겸
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.4
    • /
    • pp.439-446
    • /
    • 2003
  • In this paper, a single sign-on system has been designed and implemented. The purpose of the proposed system is that a user logs in once using a single password and gets authenticated access to all the servers that he is authorized to use without sending any passwords over the network. The proposed system involves the use of digital signature and cryptographic authentication protocols. For its implementation, a public-key infrastructure is also designed and implemented. To view the behavior of the proposed system, message sequence charts and state transition diagrams have been

Design of User Authentication System for Secure Support in VoIP Service Environment Based on SIP (SIP 기반 VoIP 서비스 환경에서의 보안성 확보를 위한 사용자 인증 시스템 설계)

  • Kim, Cheol-Joong;Yun, Sung-Yeol;Park, Seok-Cheon
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2008.11a
    • /
    • pp.461-464
    • /
    • 2008
  • 본 논문에서는 SIP 기반의 VoIP 서비스 환경에서 보안성 확보를 위해 속성인증서를 사용한 사용자 인증 시스템을 설계하였다. Redirect Server와 인증 서버를 각 Proxy Server 사이에 두어 인증서의 발급 및 검증, 사용자의 등록 및 관리 기능을 수행한다. 기존에 인증 시스템은 사용자 인증서가 외부에 노출이 되면 심각한 보안상의 문제가 발생할 수 있지만 속성인증서를 사용하면 외부에 노출에도 강력한 보안을 적용할 수 있다. 이에 본 논문에서는 속성인증서를 인증 서버가 발급과 검증을 하므로 안전한 통신 시스템을 구현할 수 있으며, 서비스 사용자를 Redirect Server에 등록 하게 함으로써 불법사용자의 접근을 제한하고, 정상적인 사용자를 인증하여 사용자의 정보보안 및 올바른 서비스의 제공이나 서비스 이용 요금의 과금시 유용하게 사용될 수 있다.

  • PDF

CORBA Based Mutual Authentication Mechanism using CCCA (CCCA를 이용한 CORBA기반의 상호 인증 메커니즘)

  • Yi, Yong-Ju;Jang, Jong-Hyeun;Lee, Dong-Gil
    • The KIPS Transactions:PartC
    • /
    • v.8C no.3
    • /
    • pp.245-252
    • /
    • 2001
  • 인터넷의 이용증가와 전자상거래의 활성화 등으로 인해 급속도로 발전하는 공개키 기반구조에 능동적으로 대처하기 위해서는 확정성과 상호 운용성, 관리용이성, 나 공개키 기반구조 기관의 수용 등 여러 가지 문제를 고려한 인증 모델이 제시되어야 한다. 이 논문에서는 인터넷에서 이기종의 컴퓨터들이 서로 연결되어 자료를 공유하고 분산되어 실행할 수 있는 개방 분산 시스템인 CORBA 기반의 상호인증 모델을 설계한다. 공개케 기반 시스템(PKI)을 도입하되 CCCA(Cross Certification CA)를 이용하여 효율적으로 상호인증 할 수 있는 모듈과 인터페이스를 설계하고 기존 모델과 비교 분석하여 우수성을 증명한다.

  • PDF

Design and Implementation of User Authentication System Using USIM Information (USIM 정보를 이용한 사용자 인증 방안 설계 및 구현)

  • Lee, Jin-Woo;Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.571-578
    • /
    • 2017
  • In order to approach information system through smart device and pc, user has to authenticate him or herself via user authentication. At that time when user tries reaching the system, well-used user authentication technologies are ID/PW base, OTP, certificate, security card, fingerprint, etc. The ID/PWbased method is familiar to users, however, it is vulnerable to brute force cracking, keylogging, dictionary attack. so as to protect these attacks, user has to change the passwords periodically as per password combination instructions. In this paper, we designed and implemented a user authentication system using smartphone's USIM without using password while enhancing security than existing ID / PW based authentication technology.

Design of International Cross Certification Model using Cross Certificate (상호인증서를 이용한 국제상호인증 모델 설계)

  • 김재중;이동훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.99-107
    • /
    • 2003
  • In this paper we propose an international cross certification model using cross certificate. We propose a new model by analyzing and solving current problems of the National PKI. We recommend a certificate profile, design a directory schema, and propose a method to access PSE(personal security environment) using PKCS#11, which gives the expansibility and convenience. Finally, we propose a certificate path verification method using RFC 3280 and show how to get the certificate chain by using the trust anchor. This model is recommended to the detailed level of specification for the interoperability of each country's PKI.

Design of an RFID Authentication Protocol Using Token Key and Hash Function (토큰키와 해쉬함수를 이용한 RFID 인증 프로토콜 설계)

  • Na, Young-Nam;Han, Jae-Kyun
    • 전자공학회논문지 IE
    • /
    • v.48 no.2
    • /
    • pp.52-60
    • /
    • 2011
  • RFID is method used on wireless system. However, this mechanism is not used for authentication and security. Therefore, it is very vulnerable to attacks such as dropping attacks and traffic attacks. the RFID Tags are of the limited nature due to environment factors and there is greater constraints in designing authentication protocol. If we do not RFID to secure corporate information and product all the information will be exposed. The attacker will break into the RFID system and stop the distribution system. So, this paper proposes a new authentication protocol which provides not only unlimited access to Tag&Reader and connection between Tag and Reader bet also provides authentication mechanism by defining the key distribution.