• Title/Summary/Keyword: Authentication method

Search Result 1,043, Processing Time 0.032 seconds

Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention (전자기밀문서 유출봉쇄 유통시스템 구조 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.143-158
    • /
    • 2010
  • The illegal leakage of enterprise digital confidential information will threaten the enterprise with bankruptcy. Today since most small-and-medium companies have no capability to fight against illegally compromising their critically confidential documents in spite of knowing the leakage of them, strongly safe distribution system of the digital confidential documents should be designed so in secure as to prevent any malicious intent of embezzlement from accessing the critical information. Current DRM-based protection system is not always perfect to protect the digital secrets, even seems to leave the secrets open. Therefore our study has analyzed the illegal leakage paths that hackers attack against and the vulnerability of the current protection systems. As result, we study the group communication based system architecture satisfying the security conditions to make even legitimate working employee keep out of the confidential documents, without performance degradation. The main idea of this architecture is to stay every secrets in encrypted form; to isolate the encrypted documents from the crypto-key; to associate every entity with one activity and to authenticate every entity with DSA-based public key system; multiple authentication method make hackers too busy to get a privilege to access the secrets with too many puzzle pieces. This paper deal with the basic architectural structure for the above issues.

Design and Implementation of Web Security Module for a Safe Data Transmission in Heterogeneous Systems (이기종 시스템에서 안전한 데이타 전송을 보장하는 웹 보안 모듈의 설계 및 구현)

  • Kim, Ki-Sung;Kim, Kwang;Heu, Shin
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.12
    • /
    • pp.1238-1246
    • /
    • 2005
  • This thesis is written with web security module for safe data transmission between heterogeneous systems(ex. OS). Web system has allowed users to have great convenience and a lot of information. Though web service business has been progressed much, because of the limitation of it's own system, lots of loss, derived from data spillage which is the weakest point of security, has also followed. Suggested security module is realized by two module. One for server security module for web server, the other is client security module for client. The security structure, suggested on this thesis guarantee safe data transmission by only simple installation of modules in clients and servers. for speed sensitive transmission between web server and browser, Triple-DES, symmetric encryption system suitable for fast encryption communication, is adapted. To solve problems caused from key management, Diffie-Hellman's key exchange algorithm is adapted. By this method, all symmetric encryption troubles from key distribution and management, speed could be work out a solution. And Diffie-Hellman type algorithm secures Authentication for safe data Protection.

The Biometric based Convertible Undeniable Multi-Signature Scheme (바이오정보 기반 전환 부인봉쇄 다중서명 기법)

  • Yun, Sung-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.5
    • /
    • pp.1670-1676
    • /
    • 2010
  • It is easy to reproduce and manipulate the digital contents. It's difficult to distinguish the original contents with a pirate one. A digital signature scheme is used to protect the contents author's ownership and to provide secure contents distribution. Generally, the digital contents is completed with many authors' help. It's necessary to apply a cryptographic method for protecting co-authors' rights and interests. In this paper, the biometric based convertible undeniable multi-signature scheme is proposed. In the proposed scheme, keys are generated by using a signer's biometric data. Consigning the private key to another signer is infeasible. Signers must participate in signature generation and verification stages. Our scheme also provides signature conversion protocol in which the undeniable signature is converted to the ordinary one. For applications, we show how the proposed scheme is used to protect co-authors' rights and to distribute the contents securely.

Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model

  • Xie, Dong;Peng, HaiPeng;Li, Lixiang;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2427-2445
    • /
    • 2016
  • In contrast to traditional "store-and-forward" routing mechanisms, network coding offers an elegant solution for achieving maximum network throughput. The core idea is that intermediate network nodes linearly combine received data packets so that the destination nodes can decode original files from some authenticated packets. Although network coding has many advantages, especially in wireless sensor network and peer-to-peer network, the encoding mechanism of intermediate nodes also results in some additional security issues. For a powerful adversary who can control arbitrary number of malicious network nodes and can eavesdrop on the entire network, cryptographic signature schemes provide undeniable authentication mechanisms for network nodes. However, with the development of quantum technologies, some existing network coding signature schemes based on some traditional number-theoretic primitives vulnerable to quantum cryptanalysis. In this paper we first present an efficient network coding signature scheme in the standard model using lattice theory, which can be viewed as the most promising tool for designing post-quantum cryptographic protocols. In the security proof, we propose a new method for generating a random lattice and the corresponding trapdoor, which may be used in other cryptographic protocols. Our scheme has many advantages, such as supporting multi-source networks, low computational complexity and low communication overhead.

Identification of Marker Nucleotides for the Molecular Authentication of Araliae Continentalis Radix Based on the Analysis of Universal DNA Barcode, matK and rbcL, Sequences (범용성 DNA 바코드(matK, rbcL) 분석을 통한 독활(獨活) 유전자 감별용 Marker Nucleotide 발굴)

  • Kim, Wook Jin;Yang, Sungyu;Choi, Goya;Moon, Byeong Cheol
    • The Korea Journal of Herbology
    • /
    • v.31 no.5
    • /
    • pp.15-23
    • /
    • 2016
  • Objectives : Araliae Continentalis Radix and Angelicae Pubescentis Radix have been used as the same medicinal name Korean and Chinese traditional medicines, respectively. The authentic Araliae Continentalis Radix is described only the root of Aralia continentalis in the Korean Pharmarcopoeia. However, the dried root of Angelica biserrata, Levisticum officinale, or Heracleum moellendorffii also has been distributed adulterants of Araliae Continentalis Radix. To develop a reliable method for identifying Araliae Continentalis Radix from adulterants, we carried out the analyses of universal DNA barcode sequences.Methods : Four plants species were collected from different habitate and nucleotide sequences of matK and rbcL were analyzed. The species-specific sequences and phylogenetic relationship were estimated using entire sequences of two DNA barcodes, respectively.Results : In comparative analysis of matK sequences, we were identified 104 positions of marker nucleotide for Ar. continentalis, 3 for An. biserrata, 4 for L. officinale and 8 for H. moellendorffii enough to distinguish individual species, respectively. Furthermore, we obtained marker nucleotides in rbcL at 42 positions for Ar. continentalis, 5 for An. biserrata and 2 for H. moellendorffii, but not for L. officinale. The phylogenetic tree of matK and rbcL were showed that all samples were clustered into four groups constituting homogeneous clades within the species.Conclusions : We confirmed that species-specific marker nucleotides of matK sequence provides distinct genetic information enough to identify four species. Therefore, we suggest that matK gene is useful DNA barcode for discriminating authentic Araliae Continentalis Radix from inauthentic adulterants.

Molecular Authentication of Magnoliae Flos Using Robust SNP Marker Base on trnL-F and ndhF Region

  • Kim, Min-Kyeoung;Noh, Jong-Hun;Yan, Deok-Chun;Lee, Sanghun;Lee, Hee-Nyeong;Jin, Chi-Gyu
    • Korean Journal of Plant Resources
    • /
    • v.28 no.3
    • /
    • pp.341-349
    • /
    • 2015
  • Magnoliae Flos (Sini in Korean) is one of the most important oriental medicinal plants. In the Korean Herbal Pharmacopeia, the bud of the all species in Manolia denudate and Manolia genus were regarded as the botanical sources for ‘Sini’. Most the dried bud of Manolia denudata, Manolia biondii and Manolia sprengeri were used as ‘Xin-yi’ in China. Therefore, the purpose of this study was to determine and compare the ‘Magnolia’ species, four species including Manolia denudata, M. biondii, M. liliiflora and M. Kobus were analysis of sequencing data revealed DNA polymorphisms. The based on tRNA coding leucine/phenylalanine (trnL-F) and NADH-plastoquinone oxidoreductase subunit 5 (ndhF) sequences in chloroplast DNA. For the identification of ‘Magnolia’ species, polymerase chain reaction (PCR) analysis of chloroplast DNA regions such as ndhF have proven an appropriate method. A single nucleotide polymorphism (SNP) has been identified between genuine “Sini” and their fraudulent and misuse. Specific PCR primers were designed from this polymorphic site within the sequence data, and were used to detect true plants via multiplex PCR.

Development of SCAR Markers for the Authentication of Acori Rhizoma Based on the Analysis of RAPD and Multiplex-PCR (RAPD 분석과 multiplex-PCR을 이용한 석창포 감별용 SCAR 마커 개발)

  • Moon, Byeong-Cheol;Ji, Yun-Ui;Lee, Young-Mi;Chun, Jin-Mi;Lee, A-Yeong;Choo, Byung-Kil;Kim, Ho-Kyoung
    • Korean Journal of Medicinal Crop Science
    • /
    • v.19 no.3
    • /
    • pp.162-169
    • /
    • 2011
  • The rhizomes and herbal medicines originating from Acorus gramineus, A. calamus, A. tatarinowii, and A. gramineus var. pusilus, show significant similarity, and the correct identification of species is very difficult. Random Amplified Polymorphic DNA (RAPD) and Sequence Characterized Amplified Region (SCAR) were used to develop a reliable method for identification of these four species. Several distinct SCAR markers were developed from species-specific RAPD amplicons for each species. Furthermore, a useful molecular marker was established for multiplex-PCR, in order to the four species could be distinguished concurrently. These markers allow efficient and rapid identification of closely-related Acorus species and will be useful for standardization of herbal medicines.

A study on User Authentication Technology of Numeric based Pattern Password (숫자기반의 패턴 형식 패스워드 사용자인증 기술)

  • Ju, Seung-Hwan;Seo, Hee-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.9
    • /
    • pp.65-73
    • /
    • 2012
  • The traditional text-based password is vulnerable guessing, dictionary attacks, keyloggers, social engineering, stole view, etc. these vulnerability effect more serious problem in a mobile environment. In this study, By using the pattern number to enter the password of an existing four-digit numeric password, User easily use to new password system. The technology on pattern based numerical password authorization proposed in this paper would intensify the security of password which holds existing 10 numbers of cases by authorizing a user and would not invade convenience of use by providing high security and making users memorize only four numbers like old method. Making users not have inconvenience and raising complexity, it would have a strength to an shoulder surfing attack of an attacker. So I study password system that represents the shape-based of number. I propose the new password system to prevent peeking attacks and Brute-force attack, and this proposal is to review the security and usability.

USN Security Enhancement Using System IDs (시스템 ID를 이용한 USN의 보안 취약성 개선)

  • Kim, Hyun-Jue;Chung, Jong-Moon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.2
    • /
    • pp.73-80
    • /
    • 2009
  • Security is critically important for ubiquitous sensor networks that are usually used for the military and serveillance in environments that are opened to attacks, such as, eavesdroping, replay attacks of abnormal messages, forgery of the messages to name a few. ZigBee has emerged as a strong contender for ubiquitous sensor networks. ZigBee is used for low data rate and low power wireless sensor network applications. To deploy ubiquitous sensor networks, the collected information requires protection from an adversary over the network in many cases. The security mechanism should be provided for collecting the information over the network. However, the ZigBee protocol has some security weaknesses. In this paper, these weaknesses are discussed and a method to improve security aspect of the ZigBee protocol is presented along with a comparison of the message complexity of the proposed security protocol with that of the current ZigBee protocol.

A Study of Security Requirement in Wireless Charging (무선충전에서 보안요구사항에 관한 연구)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.3
    • /
    • pp.23-27
    • /
    • 2014
  • In recent times, there is an increasing interest in wireless charge of smartphones and devices, and many companies are developing wireless charges. The range of application of wireless charge would be expanded to almost all electronics, including not only mobile devices, but also notebook computers and vacuum cleaners. On-line electric vehicles are to be launched in the market this year in a massive scale. As such wireless charge-related markets are inexhaustible. Wireless charge is included in the world's top 10 promising technologies, and its rapid growth is expected to have annual growth by more than 100%. However, there's a need to establish a safe environment, by analyzing security threats to technical limitations and harmfulness to human body, and arrange institutional compliments. The development of communication method for a variety of wireless charging are delivering comfortable and safe information. This paper aims to examine the factors to threaten electric vehicle, which are usually intruded through network system and analyzes security threats to and security requirements for magnetic resonance mode-based wireless charge in mobile devices, and suggests security requirements.