• Title/Summary/Keyword: Certificate Authority

Search Result 146, Processing Time 0.029 seconds

A Study on the Status and Development of Diving Activity in Korea (우리나라 잠수분야의 현황과 개발에 관한 연구)

  • 김성국;신한원
    • Journal of the Korean Institute of Navigation
    • /
    • v.20 no.3
    • /
    • pp.137-162
    • /
    • 1996
  • Today diving activity and technology are indispensable for underwater technology and offshore engineering. And then diving business is still more important to business of subsea. This study surveyed the issue of diving activity in Korea as for compared foreign diving activity. This paper analyzed the status of diving business that include commercial and sport-leisure diving business and development of commercial divers in Korea. This paper reputed the object, the necessity and the character of commercial divers. For the purpose of this study is considered in order to analyze the environment of commercial divers and propose the planning for industrial diving business. Under the present circumstance in Korea this development planning study may be restricted. but the effective planning to activate Korean commercial diving business is abstracted as follows; First, establishment of new course, grade, certificate and licence test for diver is a pre-requisite factor for the successful enactment. Second, the political assistance of concerned government authority is needed. Third, establishment of Korean diving school and medical center for divers are strongly required. Forth, setting up the department of diving activity in university.

  • PDF

A Study on the Authentication Protocols Fitted for Smart Cards (스마트 카드에 적합한 인증 프로토콜에 관한 연구)

  • 이지영
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.4
    • /
    • pp.9-14
    • /
    • 1999
  • The authentication technique, which uses public key cryptographic algorithms, proves itself by generating authentication value through secret keys and gives verification by means of public keys .This paper is believed to 1) solve the problem of distribution and management of secret keys, which still remain the problem of authentication used in symmetric cryptographic algorithm. 2) provide the method to receive a certificate of handling the problems of public key lists through the authentication authority. and finally 3) suggest an algorithm which will enable us to run the public keys more effectively.

  • PDF

A Study on the Correlation of Certification system for the Green Building in Korea (국내 친환경건축물관련 인증제도의 연관성에 관한 연구)

  • Moon, Mi-Seon;Jung, Ji-Na;Ka, Cham-Hee;Lee, Jin-Sook;Tae, Choon-Seob
    • 한국태양에너지학회:학술대회논문집
    • /
    • 2011.04a
    • /
    • pp.263-268
    • /
    • 2011
  • Presently, various building certification systems are being enforced in Korea. However, people are in confusion and have an aptitude to waste time and money because these certification systems for buildings have very similar criteria. After investigating the foreign certification systems and domestic certification systems for the building, it is required that some of similar building certification systems are integrated.

  • PDF

CORBA Based Mutual Authentication Mechanism using CCCA (CCCA를 이용한 CORBA기반의 상호 인증 메커니즘)

  • Yi, Yong-Ju;Jang, Jong-Hyeun;Lee, Dong-Gil
    • The KIPS Transactions:PartC
    • /
    • v.8C no.3
    • /
    • pp.245-252
    • /
    • 2001
  • 인터넷의 이용증가와 전자상거래의 활성화 등으로 인해 급속도로 발전하는 공개키 기반구조에 능동적으로 대처하기 위해서는 확정성과 상호 운용성, 관리용이성, 나 공개키 기반구조 기관의 수용 등 여러 가지 문제를 고려한 인증 모델이 제시되어야 한다. 이 논문에서는 인터넷에서 이기종의 컴퓨터들이 서로 연결되어 자료를 공유하고 분산되어 실행할 수 있는 개방 분산 시스템인 CORBA 기반의 상호인증 모델을 설계한다. 공개케 기반 시스템(PKI)을 도입하되 CCCA(Cross Certification CA)를 이용하여 효율적으로 상호인증 할 수 있는 모듈과 인터페이스를 설계하고 기존 모델과 비교 분석하여 우수성을 증명한다.

  • PDF

A Security Communication Protocol between CA and Vehicle for WAVE System (WAVE 시스템 환경에서 CA와 차량간 보안통신 프로토콜)

  • Seo, Dong-Won;Park, Seung-Peom;Ahn, Jae-Won;Kim, Eun-Gi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.416-418
    • /
    • 2014
  • WAVE (Wireless Access in Vehicular Environments) 시스템 환경은 차량 간 무선통신을 가능하게 해주는 환경이다. 무선통신의 활용이 증가하면서 그에 따른 공격 방법도 증가하여, 통신 시 제3자에 의해 패킷이 변조될 수 있다. 제3자로부터 패킷을 보호하기 위해 통신 전 차량은 CA (Certificate Authority)로부터 자신이 적합한 호스트라는 것을 인증 받아야 한다. 본 논문에서는 차량과 CA의 통신 과정에서 Diffie-Hellman Key Exchange 알고리즘과 AES (Advanced Encryption Standard) 알고리즘 등을 이용하여 패킷의 기밀성과 무결성을 보장하는 프로토콜을 설계하였다.

A CRL Distribution Scheme Minimizing the Time for CRL Processing of Vehicles on Vehicular Communications

  • Kim, Hyun-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.73-80
    • /
    • 2018
  • Certification revocation list(CRL) is needed for excluding compromised, faulty, illegitimate vehicle nodes and preventing the use of compromised cryptographic materials in vehicular communications. It should be distributed to vehicles resource-efficiently and CRL computational load of vehicles should not impact on life-critical applications with delay sensitive nature such as the pre-crash sensing that affords under 50msec latency. However, in the existing scheme, when a vehicle receives CRL, the vehicle calculates linkage values from linkage seeds, which results in heavy computational load. This paper proposes, a new CRL distribution scheme is proposed, which minimizes the time for CRL processing of vehicles. In the proposed scheme, the linkage value calculation procedure is performed by road-side unit(RSU) instead of the vehicle, and then the extracted linkage values are relayed to the vehicle transparently. The simulation results show that the proposed scheme reduces the CRL computational load dramatically, which would minimize impact on life-critical applications' operations with low latency.

The Study in Improving Quality of Aircraft Maintenance Recurrent Training using e-Learning (이러닝을 이용한 항공정비 교육 훈련 품질 향상방안 연구)

  • Choi, Sejong;Kim, Chunyong
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.27 no.1
    • /
    • pp.34-42
    • /
    • 2019
  • Ten AOC(Air Operation Certificate) holders certified by MOLIT of Korea are operating their own maintenance training program. Though the maintenance training program is approved by the same authority, the contents of the program are different even in the mandatory training courses among AOC holders. The survey interview showed that the maintenance training in mandatory training should have the same contents and requirements. Throughout the survey and focus group discussion, this paper suggests the list and contents of the initial mandatory training and the list, contents and interval for the recurrent mandatory training. This paper also suggests how to implement the on-line training program for recurrent mandatory training to keep the quality of the airline maintenance training program.

A Study on Phishing Prevention Mechanism of OpenID using Certificate Authority (인증기관을 이용한 OpenID 피싱 방지 기법에 관한 연구)

  • Kim, Sung-Soo;Kim, Jae-Woo;Kim, Hyun-Chul;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1389-1392
    • /
    • 2009
  • OpenID는 서비스와 ID 관리를 사이트 독자적으로 수행하는 Silo 모델의 계정 및 정보 관리 문제를 해결한다. 그러나 악의적인 공격자로 인한 OpenID Provider에 대한 피싱 공격 위험이 발견됨에 따라 개인 정보 유출에 대한 큰 위협이 되고 있다. 본 논문에서는 기존 OpenID 구조에 인증기관을 추가하여 사용자 인증 이전에 IDP에 대한 유효성 검증을 먼저 수행함으로써 IDP 피싱으로 인한 개인 정보 유출 문제를 사전에 방지 할 수 있는 인증기관을 이용한 OpenID 피싱 방지 기법을 제안한다. 또한, 기존의 OpenID 피싱 방지 기법과의 비교 실험을 통하여 편리성, IDP 신뢰성, 피싱 공격의 대한 안전성 항목에서 우수함을 확인 할 수 있었다.

Design and Evaluation of DRM Model with Strong Security Based on Smart Card (스마트카드 기반의 강한 보안을 갖는 DRM 모델의 설계 및 평가)

  • Park, Jong-Yong;Kim, Young-Hak;Choe, Tae-Young
    • Journal of Digital Contents Society
    • /
    • v.12 no.2
    • /
    • pp.165-176
    • /
    • 2011
  • Recently, digital rights management (DRM) related researches are widely spreading with prosperity of IT industries. The DRM technology protects proprietor of copyright by preventing mischanneling and illegal copy. In this paper, we propose a new DRM model that has an enhanced and efficient protocol based on certificate using smart card. The proposed model overcomes weaknesses of WCDRM model and has following additional advantages: first, copy protection is enhanced by hiding user's specific information from attacker by storing the information within smart card; second, server load for contents encryption is reduced by making clear protocols among author, distributer, certificate authority, and users; third, offline user authentication is guaranteed by combining partial secret values in media players and smart card. Exposure of core information also is minimized by storing them in smart card. In addition, we show that the proposed system is more secure than WCDRM model by comparing various factors of anonymous attackers.

Design and Implementation of a Web Security System using a Chaos Cipher Algorithm (카오스 암호화 알고리즘을 이용한 웹 보안 시스템 설계 및 구현)

  • Lee, Bong-Hwan;Kim, Cheol-Min;Yun, Dong-Won;Chae, Yong-Ung;Kim, Hyeon-Gon
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.585-596
    • /
    • 2001
  • In this paper, a new stream cipher algorithm based on the chaos theory is proposed and is applied to a Web security system. The Web security system is composed of three parts: certificate authority (CA), Web client, and Web server. The Web client and server system include a secure proxy client (SPC) and a secure management server (SMS), respectively, for data encryption and decryption between them. The certificate is implemented based on X.509 and the RSA public key algorithm is utilized for key creation and distribution to certify both the client and server. Once a connection is established between the client and server, outgoing and incoming data are encrypted and decrypted, respectively, using one of the three cipher algorithms: chaos, SEED, and DES. The proposed chaos algorithm outperforms the other two conventional algorithms in processing time and complexity. Thus, the developed Web security system can be widely used in electronic commerce (EC) and Internet banking.

  • PDF