• Title/Summary/Keyword: 키 확인

Search Result 782, Processing Time 0.026 seconds

Key Binding-based Biometric-cryptosystem using Confidence Intervals (신뢰구간을 이용한 키 결합 방식의 바이오-암호 기법)

  • Kim, Ae-Young;Lee, Sang-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06a
    • /
    • pp.309-312
    • /
    • 2011
  • 본 논문에서는 유무선 통신환경의 클라이언트-서버 모델에서 바이오정보를 이용해 비밀 키 또는 비밀 정보를 실시간 공유할 수 있는 신뢰구간 기반의 바이오-암호 기법을 설계하고 분석한다. 제안하는 바이오-암호 기법은 키 결합 방식의 바이오-암호 기법의 대표적인 기법의 하나인 퍼지볼트 기법을 기본 모델로 두고 있으나, 퍼지볼트 기법의 주요 이슈인 거짓 볼트 수의 증가에 따른 인식률 저하, 고차 다항식 복원 시간의 실용성 여부, 상관 공격에의 취약을 해결하기 위하여 T-검정 기반 신뢰구간을 적용한 키 결합 방식으로 설계하였다. 실험결과는 거짓 볼트 수의 증가와 상관없이 항상 비밀 키를 획득해 보안성과 정확성이 향상되고, 이때의 수행시간도 사용자가 인지하기 힘든 작은 값으로 실시간 사용의 가능성을 높이고, 유사 바이오정보로 비밀 키를 획득할 수 없어 상관 공격에도 강인함을 확인하였다.

A Public-Key Cryptography Processor Supporting GF(p) 224-bit ECC and 2048-bit RSA (GF(p) 224-비트 ECC와 2048-비트 RSA를 지원하는 공개키 암호 프로세서)

  • Sung, Byung-Yoon;Shin, Kyung-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.163-165
    • /
    • 2018
  • GF(p)상 타원곡선 암호(ECC)와 RSA를 단일 하드웨어로 통합하여 구현한 공개키 암호 프로세서를 설계하였다. 설계된 EC-RSA 공개키 암호 프로세서는 NIST 표준에 정의된 소수체 상의 224-비트 타원 곡선 P-224와 2048-비트 키 길이의 RSA를 지원한다. ECC와 RSA가 갖는 연산의 공통점을 기반으로 워드기반 몽고메리 곱셈기와 메모리 블록을 효율적으로 결합하여 최적화된 데이터 패스 구조를 적용하였다. EC-RSA 공개키 암호 프로세서는 Modelsim을 이용한 기능검증을 통하여 정상동작을 확인하였으며, $0.18{\mu}m$ CMOS 셀 라이브러리로 합성한 결과 11,779 GEs와 14-Kbit RAM의 경량 하드웨어로 구현되었다. EC-RSA 공개키 암호 프로세서는 최대 동작주파수 133 MHz이며, ECC 연산에는 867,746 클록주기가 소요되며, RSA 복호화 연산에는 26,149,013 클록주기가 소요된다.

  • PDF

Dynamic Encryption Key generation and recovery Method (동적 암호키 생성 및 복구 방법)

  • Shin Youngsun;Oh Songseuk;Kim Hwang Rae;Park Jinsub
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.163-165
    • /
    • 2005
  • 유비쿼터스 환경이 도래하면서 언제, 어느 곳에서든 네트?을 사용하여 정당한 사용자임을 확인하고자 하는 요구가 증대하고 있다. 기존의 사용자 인증 방식은 인증기관으로부터 받은 인증서와 비밀키를 하드웨어 장치나 스마트카드 등의 보조 기억장치에 저장하여 휴대하고 다녀야 하는 번거로움이 있다. 또한 사용자의 비밀키를 키위탁 센터에 위탁하여 필요할 때 사용할 수 있도록 하고 있으나 여러 가지 위협으로부터 안전할 수 없는 상황이다. 본 논문에서는 이러한 휴대의 불편함과 여러 가지 위협으로부터 보호하고, 사용자가 언제 어디서든 인증을 제공받을 수 있는 동적 키생성 및 키복구 모듈을 제안한다.

  • PDF

Analytical Review of the Forensic Anthropological Techniques for Stature Estimation in Korea (한국에서 사용되는 법의인류학적 키 추정 방법에 대한 제언)

  • Jeong, Yangseung;Woo, Eun Jin
    • Anatomy & Biological Anthropology
    • /
    • v.31 no.4
    • /
    • pp.121-131
    • /
    • 2018
  • Stature is one of the unique biological properties of a person, which can be used for identification of the individual. In this regard, statures are estimated for the unknown victims from crimes and disasters. However, the accuracy of estimates may be compromised by inappropriate methodologies and/or practices of stature estimation. Discussed in this study are the methodological issues related to the current practices of forensic anthropological stature estimation in Korea, followed by suggestions to enhance the accuracy of the stature estimates. Summaries of forensic anthropological examinations for 560 skeletal remains, which were conducted at the National Forensic Service (NFS), were reviewed. Mr. Yoo Byung-eun's case is utilized as an example of the NFS's practices. To estimate Mr. Yoo's stature, Trotter's (1970) femur equation was applied even though the fibula equation of a lower standard error was available. In his case report, the standard error associated with the equation (${\pm}3.8cm$) was interpreted as an 'error range', which gave a hasty impression that the prediction interval is that narrow. Also, stature shrinkage by aging was not considered, so the estimated stature in Mr. Yoo's case report should be regarded as his maximum living stature, rather than his stature-at-death. Lastly, applying Trotter's (1970) White female equations to Korean female remains is likely to underestimate their statures. The anatomical method will enhance the accuracy of stature estimates. However, in cases that the anatomical method is not feasible, the mathematical method based on Korean samples should be considered. Since 1980's, effort has been made to generate stature estimation equations using Korean samples. Applying the equations based on Korean samples to Korean skeletal remains will enhance the accuracy of the stature estimates, which will eventually increase the likelihood of successful identification of the unknowns.

Height Estimation of pedestrian based on image (영상기반 보행자 키 추정 방법)

  • Kim, Sung-Min;Song, Jong-Kwan;Yoon, Byung-Woo;Park, Jang-Sik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.9
    • /
    • pp.1035-1042
    • /
    • 2014
  • Object recognition is one of the key technologies of the monitoring system for the prevention of various intelligent crimes. The height is one of the physical information of a person, and it may be important information for identification of the person. In this paper, a method which can detect pedestrians from CCTV images and estimate the height of the detected objects, is proposed. In this method, GMM (Gaussian Mixture Model) method was used to separate the moving object from the background and the pedestrian was detected using the conditions such as the width-height ratio and the size of the candidate objects. The proposed method was applied to the CCTV video, and the height of the pedestrian at far-distance, middle- distance, near-distance was estimated for the same person, and the accuracy was evaluated. Experimental results showed that the proposed method can estimate the height of the pedestrian as the accuracy of 97% for the short-range, 98% for the medium-range, and more than 97% for the far-range. The image sizes for the same pedestrian are different as the position of him in the image, it is shown that the proposed algorithm can estimate the height of pedestrian for various position effectively.

A Proposal for Matrix Shape Security Keypad for the Nintendo Switch (향상된 보안의 닌텐도 스위치 행렬 형태 보안 키패드 제안)

  • Kwon, Hyeok-dong;Kwon, Yong-bin;Choi, Seung-ju;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1152-1159
    • /
    • 2019
  • The Nintendo Switch(NSW), which appeared as an 8th generation console, has succeeded worldwide as a hybrid gaming console. The NSW has E-shop itself, users can sign in to their account and purchase games. The keypad built in the NSW is similar to QWERTY keyboard. In the password input field the input information is hidden, but it's possible to get the value entered from the keypad with shoulder surfing attack. Because of the NSW with many party or family games, there is a high probability that someone else is watching the screen nearby, which acts as a vulnerability in account security. Thus we designed the new keypad which improve from this issue. In this paper, we check the problem about the keypad which built in the NSW, we present the proposed keypad and the compared to the built in keypad by showing the test result of unspecified individuals use.

Design of an Enhanced Group Keypad to Prevent Shoulder-Surfing Attacks and Enable User Convenience (어깨 너머 공격을 차단하고 사용 편의성이 가능한 개선된 그룹 키패드 설계)

  • Hyung-Jin Mun
    • Journal of Practical Engineering Education
    • /
    • v.15 no.3
    • /
    • pp.641-647
    • /
    • 2023
  • In the fintech environment, ensuring secure financial transactions with smartphones requires authenticating the device owner. Smartphone authentication techniques encompass a variety of approaches, such as passwords, biometrics, SMS authentication, and more. Among these, password-based authentication is commonly used and highly convenient for user authentication. Although it is a simple authentication mechanism, it is susceptible to eavesdropping and keylogging attacks, alongside other threats. Security keypads have been proposed to address vulnerabilities in password input on smartphones. One such innovation is a group keypad, resistant to attacks that guess characters based on touch location. However, improvements are needed for user convenience. In this study, we aim to propose a method that enhances convenience while being resistant to eavesdropping and recording attacks on the existing group keypad. The proposed method uses new signs to allow users to verify instead of the last character confirmation easily and employs dragging-to-touch for blocking recording attacks. We suggest diverse positioning methods tailored for domestic users, improving efficiency and security in password input compared to existing methods.

An Authentication Scheme for Network Users Using Smart Card (스마트 차드를 이용한 네트워크 가입자 신분 확인)

  • Lee, Jang-Won;Hong, Gi-Yung;Jo, Hyeon-Suk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.5
    • /
    • pp.1170-1178
    • /
    • 1996
  • In this paper, an authentication scheme for network users using smart card is proposed. The network center generates key information and distributes the generated key to the network users safely. It also carries out the verification of the network users to prevent in-proper use caused by stolen of cards. In addition to that the net-work users can change their password in anytime they want. Therefor, we provide more secure and efficient mutual authentication methods.

  • PDF

IC 카드를 이용한 신분확인기술연구

  • Gang, Sin-Gak;Kim, Yeong-Hui;Jin, Byeong-Mun
    • ETRI Journal
    • /
    • v.14 no.4
    • /
    • pp.179-193
    • /
    • 1992
  • 반도체 기술의 발전에 힘입어 종래의 자기 카드를 대체할 수 있는 지능형 카드로서 CPU, 메모리 등을 내장하고 있는 IC 카드가 국제표준으로 확정되어 다양한 응용에 적용되고 있다. IC 카드는 연산 및 정보저장 능력뿐만 아니라 외부로부터의 엑세스에 대한 보호능력도 보유하고 있어 다양한 응용분야중에서도 정보보호 시스팀 구성시 중요한 도구로서 각광받고 있다. 본 논문에서는 먼저 IC 카드의 특성 및 현황에 대해 살펴보고, IC 카드를 이용한 신분확인 방식에 대해 살펴보았다. 그리고, 정보보호 기술 중 사용자 및 엔티티간 신분확인 기술에 IC 카드를 적용하여 구현한 내용에 대해 기술하고 있다. IC 카드로는 CPU 와 사용자 공간으로 2KB EEPROM, 그리고 미연방정부 암호 알고리듬 표준인 DES가 내장되어 있는 제품을 사용하였고, 신분확인 알고리듬은 국제표준으로 제정되고 있는 ISO/IEC 9798의 내용중 대칭키 방식을 이용한 신분확인 방식으로, 신뢰할 수 있는 제3자를 통해 신분확인 과정에서 세션키를 제공받는 방식 III를 따라 구현하였다.

  • PDF

Asymmetric public-key watermarking based on correlation method (상관도 검출기반의 비대칭 공개 키 워터마킹)

  • Li De;Kim Jong-Weon;Choi Jong-Uk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.151-159
    • /
    • 2005
  • Traditional watermarking technologies are symmetric method which embedding and detection keys are same. Although the symmetric watermarking method is easy to detect the watermark, this method has weakness against to malicious attacks to remove or modify the watermark information when the symmetric key is disclosure. Recently, the asymmetric watermarking method that has different keys to embed and detect is watched several researchers as a next generation watermarking technology. In this paper, we have expanded search space of secret key using the solution set of linear simultaneous equations. Secret key is generated by secure linear transformation method to prevent of guessing secret key from public key, and the correlation value between secret key and public key is high. At theresults, the multi bits information can be embedded and high correlation value was detected after JPEG compression.

  • PDF