• Title/Summary/Keyword: 해쉬 함수

Search Result 294, Processing Time 0.02 seconds

USB Device Authentication Protocol based on OTP (OTP 기반의 USB 디바이스 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.8
    • /
    • pp.1735-1742
    • /
    • 2011
  • Now a days, as a mass-storage USB becomes comfortable to carry, function of USB is being developed fast. However, there is a problem that the personal information which is stored in USB could be exposed being used with negative purpose without other certification process. This paper suggests OTP(One-Time Password)-based certification protocol of USB to securely protect personal information stored in USB without additional certification information. The proposed OTP based certification protocol of USB not only demands low calculations but also prevents physical approach of USB of other network and does not allow unnecessary service access of user because it conducts simple action and uses one-way hash function. Therefore, communication overhead and service delay is improved. In the experiment, the proposed protocol compares and evaluates throughput of certification server according to the numbers of USB and delay time of packet certification with a device(USB driver) which simply save device and a device(USB Token) which can calculate by oneself. As a result, it is improved as the number of 12.5% in the certification delay time on average and is improved as the number of 10.8% in the throughput of certification server according to the numbers of USB.

A Study on Low-Cost RFID System Mutual Authentication Scheme using Key Division (키 분할을 이용한 Low-Cost RFID 시스템 상호 인증 방안에 관한 연구)

  • Kang, Soo-Young;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.14C no.5
    • /
    • pp.431-438
    • /
    • 2007
  • RFID system is core technology that construct ubiquitous environment for replacement of barcode technology. Use ratio of RFID system rapidly increase because the technology has many good points such as identification speed, storage space, convenience etc. But low-cost tag operates easily by query of reader, so the system happened user privacy violent problem by tag information exposure. The system studied many ways for security application, but operation capability of low-cost tag is about $5K{\sim}10K$ gates, but only $250{\sim}3K$ gates allocated security part. So it is difficult to apply security to the system. Therefore, this scheme uses dividing 64 bits and reduces arithmetic, so proposed scheme provide mutual authentication that can apply to low-cost RFID system. Existing methods divide by 4 and used 96 bits. However, that reduces 32 bits length for lightweight and reduced from communication number of times of 7 times to 5 times. Also, because offer security by random number than existing scheme that generate two random numbers, that is more efficient. However, uses hash function for integrity that was not offered by XOR arithmetic and added extension of proposed scheme. Extended scheme is not offered efficiency than methods that use XOR arithmetic, but identification distance is mode that is proposed secure so that can use in for RFID system.

Development and Implementation of Blockchain Appropriate Technology Science School Program of Europe-Korea Conference on Science & Technology (유럽-한인 과학기술학회의 블록체인 적정기술 과학교실 프로그램 개발과 적용)

  • Kim, Gahyoung;Choi, Kevin Kyeong-iI;Kim, Dowon;Son, Muntak;Kim, Byoung-Yoon
    • Journal of Appropriate Technology
    • /
    • v.6 no.2
    • /
    • pp.190-199
    • /
    • 2020
  • The purpose of this study is to develop and implement the Appropriate Technology Science School program (ATSS) for youth operated by the Europe-Korea Conference on Science & Technology (EKC) since 2016. The development process consisted of pre-online management meetings, online and offline tutor training, operation of ATSS for youth, and satisfaction surveys. As a result of the development, the management team selected the mission-solving theme of "Transforming village using blockchain technology" through a pre-online meeting. The contents were reorganized according to the level of the participating tutees, and various learning activities such as co-building activities, games, and plays were newly introduced and developed first, and the programs developed through tutor training were demonstrated and improved. A total of 38 tutees and tutors from 6 countries participated in the 2018 ATSS. As a result, participants showed positive satisfaction overall. Tutees showed interest in dome co-building activities and hash function calculation activities, and tutors showed interest in lectures and monopoly games related to blockchain technology. The development and of the 2018 ATSS will contribute to the improvement of expertise in the operation of the EKC ATSS in the future to the management team. It will be an opportunity for tutors to experience that high-tech science and technology have a good impact on appropriate technology for the third world and community society. In addition, Tutees will be provided with an opportunity to indirectly experience the local situation and community society through a role play on the impact of blockchain technology on African villages.

Efficient IoT data processing techniques based on deep learning for Edge Network Environments (에지 네트워크 환경을 위한 딥 러닝 기반의 효율적인 IoT 데이터 처리 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.325-331
    • /
    • 2022
  • As IoT devices are used in various ways in an edge network environment, multiple studies are being conducted that utilizes the information collected from IoT devices in various applications. However, it is not easy to apply accurate IoT data immediately as IoT data collected according to network environment (interference, interference, etc.) are frequently missed or error occurs. In order to minimize mistakes in IoT data collected in an edge network environment, this paper proposes a management technique that ensures the reliability of IoT data by randomly generating signature values of IoT data and allocating only Security Information (SI) values to IoT data in bit form. The proposed technique binds IoT data into a blockchain by applying multiple hash chains to asymmetrically link and process data collected from IoT devices. In this case, the blockchainized IoT data uses a probability function to which a weight is applied according to a correlation index based on deep learning. In addition, the proposed technique can expand and operate grouped IoT data into an n-layer structure to lower the integrity and processing cost of IoT data.