• Title/Summary/Keyword: 융합인증

Search Result 602, Processing Time 0.025 seconds

Vulnerability Attack for Mutual Password Authentication Scheme with Session Key agreement (세션 키 동의를 제공하는 상호인증 패스워드 인증 스킴에 대한 취약점 공격)

  • Seo Han Na;Choi Youn Sung
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.179-188
    • /
    • 2022
  • Password authentication schemes (PAS) are the most common mechanisms used to ensure secure communication in open networks. Mathematical-based cryptographic authentication schemes such as factorization and discrete logarithms have been proposed and provided strong security features, but they have the disadvantage of high computational and message transmission costs required to construct passwords. Fairuz et al. therefore argued for an improved cryptographic authentication scheme based on two difficult fixed issues related to session key consent using the smart card scheme. However, in this paper, we have made clear through security analysis that Fairuz et al.'s protocol has security holes for Privileged Insider Attack, Lack of Perfect Forward Secrecy, Lack of User Anonymity, DoS Attack, Off-line Password Guessing Attack.

User Authentication System using OCR (광학문자인식을 이용한 사용자 인증 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.15-22
    • /
    • 2018
  • As smart devices become popular, users can use authentication services in various methods. Authentication services include authentication using an ID and a password, authentication using a sms, and authentication using an OTP(One Time Password). This paper proposed an authentication system that solves the security problem of knowledge-based authentication using optical character recognition and can easily and quickly authenticate users. The proposed authentication system extracts a character from an uploaded image by a user and authenticates the user using the extracted character information. The proposed authentication system has the advantage of not using a password or an OTP that are easily exposed or lost, and can not be authenticated without using accurate photographs. The proposed authentication system is platform independent and can be used for user authentication, file encryption and decryption.

An Empirical Study on the Relationship among the Objectives of the Certification System, the Preparation and Results of Certification, and the Performance of Perceived Certifications in the Institutional Accreditation System of College (전문대학의 기관평가인증제에 있어서 인증제의 목표, 인증의 준비와 결과, 지각된 인증의 성과 간의 관계에 관한 실증연구)

  • Yun, Mun-Do;Seo, Young Wook
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.6
    • /
    • pp.524-540
    • /
    • 2019
  • We researched about the relationship among the Purpose of Assessment Certificate System, the preparation result, certificate, and, the performance of the assessment certificate on the purpose of the empirical analysis. For the testing of a research model, we tested 170 samples that our colleges tested by The Assessment Certificate System. As a result of the analysis; there are positive and causal effect relationships among the three variables. This study result will expansion and help to maintain performance growth in the college. In the future, the research about the improvement of management performance are needed.

Roaming Service Support Technique using CHAP in Wireless Internet (무선 인터넷 환경에서 CHAP 인증 기법을 이용한 로밍 서비스 지원 방법)

  • 박정현;유승재;양정모
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.53-60
    • /
    • 2004
  • We describe CHAP authentication for roaming service method of visited ISP subscriber on GPRS network. We also illustrate how visited mobile ISP subscriber can access ISP server and authenticate RADIUS in home network via Gateway GPRS Support Node (GGSN) on GPRS/UMTS network for wireless internet service and roaming. For this we propose the modified CHAP message format, PCO Message format at MT, and interworking message and format between GGSN and RADIUS in home ISP network for wireless internet service of mobile ISP subscriber at GPRS network in this paper. We also show authentication results when visited mobile ISP subscriber via CHAP at GPRS network accesses the RADIUS server in home ISP network.

  • PDF

A Study on Secure Matrix-based RFID Authentication Protocol (행렬기반 RFID 인증 프로토콜에 대한 연구)

  • Lee, Su-Youn;Ahn, Hyo-Beom
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.83-90
    • /
    • 2006
  • Recently, the security for RFID/USN environment is divided into network security and RFID security. The authentication protocol design for RFID security is studied to protect user privacy in RFID system. However, the study of efficient authentication protocol for RFID system is not satisfy a security for low-cost RFID tag and user privacy. Therefore, this paper proposes a secure matrix-based RFID authentication protocol that decrease communication overhead and computation. In result, the Matrix-based RFID authentication protocol is an effective authentication protocol compare with HB and $HB^+$ in traffic analysis attack and trace location attack.

  • PDF

Algorithm of certificate security based-on using query language (사용자 질의어를 이용한 개인 인증 보안 알고리즘)

  • Lee, Chang-Jo
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.45-51
    • /
    • 2011
  • Certificate security oriented cyber certificate is important tool for the purpose of offering user-authentication service based on on-line system. In the paper, we analyzed management implement which could make the efficient use of certificate security oriented cyber terror response. This algorithm called SOL(Security Oriented Language) will make efficient use of the service about authentication consisting of the basis in the age of information through efficient management and partial use of each certificates. Especially, SOL could be used efficiently by grafting a small group of on-line system which is operated with particular purposes.

Study on RFID Mutual Authentication Protocol Using Finite Field (유한체를 사용한 RFID 상호인증 프로토콜 연구)

  • Ahn, Hyo-Beom;Lee, Su-Youn
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.31-37
    • /
    • 2007
  • There are many investigations about the security on RFID system to protect privacy. It is important to mutual authentication of the security on RFID system. The protocol for mutual authentication use light-weight operation such as XOR operation, hash function and re-encryption. However, the protocol for authentication and privacy is required more complicated cryptography system. In this paper, we propose a mutual authentication protocol using finite field GF($2^n$) for a authentication and are a safety analysis about various attacks.

  • PDF

2 Factor Authentication Using Face Recognition and One-Time Password for Spoofing Attack Prevention (안면 인식 스푸핑 방지를 위한 얼굴인식과 OTP를 이용한 2 Factor 인증)

  • Yun, Jung Bin;Jung, Ji Eun;Jo, Hyo Ju;Han, Seung Min;Kim, Sun Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.640-643
    • /
    • 2020
  • 사진, 동영상 또는 3D 프린터로 변조된 얼굴을 이용한 안면인식 보안 우회 사례가 증가하였다. 따라서 본 논문에서는 얼굴인증 단계인 본인 여부와 Liveness Detection 및 OTP를 통한 다중인증 프레임워크를 구현함으로써 기존 단일인증 대비 더욱 안전한 인증 환경을 기대한다.

A Survey on Hardware Characteristic-based Drone Identification and Authentication Technology (하드웨어적 고유 특성 기반 드론 식별 및 인증 기술 연구 동향 분석)

  • Sungbin Park;Hoon Ji;Yeonjoon Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.1181-1184
    • /
    • 2023
  • 최근 드론은 군사 작전, 물류 운송, 인명 구조 등 다양한 분야에서 활용되고 있으며 관련 산업의 규모는 증가하는 추세이다. 이에 따라, GPS 스푸핑, 조종사 비익명화 등의 드론을 향한 공격 기법들 또한 발달하고 있다. 이런 공격들은 드론에 대한 인증을 도입함으로써 대비할 수 있는 공격들이다. 이에, 학계에서는 강건한 인증을 위해 드론 하드웨어의 고유 특성을 활용할 수 있는 RF 신호, 소리 신호, 드론 내부 센서 신호 등에 기반한 인증 기술들이 연구되어온 바 있다. 본 논문에서는 지금까지의 드론 인증 기술 연구 동향을 분석하고, 이를 기반으로 향후 연구 방향을 제시한다.