• Title/Summary/Keyword: 통합키

Search Result 191, Processing Time 0.024 seconds

A Design of Security SoC Prototype Based on Cortex-M0 (Cortex-M0 기반의 보안 SoC 프로토타입 설계)

  • Choi, Jun-baek;Choe, Jun-yeong;Shin, Kyung-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.251-253
    • /
    • 2019
  • This paper describes an implementation of a security SoC (System-on-Chip) prototype that interfaces a microprocessor with a block cipher crypto-core. The Cortex-M0 was used as a microprocessor, and a crypto-core implemented by integrating ARIA and AES into a single hardware was used as an intellectual property (IP). The integrated ARIA-AES crypto-core supports five modes of operation including ECB, CBC, CFB, CTR and OFB, and two master key sizes of 128-bit and 256-bit. The integrated ARIA-AES crypto-core was interfaced to work with the AHB-light bus protocol of Cortex-M0, and the crypto-core IP was expected to operate at clock frequencies up to 50 MHz. The security SoC prototype was verified by BFM simulation, and then hardware-software co-verification was carried out with FPGA implementation.

  • PDF

Development of SOFC stack module (SOFC 모듈평가장치 기술개발)

  • Choi, YoungJae;Lee, InSung;Jun, JoongHwan
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2010.11a
    • /
    • pp.81.2-81.2
    • /
    • 2010
  • 고체 산화물 연료전지(SOFC) 시스템은 스택과 기계적 주변 장치인 MBOP(Mechanical Balance of Plant), 그리고 전기적 주변장치인 EBOP(Electrical Balance of Plant)로 구성되어있다. SOFC는 일반적으로 $700^{\circ}C$ 이상의 고온에서 작동되기 때문에 효율적인 열 이용 및 열 관리가 중요하다. SOFC 시스템의 MBOP에는 상온의 연료가스들을 고온으로 가열하여 스택에 유입 시기키 위한 열교환기 및 촉매연소기 등의 장치들이 필요하며, 효율적인 열관리를 위해서는 고온에서 작동하는 장치들을 한곳에 통합하여 구성하는 것이 필수적이다. 본 연구에서는 SOFC 시스템의 MBOP(Mechanical Balance of Pant) 중 고온부에 해당하는 촉매연소기, 열교환기 및 스택이 통합된 스택 모듈을 제작에 앞서 개념 검증을 위해 열교환기 및 촉매연소기로 이루어진 프로토타입(prototype)의 SOFC 모듈평가 장치를 제작하였다. 열교환기는 Plate형으로 총 6개로 구성되어 있으며, 연료극과 공기극 가스라인에 각각 3개씩 배치하여 스택에 유입되는 연료 및 공기가 촉매연소기에서 나오는 고온의 배가스와 열교환되어 가열되도록 구성하였다. 촉매연소기는 honeycomb 타입의 촉매를 사용하였고, 촉매연소기로 유입되는 연료극 배가스와 공기의 균일혼합과 hot spot을 방지하기 위한 장치를 삽입하여 제작하였다. 제작된 SOFC 모듈평가장치는 시운전을 통해 각 장치의 성능 확인 후 반응면적이 $20{\times}20cm^2$ 인 단전지를 적층하여 연계 운전을 수행하였다.

  • PDF

CMS system using web contents certification code (웹 콘텐츠 인증코드를 이용한 CMS 시스템)

  • Cho, Young-Bok;Choi, Jae-Min;Lee, Young-Jin;Sun, Ning;Lee, Sang-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.18-21
    • /
    • 2007
  • 콘텐츠의 다양화로 인해 콘텐츠의 관리를 위해 CMS(contents Management System)가 다양하게 운영되고 있다. 현재 CMS들은 단지 소속회원들을 기반으로 DRM기술을 적용하여 콘텐츠 저작권을 보호하고 있다. 따라서 콘텐츠의 글로벌 사용이 제한되고 상호운용이 불가능하고 콘텐츠의 원천적 저작권보호가 불가능하다. 따라서 이 논문에서는 저작권 보호를 위하여 공개키 기반의 라이선스관리 모듈을 설계하였으며 이를 기반으로 콘텐트 암호화하는 패키저 모듈, 암호화된 콘텐트를 복호화하는 언 패키저 모듈, 콘텐트 공유서버 및 클라이언트 모듈을 설계하였다. 이기종간의 CMS는 트랜젝션 서버를 통해 통합 메타데이터를 공유하며 통합 CMS를 운영하여 다양한 콘텐츠를 다양한 CMS에서도 활용 가능하도록 제안하였으며 웹 콘텐츠 인증코드를 이용한 DRM 기술을 기반으로 콘텐츠 사용 제한 및 저작권 보호를 지원한다.

  • PDF

A Secure Micro-Payment Protocol based on Credit Card in Wireless Internet (무선인터넷에서 신용카드기반의 안전한 소액 지불 프로토콜)

  • Kim Seok mai;Kim Jang Hwan;Lee Chung sei
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12C
    • /
    • pp.1692-1706
    • /
    • 2004
  • Recently, there are rapid development of information and communication and rapid growth of e-business users. Therefore we try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. Wireless e-business adopts credit card WPP protocol and AIP protocol proposed by ASPeCT. WAP, one of the protocol used by WPP has weakness of leaking out information from WG which conned wire and wireless communication. certification chain based AIP protocol requires a lot of computation time and user IDs are known to others. We propose a Micro-Payment protocol based on credit card. Our protocol use the encryption techniques of the public key with ID to ensure the secret of transaction in the step of session key generation. IDs are generated using ECC based Weil Paring. We also use the certification with hidden electronic sign to transmit the payment result. The proposed protocol solves the privacy protection and Non-repudiation p개blem. We solve not only the safety and efficiency problem but also independent of specific wireless platform. The protocol requires the certification organization attent the certification process of payment. Therefore, other domain provide also receive an efficient and safe service.

A Crypto-processor Supporting Multiple Block Cipher Algorithms (다중 블록 암호 알고리듬을 지원하는 암호 프로세서)

  • Cho, Wook-Lae;Kim, Ki-Bbeum;Bae, Gi-Chur;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2093-2099
    • /
    • 2016
  • This paper describes a design of crypto-processor that supports multiple block cipher algorithms of PRESENT, ARIA, and AES. The crypto-processor integrates three cores that are PRmo (PRESENT with mode of operation), AR_AS (ARIA_AES), and AES-16b. The PRmo core implementing 64-bit block cipher PRESENT supports key length 80-bit and 128-bit, and four modes of operation including ECB, CBC, OFB, and CTR. The AR_AS core supporting key length 128-bit and 256-bit integrates two 128-bit block ciphers ARIA and AES into a single data-path by utilizing resource sharing technique. The AES-16b core supporting key length 128-bit implements AES with a reduced data-path of 16-bit for minimizing hardware. Each crypto-core contains its own on-the-fly key scheduler, and consecutive blocks of plaintext/ciphertext can be processed without reloading key. The crypto-processor was verified by FPGA implementation. The crypto-processor implemented with a $0.18{\mu}m$ CMOS cell library occupies 54,500 gate equivalents (GEs), and it can operate with 55 MHz clock frequency.

Public Key-Based Operator Authentication Mechanism for Access Control of Multi-Control Systems in OT Control Network (OT제어망에서 다중 제어시스템 접근통제용 공개키 기반 운용자 인증 방안)

  • Kim, Dae-Hwi;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.64-75
    • /
    • 2022
  • The method of accessing multiple control systems in the OT control network centered on operation technology uses the operator authentication technology of each control system. An example is ID/PW operator authentication technology. In this case, since the OT control network is composed of multiple control systems, operator authentication technology must be applied to each control system. Therefore, the operator must bear the inconvenience of having to manage authentication information for each control system he manages. To solve these problems, SSO technology is used in business-oriented IT networks. However, if this is introduced into the OT control network as it is, the characteristics of the limited size of the OT control network and rapid operator authentication are not reflected, so it cannot be seen as a realistic alternative. In this paper, a public key-based authentication mechanism was newly proposed as an operator authentication technology to solve this problem. In other words, an integrated public key certificate that applies equally to all control systems in the OT control network was issued and used to access all control systems, thereby simplifying the authentication information management and making access to the control system more efficient and secure.

Integrated Management of OSI network and TCP/IP interned with Delegation and Security Features (위임과 보안 성질을 통한 OSI망과 TCP/IP 인터네트의 통합관리)

  • Kim, Tae-Yeon;Seo, Jae-Hyeon;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.6
    • /
    • pp.891-902
    • /
    • 1995
  • To integrate both the OSI network and the TCP/IP internet, the application gateway that have the powerful and flexible paradigms has been used, but due to the micro-managements of the gateway produce the high costs and the long delay of communication in the case of emergency. The mechanism that maps the access control policies between two domains using the different security policies is needed. These problems are caused by integrating both domains with the different standards. In this paper, the application gateway that delegating to an agent the powerful and flexible services of the CMIP as well as the management functions were proposed. A proposed algorithm that delegates he management script to an gateway safely by capitalizing on the Diffie-Hellman's distribution method, and presents the security mechanism mediating the security policies for guaranteeing the secure communication between two domains using the different security policies.

  • PDF

An Integrated Cryptographic Processor Supporting ARIA/AES Block Ciphers and Whirlpool Hash Function (ARIA/AES 블록암호와 Whirlpool 해시함수를 지원하는 통합 크립토 프로세서 설계)

  • Kim, Ki-Bbeum;Shin, Kyung-Wook
    • Journal of IKEEE
    • /
    • v.22 no.1
    • /
    • pp.38-45
    • /
    • 2018
  • An integrated cryptographic processor that efficiently integrates ARIA, AES block ciphers and Whirlpool hash function into a single hardware architecture is described. Based on the algorithm characteristics of ARIA, AES, and Whirlpool, we optimized the design so that the hardware resources of the substitution layer and the diffusion layer were shared. The round block was designed to operate in a time-division manner for the round transformation and the round key expansion of the Whirlpool hash, resulting in a lightweight hardware implementation. The hardware operation of the integrated ARIA-AES-Whirlpool crypto-processor was verified by Virtex5 FPGA implementation, and it occupied 68,531 gate equivalents (GEs) with a 0.18um CMOS cell library. When operating at 80 MHz clock frequency, it was estimated that the throughputs of ARIA, AES block ciphers, and Whirlpool hash were 602~787 Mbps, 682~930 Mbps, and 512 Mbps, respectively.

An Integrated Authentication System for Mobile Codes (이동코드를 위한 통합 인증 시스템)

  • Bae, Seong-Hun;Lee, Su-Hyeon
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.535-542
    • /
    • 2001
  • Mobile codes such as Java, Java-Script, ActiveX, and Script code are loaded into a client system first and then run without any notice to the client user. Executing code by this mechanism may cause various security problems such as flowing out system information, deleting or modifying files, and exhausting system resources. In this paper we propose an integrated authentication system to establish the uniform security countermeasure on various mobile codes. The system helps to solve to problems mentioned above. An integrated authentication system allows to load into an interpreter using ACL (Access Control List) which sets up an access authority to the executable contents and communicates with an interpreter using client/server model.

  • PDF

Trust-Based Filtering of False Data in Wireless Sensor Networks (신뢰도 평가를 통한 무선 센서 네트워크에서의 거짓 데이타 제거)

  • Hur, Jun-Beom;Lee, Youn-Ho;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.1
    • /
    • pp.76-90
    • /
    • 2008
  • Wireless sensor networks are expected to play a vital role in the upcoming age of ubiquitous computing such as home environmental, industrial, and military applications. Compared with the vivid utilization of the sensor networks, however, security and privacy issues of the sensor networks are still in their infancy because unique challenges of the sensor networks make it difficult to adopt conventional security policies. Especially, node compromise is a critical threat because a compromised node can drain out the finite amount of energy resources in battery-powered sensor networks by launching various insider attacks such as a false data injection. Even cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the insider attack from a compromised node. In this paper, we propose a novel trust-based secure aggregation scheme which identifies trustworthiness of sensor nodes and filters out false data of compromised nodes to make resilient sensor networks. The proposed scheme suggests a defensible approach against the insider attack beyond conventional cryptographic solutions. The analysis and simulation results show that our aggregation scheme using trust evaluation is more resilient alternative to median.