• Title/Summary/Keyword: Asymmetric key

Search Result 172, Processing Time 0.025 seconds

Internet Banking Login with Multi-Factor Authentication

  • Boonkrong, Sirapat
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.511-535
    • /
    • 2017
  • Internet banking is one of many services provided by financial institutions that have become very popular with an increasing trend. Due to the increased amount of usage of the service, Internet banking has become a target from adversaries. One of the points that are at risk of an attack is the login process. Therefore, it is necessary to have a security mechanism that can reduce this risk. This research designs and develops a multi-factor authentication protocol, starting from a registration system, which generates authentication factors, to an actual authentication mechanism. These factors can be categorised into two groups: short term and long term. For the authentication protocol, only three messages need to be exchanged between a client and a financial institution's server. Many cryptographic processes are incorporated into the protocol, such as symmetric and asymmetric cryptography, a symmetric key generation process, a method for generating and verifying digital signatures. All of the authentication messages have been proved and analysed by the logic of GNY and the criteria of OWASP-AT-009. Even though there are additional factors of authentication, users do not really feel any extra load on their part, as shown by the satisfactory survey.

Unilateral intraoral vertical ramus osteotomy based on preoperative three-dimensional simulation surgery in a patient with facial asymmetry

  • Lee, Jae-Won;Kim, Moon-Key;Kang, Sang-Hoon
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.40 no.1
    • /
    • pp.32-36
    • /
    • 2014
  • Preoperative surgical simulation in orthognathic surgery has progressed in recent years; the movement of the mandible can be anticipated through three-dimensional (3D) simulation surgery before the actual procedure. In this case report, the mandible was moved to the intended postoperative occlusion through preoperative surgical 3D simulation. Right-side condylar movement change was very slight in the surgical simulation, suggesting the possibility of mandibular surgery that included only left-side ramal osteotomy. This case report describes a patient with a mild asymmetric facial profile in which the mandibular menton had been deviated to the right and the lips canted down to the left. Before surgery, three-dimensional surgical simulation was used to evaluate and confirm a position for the condyle as well as the symmetrical postoperative state of the face. Facial asymmetry was resolved with minimal surgical treatment through unilateral intraoral vertical ramus osteotomy on the left side of the mandible. It would be a valuable complement for the reduction of the surgical treatment if one could decide with good predictability when an isolated intraoral vertical ramus osteotomy can be done without a compensatory osteotomy on the contralateral side.

The design of authentication mechanism using kerberos and X.509 protocol in distributed environment (분산환경에서 Kerberos와 X.509 Protocol을 이용한 인증 메카니즘의 설계)

  • 김성진;정일용
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.12
    • /
    • pp.2860-2866
    • /
    • 1997
  • Kerberos is the most used example of authentication technology in distributed environment. In this paper, based on this method, a new authentication mechanism associated with X.509 protocol that authenticates services between regions is presented. Since any suggestions to regional services are not described in Kerberos, the authentication between regiona is performed via the connected chain obtained from x.509. These two protocols have distinguished key management systems -X.509 is designed using an asymmetric method, while Kerberos using a symmetric method. In order to provide regional services, X.509 is employed on connection part and Kerberos on actual authetication part.

  • PDF

The Reliable Communication Method for Self-Sovereign Identity Ecosystems (자기주권 신원 생태계를 위한 신뢰할 수 있는 통신 방법)

  • Chio, Gyu Hyun;Kim, Geun-Hyung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.3
    • /
    • pp.91-98
    • /
    • 2022
  • With the recent increase in interest in metaverse in which virtual and physical spaces are digitally fused, many activities in physical spaces are expected to take place in web-based virtual spaces. Therefore, there is a need for research on a self-sovereign identity system that can secure privacy and mutual trust in a DID(decentralized identifier)-based virtual space environment. We, in this paper, developed and validated a reliable communication method consisting of DIDComm messages, a procedure for generating distributed identifiers, asymmetric keys, and DID documents based on Hyperledger Indy and DIDComm open sources. The developed communication method can be applied to verify each other by exchanging additional information and verifiable credentials for trust among communication participants.

A Study on the Fingerprinting scheme without Trusted Third Party (신뢰기관 비참여의 핑커프린팅 기법에 관한 연구)

  • Yong, Seung-Lim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.81-88
    • /
    • 2009
  • Fingerprinting scheme is a technique which supports the copyright protection to track redistributors of digital content using cryptographic techniques. These schemes enable the original merchant to identify the original buyer of the digital data by embedding fingerprints into digital contents. Asymmetric property of fingerprinting schemes is important to keep the buyer's privacy. In this paper, we propose a symmetric encryption based fingerprinting protocol without trusted third party. Our scheme enables the reduction of computational costs for the encryption using symmetric key encryption scheme. Since a trusted third party doesn't take part in making the fingerprint of each buyer, the protocol doesn't need to control the trusted third party and it is more secure against collusion attack.

Asymmetric Capacitive Sensor for On-line and Real-time Partial Discharge Detection in Power Cables

  • Changhee Son;Hyewon Cheon;Hakson Lee;Daekyung Kang;Jonghoo Park
    • Journal of Sensor Science and Technology
    • /
    • v.32 no.4
    • /
    • pp.219-222
    • /
    • 2023
  • Partial discharges (PD) have long been recognized as a major contributing factor to catastrophic failures in high-power equipment. As the demand for high voltage direct current (HVDC) facilities continues to rise, the significance of on-line and real-time monitoring of PD becomes increasingly prominent. In this study, we have designed, fabricated, and characterized a highly sensitive and cost-effective PD sensor comprising a pair of copper electrodes with different arc lengths. The key advantage of our sensor is its non-invasive nature, as it can be installed at any location along the entire power cable without requiring structural modifications. In contrast, conventional PD sensors are typically limited to installation at cable terminals or insulation joint boxes, often necessitating invasive alterations. Our PD sensor demonstrates exceptional accuracy in estimating PD location, with a success rate exceeding 95% in the straight sections of the power cable and surpassing 89% in curved sections. These remarkable characteristics indicate its high potential for realtime and on-line detection of PD.

Cloning, expression, purification, and crystallization of Xoo0878, β-ketoacyl-acyl carrier protein synthase III (FabH), from Xanthomonas oryzae pv. oryzae

  • Ngo, Ho-Phuong-Thuy;Nguyen, Diem-Quynh;Kim, Seunghwan;Kim, Jeong-Gu;Ahn, Yeh-Jin;Kang, Lin-Woo
    • Biodesign
    • /
    • v.7 no.2
    • /
    • pp.35-37
    • /
    • 2019
  • Xanthomonas oryzae pv. oryzae (Xoo) is a plant pathogen, which causes a bacterial blight of rice. The bacterial blight is one of the most devastating diseases of rice in most of the rice growing countries and there is no effective pesticide against bacterial blight. The β-ketoacyl-acyl carrier protein synthase III (FabH) plays a key role in fatty acid synthesis (FAS) and is a promising drug target for the development of antibacterial agents. Xoo0878 gene, a fabH gene, from Xoo was cloned and its gene product Xoo0878 was expressed, purified and crystallized. Xoo0878 crystal diffracted to 2.1Å resolution and belonged to the triclinic space group P1, with unit-cell parameters a = 57.3Å, b = 64.7Å, c = 104.2Å and α = 81.6°, β = 84.7°, γ = 74.4°. There are four monomers in the asymmetric unit, with a corresponding crystal volume per protein weight of 2.65 Å3 Da-1 and a solvent content of 53.6%. Xoo0878 structure will be useful to develop new antibacterial agents against Xoo.

Thermal Distribution Analysis in Nano Cell OLED (나노 셀 OLED의 열 분포 해석)

  • Kyung-Uk Jang
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.37 no.3
    • /
    • pp.309-313
    • /
    • 2024
  • The key to determining the lifetime of OLED device is how much brightness can be maintained. It can be said that there are internal and external causes for the degradation of OLED devices. The most important cause of internal degradation is bonding and degradation in the excited state due to the electrochemical instability of organic materials. The structure of OLED modeled in this paper consists of a cathode layer, electron injection layer (EIL), electron transport layer (ETL), light emission layer, hole transport layer (HTL), hole injection layer (HIL), and anode layer on a glass substrate from top to bottom. It was confirmed that the temperature generated in OLED was distributed around the maximum of 343.15 K centered on the emission layer. It can be seen that the heat distribution generated in the presented OLED structure has an asymmetrically high temperature distribution toward the cathode, which is believed to be because the sizes of the cathode and positive electrode are asymmetric. Therefore, when designing OLED, it is believed that designing the structures of the cathode and anode electrodes as symmetrically as possible can ensure uniform heat distribution, maintain uniform luminance of OLED, and extend the lifetime. The thermal distribution of OLED was analyzed using the finite element method according to Comsol 5.2.

Asymmetry of Medial and Lateral Temporal Regional Glucose Metabolism in Temporal Lobe Epilepsy by F-18-FDG PET (측두엽 간질에서 F-18-FDG PET에 나타난 측두엽 내외측 부위별 대사의 차이)

  • Lee, Dong-Soo;Yeo, Jeong-Seok;Song, Ho-Cheon;Lee, Sang-Kun;Kim, Hyun-Jip;Chung, June-Key;Lee, Myung-Chul
    • The Korean Journal of Nuclear Medicine
    • /
    • v.33 no.1
    • /
    • pp.28-39
    • /
    • 1999
  • Purpose: We investigated the difference of glucose metabolism of medial and lateral temporal lobes of patients with temporal lobe epilepsy (TLE) utilizing quantitative comparison of regional metabolic activities using asymmetric index. Materials and Methods: We studied 19 pathologically proven mesial TLE and 25 lateral TLE patients. Lateral TLE patients were either normal on magnetic resonance imaging (cryptogenic: n=14) or had structural lesions (lesional: n= 11). Asymmetric index (ASI) was calculated as [(ipsilateral-contralateral)/(ipsilateral+contralateral)]${\times}200$. Results: ASI of medial and lateral lobes of mesial TLE was decreased ($-16.4{\pm}8.3$ and $-12.1{\pm}5.5$, respectively). In cryptogenic lateral TLE, ASI of lateral temporal lobe was decreased ($-11.8{\pm}4.7$), whereas that of medial temporal lobe was not decreased ($-4.6{\pm}6.3$). ASI of medial lobe of lesional lateral TLE was $-7.3{\pm}9.1$, which was significantly different from that of mesial TLE (p<0.05). Patients with lesional lateral TLE had evident metabolic defects or decrease (ASI: $-22{\pm}10.5$) in lateral temporal lobe. While we could not find the difference of metabolic activity in lateral temporal lobes between cryptogenic lateral TLE and mesial TLE patients, the difference of metabolic activity was significant in medial temporal lobes which was revealed by ASI quantitation. Conclusion: Asymmetric decrease of metabolic activity in both medial and lateral temporal lobes indicates medial temporal epilepsy. Symmetry of metabolic activity in medial temporal lobe combined with asymmetry of that in lateral temporal lobe may give hints that the epileptogenic zone is lateral.

  • PDF

Regional Difference of Project Finance and Its Policy Implications (프로젝트 금융의 지역적 차별성과 정책적 시사점)

  • Park, Won-Seok
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.11 no.4
    • /
    • pp.580-599
    • /
    • 2008
  • This paper aims at examining the existence and characteristics of regional difference in project finance in Korea. Main results of this paper are as follow. Firstly, regional difference in project finance between capital region and local can be seen partially. However, their characteristics are different from corporate finance. ANOVA tests show significant differences of excess interest rate occur in case of commercial real estate projects and significant differences of contracted terms occur in case of residential real estate projects carried out by local banks. Secondly, key factors causing the regional differences in project finance are asymmetric information for cash flow generated by the project between the capital region and local. Especially, regional differences in project finance are different from those in corporate financing because of local banks$^{\circ}{\phi}$ behaviors. They follow and act as the passive members of nationwide banks in case of the capital region projects. Thirdly, prepaid sale system and the guarantee system depending on construction companies dilute the regional differences in project finance in case of residential real estate projects. Although these systems contributed rapid growth of project finance, they may be the main factors distorting project finance market which lead to financial crisis. In these context, policy implications may be derived in order to solve the confronted problems of project finance market.

  • PDF