• Title/Summary/Keyword: 키 교환방법

Search Result 136, Processing Time 0.029 seconds

Interworking of SIP Authentication with DIAMETER and Security Analysis (SIP와 DIAMETER의 인증 연동 및 안전성 분석)

  • 박성준;정수환;이병길;김현곤
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3C
    • /
    • pp.426-435
    • /
    • 2004
  • The DIAMETER protocol provides Authentication, Authorization, and Accounting (AAA) transactions across the Internet. SIP(Session Initiation Protocol) will be used for new types of signaling, such as instant messaging and application level mobility across networks. And SIP will be a major signaling protocol for next generation wireless networks. But the Digest authentication scheme is not using a secure method of user authentication in SIP, and it is vulnerable to man-in-the-middle attacks or dictionary attacks. This study focused on designing a SIP proxy for interworking with AAA server with respect to user authentication and security analysis. We compared and analyzed the security aspects of the scenarios and propose two proposals that a response which include the user address and password-based mutual authentication and key agreement protocol. It is claimed to be more secure against common attacks than current scenarios.

Study on the Improvement about User Authentication of Android Third Party Application Through the Vulnerability in Google Voice (구글 보이스 취약점을 통한 안드로이드 서드 파티 어플리케이션의 사용자 인증 개선방안 연구)

  • Lee, Seyeong;Park, Jaekyun;Hong, Sungdae;Choi, Hyoungki
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.23-32
    • /
    • 2015
  • In the Android market, a large portion of the market share consists of third party applications, but not much research has been performed in this respect. Of these applications, mobile Voice Over IP (VoIP) applications are one of the types of applications that are used the most. In this paper, we focus on user authentication methods for three representative applications of the Google Voice service, which is a famous mobile VoIP application. Then, with respect to the Android file system, we developed a method to store and to send user information for authentication. Finally, we demonstrate a vulnerability in the mechanism and propose an improved mechanism for user authentication by using hash chaining and an elliptic curve Diffie-Hellman key exchange.

A Cloud Storage Gateway to Guarantee the Confidentiality of User Data (사용자 데이터 기밀성을 보장하기 위한 클라우드 스토리지 게이트웨이)

  • Kim, Hong-Sung;Kim, Hyong-Shik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.131-139
    • /
    • 2012
  • The cloud storage has the client lend and use the device as a form of service rather than owning it, and thus the client pays the charge for the service that he or she actually uses, making it beneficial over the self-managed data center. When the storage service is provided on public cloud, however, the clients does not have any control over the user data, which brings a problem of violating data confidentiality. In this paper, we propose a gateway that works between the public cloud and the client for the purpose of guaranteeing the confidentiality of user data stored in cloud. The gateway encrypts or decrypts, and then delivers the user data without the client's intervention. In addition, it provides the function of exchanging keys to allow the client to access through another gateway. The proposed idea has been tested on a commercial public cloud and verified to satisfy security and compatibility.

Soil Testing for Potassium in Upland Soils -Review on the Methodologies- (밭토양(土壤)에 대(對)한 가리(加里) 검정(檢定))

  • Hong, Chong Woon
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.10 no.3
    • /
    • pp.153-170
    • /
    • 1977
  • Considering the ways for the possible improvement of soil test for upland crops, various methods for the evaluation of K supplying power and testing of available soil K were reviewed in terms of theoretical principles and practical usefulness of the each method. The review was also made on the characteristics of upland crops in K requirement and on the chemical properties of major korean upland and lowland rice soils in terms of K availability. Following is the few remarks drawn from the review. 1. Quite large number of methods have been known for the evaluation of K supplying power and testing for available soil K. In nature, they can be divided into two categories; capacity-based methods and intensity-based methcds. The capacity-based methods usually measure the exchangeable and some portion of nonexchangeable K, while the intensity-based methods suggest to consider the ractivity ratios of major cations in soil solution and the energy requirement for the replacement of exchangeable soil K into soil solution. 2. As methodology for extraction of interested part of soil K, chemical extraction, electrodialysis and ion exchange methods have been known. Among these, chemical extract ion is favorable because of its simplicity. However, recently suggested Electro-Ultra-Filtration method seems to merit further study for wider use for not only K but also other nutrient availability of soils. 3. The intensity-based methods, although they are more theoretical, because of their complexity, in methods may not be adapted for practical soil tests. 4. The exchangeable K which is rather simple to measure and which well reflects the status of K reserve as nonexchangeable and is immediate pool of water soluble K may be good, if not best, criterion of soil K availability to plant in common soil testing. 5. Because there are evidences that the abundance of available K alone may not be good inclication for availability of K to plant, it is recommendable to interprete the exchangeable K data as percent saturation of exchangeable K to total C. E. C. of soil for the recommend ation of K fertilizer based on soil tests. 6. Some pot and field trial results showed the trends that percent potassium saturation to total C. E. C. better serve as the parameter for K fertilizer recommendation.

  • PDF

Secure and Efficient V2V Message Authentication Scheme in Dense Vehicular Communication Networks (차량 밀집환경에서 안전하고 효율적인 V2V 메시지 인증기법)

  • Jung, Seock-Jae;Yoo, Young-Jun;Paik, Jung-Ha;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.41-52
    • /
    • 2010
  • Message authentication is an essential security element in vehicular ad-hoc network(VANET). For a secure message authentication, integrity, availability, privacy preserving skill, and also efficiency in various environment should be provided. RAISE scheme has been proposed to provide efficient message authentication in the environment crowded with lots of vehicles and generally considered to be hard to provide efficiency. However, as the number of vehicles communicating in the area increases, the overhead is also incurred in proportion to the number of vehicles so that it still needs to be reduced, and the scheme is vulnerable to some attacks. In this paper, to make up for the vulnerabilities in dense vehicular communication network, we propose a more secure and efficient scheme using a process that RSU(Road Side Unit) transmits the messages of neighbor vehicles at once with Bloom Filter, and timestamp to protect against replay attack. Moreover, by adding a handover function to the scheme, we simplify the authentication process as omitting the unnecessary key-exchange process when a vehicle moves to other area. And we confirm the safety and efficiency of the scheme by simulating the false positive probability and calculating the traffic.

Comparison of Treadmill and Cycle Ergometer in Male Korean College Students (한국 남자 대학생을 대상으로 시행한 Cardiopulmonary Exercise Test에서 Treadmill과 Cycle Ergometer의 비교 분석)

  • Chang, Yoon-Soo;Park, Jae-Min;Choi, Seung-Won;Ahn, Gang-Hyun;Lee, Jun-Gu;Yang, Dong-Kyu;Kim, Se-Kyu;Chang, Jun;Ahn, Chul-Min;Kim, Seong-Kyu;Lee, Won-Yong
    • Tuberculosis and Respiratory Diseases
    • /
    • v.47 no.1
    • /
    • pp.26-34
    • /
    • 1999
  • Background : Generally $VO_2$ max is higher in treadmill exercise than cycle ergometer exercise. According to Hassen and Wasserman, $VO_2$ max with treadmill exercise is higher at ratio of 1.11 than that with cycle ergometer. $VO_2$ max also is influenced by race, sociocultural background, exercise habit In this study, $VO_2$ max and AT were evaluated between Treadmill and cycle exercise in male Korean college students. Method: Study subjects were 44 male college students. We randomized them into 2 groups; 24 students did treadmill exercise at first and 1 week later did cycle ergometer. Another 20 students did in opposite method. They made symptom limited maximal exercise. Author defined maximal exercise as followings: 1) respiratory exchange ratio(RER)> 1.1, 2) plateau>30 sec, 3) heart rate reserve(HRR) <15%, or 4) breathing reserve (BR)<30%. Otherwise their results are excluded as submaximal exercise. Anaerobic threshold(AT) was estimated by V-slope method. Results: $VO_2$ max and AT was $45.1{\pm}6.66m\ell$/kg/min and $26.0{\pm}6.78m\ell$/kg/min in treadmill and $34.9{\pm}5.89m\ell$/kg/min, $19.5{\pm}4.77m\ell$/kg/min in Cycle Ergometer. The measured-$VO_2max$/pred-$VO_2max$ was $98.8{\pm}13.24%$ in treadmill; $84.4{\pm}13.42%$ in cycle ergometer. Comparing $VO_2$ max in treadmill with that obtained by Hassen's method, there were significant differences.(p<0.01). At maximal exercise there were differences in HRR, $O_2$/pulse, BR, $V_E$/MVV, $V_E/VCO_2$ between treadmill and cycle but not in $V_E/VO_2$, Vd/Vt, Ti/Ttot. At AT there were differences in $O_2$/pulse, BR, $V_E$/MVV, Ti/Ttot between treadmill and cycle, otherwise not. Conclusion: According to the result of this study, there are larger gap between treadmill and cycle ergometer in normal Korean adults than foreign data, and it needs further study to obtain reference value of Korea.

  • PDF