• 제목/요약/키워드: Digital Authentication

검색결과 572건 처리시간 0.026초

모바일 환경에서 안전한 일회용 패스워드 인증 (Secure One-Time Password Authentication in Mobile Environments)

  • 김동률
    • 디지털융복합연구
    • /
    • 제11권12호
    • /
    • pp.423-430
    • /
    • 2013
  • 인터넷을 이용한 전자상거래 및 금융 분야가 활성화되어 사용자와 서비스 제공자들 간의 상호 인증이 매우 중요해졌다. ID와 패스워드 기반의 인증은 보안성이 낮기 때문에 일회용 패스워드 인증방식이 많이 사용되고 있다. 기존의 일회용 패스워드 인증방식인 S/Key 인증방식은 평문 전송 외에 여러 문제점이 있고, 김홍기 등의 방식은 세션 키의 생성 및 분배 방법에 관한 제시가 없다는 문제점이 있다. 본 논문에서는 이러한 문제점을 해결하기 위한 프로토콜을 제안하였다.

퍼지추출 기술을 활용한 스마트 카드 기반 패스워드 인증 스킴 (Smart Card Based Password Authentication Scheme using Fuzzy Extraction Technology)

  • 최윤성
    • 디지털산업정보학회논문지
    • /
    • 제14권4호
    • /
    • pp.125-134
    • /
    • 2018
  • Lamport firstly suggested password base authentication scheme and then, similar authentication schemes have been studied. Due to the development of Internet network technology, remote user authentication using smart card has been studied. Li et al. analyzed authentication scheme of Chen et al. and then, Li et al. found out the security weakness of Chen et al.'s scheme such forward secrecy and the wrong password login problem, and proposed an a new smart card based user password authentication scheme. But Liu et al. found out that Li et al.'s scheme still had security problems such an insider attack and man-in-the-middle attack and then Liu et al. proposed an efficient and secure smart card based password authentication scheme. This paper analyzed Liu et al.'s authentication and found out that Liu et al.'s authentication has security weakness such as no perfect forward secrecy, off-line password guessing attack, smart-card loss attack, and no anonymity. And then, this paper proposed security enhanced efficient smart card based password authentication scheme using fuzzy extraction technology.

지문인식 기반의 전자의무기록 시스템 인증 모델 (An Authentication Model based Fingerprint Recognition for Electronic Medical Records System)

  • 이용준
    • 정보처리학회논문지C
    • /
    • 제18C권6호
    • /
    • pp.379-388
    • /
    • 2011
  • 의료정보는 환자에게 중요한 개인정보로써 반드시 보호돼야 한다. 특히 전자의무기록에 접근할때, 의료인의 강화된 신원확인에 대한 인증방식이 필요하다. 기존의 공인인증서 기반 인증모델은 개인키 관리, 권한위임 등 문제점으로 전자의무기록의 특성을 반영하지 못했다. 본 논문에서는 전자의무기록 시스템에 의료인이 접근하는 경우 지문인식 기반 인증 모델을 적용하여 강화된 인증방식을 제안한다. 전자의무기록의 지문인증 모델은 의료업무의 특성을 반영하여 개인키 관리, 권한위임 문제를 원천적으로 해결하였다.

VoIP 시스템에서 SIP를 이용한 보안 인증기법에 관한 연구 (A Study on the Secure Authentication Method using SIP in the VoIP System)

  • 이영구;김정재;박찬길
    • 디지털산업정보학회논문지
    • /
    • 제7권1호
    • /
    • pp.31-39
    • /
    • 2011
  • VoIP service uses packet network of ip-based because that has eavesdropping, interception, illegal user as vulnerable elements. In addition, PSTN of existing telephone network is subordinate line but VoIP service using the ip packet provide mobility. so The user authentication and VoIP user's account service using VoIP has emerged as a problem. To solve the vulnerability of SIP, when you use VoIP services with SIP, this paper has made it possible to authenticate user's terminal by using proxy server and proxy server by using authentication server. In conclusion, sender and receiver are mutually authenticated. In the mutual authentication process, the new session key is distributed after exchanging for the key between sender and receiver. It is proposed to minimize of service delay while the additional authentication. The new session key is able to authenticate about abnormal messages on the phone. This paper has made it possible to solve the vulnerability of existing SIP authentication by using mutual authentication between user and proxy server and suggest efficient VoIP service which simplify authentication procedures through key distribution after authentication.

다양한 장치에서 JWT 토큰을 이용한 FIDO UAF 연계 인증 연구 (A Study on FIDO UAF Federated Authentication Using JWT Token in Various Devices)

  • 김형겸;김기천
    • 디지털산업정보학회논문지
    • /
    • 제16권4호
    • /
    • pp.43-53
    • /
    • 2020
  • There are three standards for FIDO1 authentication technology: Universal Second Factor (U2F), Universal Authentication Framework (UAF), and Client to Authenticator Protocols (CTAP). FIDO2 refers to the WebAuthn standard established by W3C for the creation and use of a certificate in a web application that complements the existing CTAP. In Korea, the FIDO certified market is dominated by UAF, which deals with standards for smartphone (Android, iOS) apps owned by the majority of the people. As the market requires certification through FIDO on PCs, FIDO Alliance and W3C established standards that can be certified on the platform-independent Web and published 『Web Authentication: An API for Accessing Public Key Credentials Level 1』 on March 4, 2019. Most PC do not contain biometrics, so they are not being utilized contrary to expectations. In this paper, we intend to present a model that allows login in PC environment through biometric recognition of smartphone and FIDO UAF authentication. We propose a model in which a user requests login from a PC and performs FIDO authentication on a smartphone, and authentication is completed on the PC without any other user's additional gesture.

Performance Analysis of Authentication Protocols of GPS, Galileo and BeiDou

  • Jeon, Da-Yeon;Gaybullaev, Turabek;Noh, Jae Hee;Joo, Jung-Min;Lee, Sang Jeong;Lee, Mun-Kyu
    • Journal of Positioning, Navigation, and Timing
    • /
    • 제11권1호
    • /
    • pp.1-9
    • /
    • 2022
  • Global Navigation Satellite System (GNSS) provides location information using signals from multiple satellites. However, a spoofing attack that forges signals or retransmits delayed signals may cause errors in the location information. To prevent such attacks, authentication protocols considering the navigation message structure of each GNSS can be used. In this paper, we analyze the authentication protocols of Global Positioning System (GPS), Galileo, and BeiDou, and compare the performance of Navigation Message Authentication (NMA) of the above systems, using several performance indicators. According to our analysis, authentication protocols are similar in terms of performing NMA and using Elliptic Curve Digital Signature Algorithm (ECDSA). On the other hand, they are different in several ways, for example, whether to perform Spreading Code Authentication (SCA), whether to use digital certificates and whether to use Timed Efficient Stream Loss-tolerant Authentication (TESLA). According to our quantitative analysis, the authentication protocol of Galileo has the shortest time between authentications and time to first authenticated fix. We also show that the larger the sum of the navigation message bits and authentication bits, the more severely affected are the time between authentications and the time to first authenticated fix.

무선 환경에서 XML 전자서명을 이용한 Java Card 기반 시스템 (System based on Java Card Using XML Digital Signature on Wireless Internet)

  • 장창복;최의인
    • 정보처리학회논문지C
    • /
    • 제12C권1호
    • /
    • pp.37-44
    • /
    • 2005
  • 무선 인터넷의 발전과 무선 단말기의 성능이 발달함에 따라 무선 인터넷 환경에서의 전자상거래(M-Commerce)가 활성화되고 있다. 이러한 전자상거래에서는 사용자 인중 기술과 데이터 보안이 중요한 기술로 인식되고 있으며, 무선 인터넷에서의 WPKI나 Hermes 시스템, 유선 인터넷 환경에서의 XML 전자서명 같은 인중 기술이 연구되고 있다. 하지만 WPKI는 인증 시스템들이 서로 이질적이라 구현하기 어렵고 유선 인터넷의 인중 시스템과 상호 연동가능하지 않으며, XML 전자서명을 지원하지 않는 단점을 지니고 있다. Hermes 시스템 역시 XML 전자서명 시스템과 상호 연동 가능하지 않는 문제점이 존재한다. 따라서 본 논문에서는 무선 인터넷 환경에서도 기존의 유선 인터넷 환경에서 사용되고 있는 XML 전자서명 기법을 이용하여 유, 무선 환경에서 전자서명할 수 있는 Mediator를 설계한 뒤, Java Card를 이용하여 시스템을 설계 및 구현하였다.

MANET에서 노드들의 신뢰 검증 향상을 위한 3-tiers 인증 기법 연구 (A Study on 3-tiers Authentication Scheme for Improving the Confidence Verification of Nodes in the MANET)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제9권1호
    • /
    • pp.87-93
    • /
    • 2013
  • MANET has the advantage of having the flexibility to build easily a network in a difficult situation that builds a wired network. But, data transmission errors by movement of nodes and eavesdropping by wireless communications have become a problem of security. Authentication service is the most essential in order to overcome these problems and operate network stably. In this paper, we propose 3-tiers authentication structure to exclude of malicious node and operate stable network through more systematic and thorough node authentication. After network is composed into a cluster, cluster head which play CA role is elected. Among these, the highest-CA is elected. The highest-CA receives certificates to cluster head and the cluster head evaluates trust value of their member nodes. Authentication technique which issues member node key is used. We compared PSS and experimented to evaluate performance of proposed scheme in this paper and efficiency of the proposed technique through experience was confirmed.

MANET에서 멀티캐스트 보안을 위한 효율적인 그룹 멤버 인증 및 키 관리 기법 연구 (A Study on Efficient Group Member Authentication and Key Management Scheme for Multicast Security in MANET)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제13권4호
    • /
    • pp.115-123
    • /
    • 2017
  • The mutual cooperation among nodes is very important because mobile nodes participating in MANET communicate with limited resources and wireless environment. This characteristic is important especially in environment that supports group communication. In order to support the secure multicast environment, it is important enough to affect performance to provide accurate authentication method for multicast group members and increase the integrity of transmitted data. Therefore, we propose a technique to provide the multicast secure communication by providing efficient authentication and group key management for multicast member nodes in this paper. The cluster structure is used for authentication of nodes in the proposed technique. In order to efficient authentication of nodes, the reliability is measured using a combination of local trust information and global trust information measured by neighboring nodes. And issuing process of the group key has two steps. The issued security group key increases the integrity of the transmitted data. The superiority of the proposed technique was confirmed by comparative experiments.

A Study on Extraction and Comparison of Digital Content Key Frame in UCC Service Environment

  • Jang, Eun-Gyeom
    • 한국멀티미디어학회논문지
    • /
    • 제14권8호
    • /
    • pp.1020-1028
    • /
    • 2011
  • In this paper, we proposed a mechanism that prevents indiscreet use of digital contents, verifies created content's copyrights to provide services to granted user and protects digital contents by law by authenticating the original digital content whenever an infringement of copyright occurs in UCC environments. The proposed mechanism uses specific information and features of contents as copyrights authentication information without additional information. Also, provides the fact of violation by inferring the modification of the original digital contents. That means this mechanism infers same or similar value from the contents; fraudulent use of content, modification of content color, modification of content format, modification of content resolution and illegal use of frame not principal key frame. In that point, we found that the inferred value from the content differed according to features of content modification.