• Title/Summary/Keyword: 인증된 키 동의

Search Result 67, Processing Time 0.02 seconds

An Analysis of Authentication and Key Agreement Protocols in UMTS (UMTS에서 인증 및 키 동의 프로토콜에 대한 분석)

  • Cui Yong-Gang;Kim Dae-Young;Kim Sang-Jin;Oh Hee-Kuck
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.457-462
    • /
    • 2006
  • In UMTS (Universal Mobile Telecommunication System), a protocol called UMTS AKA is used to authenticate MSs (Mobile Stations). When an MS is in a foreign network, the serving network contacts the AuC (Authentication Center) located at the home network of the MS to authenticate it. To reduce this cost, AuC sends n AVs(Authentication Vectors) to the serving network. Although the use of AVs allows the serving network to authenticate an MS without contacting the AuC each time, there are also shortcomings such as synchronization problem. Subsequently, a set of protocols adopting the same or similar method have been proposed. In this paper, we analyze and compare authentication protocols for UMTS with respect to the use of AVs and its alternatives. We conclude that using Kerberos-like ticket key overcomes some of the drawbacks of using AVs, whereas AVs provide much better security.

  • PDF

Authentication and Group Key Management Techniques for Secure Communication in IoT (IoT 환경에서 안전한 통신을 위한 인증 및 그룹 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.76-82
    • /
    • 2019
  • The development of Internet technology and the deployment of smart devices provide a convenient environment for people, and this is becoming common with the technology called the Internet of Things (IoT). But the development of, and demand for, IoT technology is causing various problems, such as personal information leaks due to the attacks of hackers who exploit it. A number of devices are connected to a network, and network attacks that have been exploited in the existing PC environment are occurring in the IoT environment. When it comes to IP cameras, security incidents (such as distributed denial of service [DDoS] attacks, hacking someone's personal information, and monitoring without consent) are occurring. However, it is difficult to install and implement existing security solutions because memory space and power are limited owing to the characteristics of small devices in the IoT environment. Therefore, this paper proposes a security protocol that can look at and prevent IoT security threats. A security assessment verified that the proposed protocol is able to respond to various security threats that could arise in a network. Therefore, it is expected that efficient operation of this protocol will be possible if it is applied to the IoT environment.

Secure Proxy Signature Schemes based on RSA Problems and Warrants (RSA 문제와 위임장에 기반한 안전한 대리서명 기법)

  • Seo, Moon-Seog;Iang, Phil-Sik;Choi, Chool-Heon
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.1
    • /
    • pp.42-49
    • /
    • 2011
  • Proxy signature schemes are configured as proxy signers on behalf of their original signers can be allowed to sign messages. Basic security requirements of proxy signature schemes include the strong unforgeability and the verifiability of delegation. So far, a variety of proxy signature schemes that proved on individual basic security terms but not proved on compounded security terms are proposed. Especially the proposed proxy signature schemes based on RSA problem are proved vulnerable to an attacker with his own private key in terms of the impersonating attack. A unauthorized attacker can generate the proxy signature without the appointee's consent or authorization. In this paper, we propose a proxy signature scheme based on RSA problems and warrants that can be proved the security against the impersonating attack. The proposed proxy signature scheme is analyzed on the safety and compared in terms of efficiency with other proxy signature schemes.

Design and Implementation of Network Access Control for Security of Company Network (사내 네트워크 보안을 위한 네트워크 접근제어시스템 설계 및 구현)

  • Paik, Seung-Hyun;Kim, Sung-Kwang;Park, Hong-Bae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.12
    • /
    • pp.90-96
    • /
    • 2010
  • IT environment is rapidly changed, thus security threats such as worms and viruses have increased. Especially company's internal network requires to be inherently protected against these threats. In this respect, NAC(Network Access Control) has attracted attention as new network security techniques. The NAC implements the endpoint access decision based on the collected endpoint security status information and platform measurement information. In this paper, we describe the design and implementation of unauthorized NAC which protect against such as a worm, virus, malware-infected PC, and mobile device to connect to company's internal networks.

Ground Vibration Test of the Aircraft (항공기 지상진동 시험)

  • 유홍주;조창민;주영식;김광로
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 1993.04a
    • /
    • pp.35-39
    • /
    • 1993
  • 항공기의 플러터 현상을 예방키 위한 개발시의 주요 공학적 임무로는 플러 터 해석, 풍동 플러터 시험, 실기체에 대한 지상진동시험 및 비행 플러터 시 험이 있다. 이들 업무는 군용 항공기의 경우에는 군사 규격서, 민간 항공기 의 경우는 FAR 규정 등에 항공기 개발 및 개조시에는 필히 수행토록 명시 되어 있으며, 특히 개발항공기의 인증을 받기 위해서는 초도 비행전까지 필 수적으로 완료되어야 하는 업무이다. 이중 항공기 지상진동시험은 개발항공 기의 초도 비행전에 실기체를 대상으로 하는 구조 동특성 규명시험으로써 플러터 해석 모델의 정확도를 입증하고 그 해석모델을 수정하거나 개선시키 는데 필요한 구조의 동특성 변수들을 실험적으로 규명하는 시험이다. 이 시 험은 개발된 항공기의 초도비행허가를 획득하고 비행속도제한을 설정키 위 해서 초도비행 직전에 초도 개발 비행기를 대상으로 필수적으로 수행되어야 하는 필수적 시험이다. 이에 따라 개발된 항공기의 전기체 지상진동시험을 수행하였고, 시험데이터의 모달해석을 하였다. 이 시험을 수행하기 위해 3개 의 가진기를 사용하였고, 모두 159개의 지점에서 주파수응답 함수를 얻었다. 최대 48 채널의 데이터 획득시스템을 사용하였으므로, 네번에 걸쳐 측정위치 를 옮겨 전체데이타를 획득하였다. 지상진동 시험의 최종해석 결과는 유한요 소 모델의 유효성을 검토하는데 사용되었고, 시험 데이타를 이용한 가진응답 해석(Forced Response Analysis)을 통하여 비행플러터 시험시에 사용되는 플러터 가진기의 위치선정 및 가진력의 크기를 결정하는데 이용하였다.ncy)가 저주 파수대로 천이(Lower Shift)하는 현상이 나타났으며, 일정한 작업량이라도 작업중량을 줄이고 작업 빈도를 높여서 작업할 경우에 이러한 현상이 더욱 두드러졌다. 작업시간의 경과에 따른 MVIS의 감소 현상은 작업빈도가 높고 비대칭형 작업일 때 가장 크게 나타났다. 총손실을 줄이고, 상대적 비용절감효과를 갖게할 수 있다고 하였다. 따라서 본 연구에서는 성인 여성기성복의 치수적합성을 높이기위하여 출산 후 중년에 접어 들면서 체형이 변화되는 것을 고려하여 연령을 분류하고(18세-34세, 30세-51세), 각 연령 집단에 따른 체형을 각각 3가지로 분류하였다. 이에 따라 의복 생산시의 총손실을 줄이기위한 상의, 하의생산시 필요한 부위별 최적규격치 간격을 제시하였다.적인 기능으로 보여지는 것에 좁혀서 작업능력의 연령증가 변화에 대하여다원적 평가를 하는 것이 실제적이라고 할 수 있다. 따라서 본 연구에서는 인간이 가지고 있는 다수의 기능중에서 수지교 치성과 연령증가와의 관계를 조사한다. 만약 연령증가 만으로 수지교치성을 평가 할 수 없는 경우에는 어떠한 요인이 수지기민성의 변화에 영향을 미치는가를 검토한다.t list)에서 자동적으로 사건들의 순서가 결정되도록 확장하였으며, 설비 제어방식에 있어서도 FIFO, LIFO, 우선 순위 방식등을 선택할 수 있도록 확장하였다. SIMPLE는 자료구조 및 프로그램이 공개되어 있으므로 프로그래머가 원하는 기능을 쉽게 추가할 수 있는 장점도 있다. 아울러 SMPLE에서 새로이 추가된 자료구조와 함수 및 설비제어 방식등을 활용하여 실제 중형급 시스

  • PDF

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key (마이크로 모빌리티 환경에서 보안 그룹키를 이용한 안전한 멀티캐스트 프로토콜)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.573-586
    • /
    • 2008
  • The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.

Improvement of Performance for Online Certificate Status Validation (실시간 인증서 상태검증의 성능개선)

  • Jung, Jai-Dong;Oh, Hae-Seok
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.433-440
    • /
    • 2003
  • According as the real economic activities are carried out in the cyber world and the identity problem of a trade counterpart emerges, digital signature has been diffused. Due to the weakness for real-time validation using the validation method of digital signature, Certificate Revocation List, On-line Certificate Status Protocol was introduced. In this case, every transaction workload requested to verify digital signature is concentrated of a validation server node. Currently this method has been utilized on domestic financial transactions, but sooner or later the limitation will be revealed. In this paper, the validation method will be introduced which not only it can guarantee real-time validation but also the requesting node of certificate validation can maintain real-time certificate status information. This method makes the revocation management node update the certificate status information in real-time to the validation node while revoking certificate. The characteristic of this method is that the revocation management node should memorize the validation nodes which a certificate holder uses. If a certificate holder connects a validation node for the first time, the validation node should request its certificate status information to the above revocation management node and the revocation management node memorizes the validation node at the time. After that, the revocation management node inform the revocation information in real-time to all the validation node registered when a request of revocation happens. The benefits of this method are the fact that we can reduce the validation time because the certificate validation can be completed at the validation node and that we can avoid the concentration of requesting certificate status information to a revocation node.