• Title/Summary/Keyword: Digital Signature

Search Result 488, Processing Time 0.028 seconds

A study on the new developmental direction for Intelligent Network Service (지능망서비스의 발전방향에 관한 연구)

  • 박민수;최수길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.05a
    • /
    • pp.43-49
    • /
    • 2000
  • That modem society is an information society, information society has placed a high value on information and knowledge. Therefore, modem civilization depends largely on information and knowlege so the most valuable sources of all intelligence activities. This paper was studied on the new developmental direction for intelligent network service. The results of this study is as follow: first, intelligent network service must be systematic development. Second, intelligent network service must be promoted, presenting the development and establishment direction in future society. Third, intelligent network service must be able to unify ail the networks. Fourth, intelligent network service must be development for customers. Fifth, the cost of intelligent network service is determined by Telecommunication Reguration Commission. Sixth, the number system of intelligent network service must be accomplished by number system for future

  • PDF

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

RMCS Plan and the Embodiment for the Home Network Service which is Safeent (안전한 Home Network 서비스를 위한 RMCS 설계 및 구현)

  • Sun, Jae-Hoon;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.19-27
    • /
    • 2005
  • As home network is increasing to use, home network industry is developing too. Also, it is to be a popular subject in the network's topics. In this reasons, home network become a important thing because home gateway function is working between access network and home network. In the home network, it relates on the personal computer, home pad, and digital television. But, home gateway is not prepared standard point about techniques. Therefore, many kind of technique want to try for developing of home gateway's functions. Usually, we use ID/PASSWORD method in network control system. But, we found a lot of problems about classical network system while we experienced Jan/25 big trouble. We are considering about that home network system are using same network net. Therefore, seriously we have to check about security and safety at the home network's environment. This report focus on the home network's environment to control for using and efficiency and then it wants to find ways to protect from the internal and external attacks. Existing ID/PASSWORD method it used a electronic signature and the security against the approach from of external watch, the MIB structure of role base and the security of the Home network which leads the authority control which is safe even from the Home network inside it strengthened it used compared to it proposed.

  • PDF

Importance and Management of the Laboratory Notebooks in the Research Record (연구기록물 중 연구노트의 중요성과 관리 제도화)

  • Kim, Sang-Jnu
    • Journal of Information Management
    • /
    • v.39 no.2
    • /
    • pp.45-74
    • /
    • 2008
  • The purpose of this study was to promote the understanding of laboratory notebook's record characteristics through getting a line on the importance of the notebooks which have record, information, communication, and proof functions. To improve the research ethics and cultures, this study was examined and investigated by literature references and survey results. This study analyzed the status of the notebooks in part of laboratory information system of the R&D institutes, paper notebooks for laboratory records management, and the introduction of ELN for digital record. For the notebook's institutionalization, more review is needed to the possibility of involvement in the conflict, evidential requisite and signature by inspector, the limitation of autonomous policy for the notebook's operation, the difficulty of preservation for 30 years, the introduction of ELN and utilization for the notebooks. To improve management and institutionalization for the notebooks, it is needed to the notebook's record for knowledge management and evidential values, support and budget for the notebook's management department, researcher's recognition conversion for the notebooks related to the intellectual property and technology transference, the record method train for the notebooks from the university classes, and the introduction of ELN related to the laboratory information management system or project management system.

(An HTTP-Based Application Layer Security Protocol for Wireless Internet Services) (무선 인터넷 서비스를 위한 HTTP 기반의 응용 계층 보안 프로토콜)

  • 이동근;김기조;임경식
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.377-386
    • /
    • 2003
  • In this paper, we present an application layer protocol to support secure wireless Internet services, called Application Layer Security(ALS). The drawbacks of the two traditional approaches to secure wireless applications motivated the development of ALS. One is that in the conventional application-specific security protocol such as Secure HyperText Transfer Protocol(S-HTTP), security mechanism is included in the application itself. This gives a disadvantage that the security services are available only to that particular application. The other is that a separate protocol layer is inserted between the application and transport layers, as in the Secure Sockets Layer(SSL)/Transport Layer Security(TLS). In this case, all channel data are encrypted regardless of the specific application's requirements, resulting in much waste of network resources. To overcome these problems, ALS is proposed to be implemented on top of HTTP so that it is independent of the various transport layer protocols, and provides a common security interface with security applications so that it greatly improves the portability of security applications. In addition, since ALS takes advantages of well-known TLS mechanism, it eliminates the danger of malicious attack and provides applications with various security services such as authentication, confidentiality integrity and digital signature, and partial encryption. We conclude this paper with an example of applying ALS to the solution of end-to-end security in a present commercial wireless protocol stack, Wireless Application Protocol.

A Pilot Study on Environmental Understanding and Estimation of the Nak-Dong River Basin Using Fuyo-1 OPS Data (Fuyo-1 OPS 자료를 이용한 낙동강 하류지역의 환경계측 시고)

  • Kim, Cheon
    • Korean Journal of Remote Sensing
    • /
    • v.12 no.2
    • /
    • pp.169-198
    • /
    • 1996
  • The objectives of this investigation are : 1. To analyze spectral signature and the associated vegetation index for geometric illumination conditions inf1uenced by low solar elevation and high slope orientations in mountainous forest. 2. To assess the accuracy of the spectral angle mapper classification for the a winter land cover in comparison with the maximum likelihood classification. 3. To produce the image of water quality and water properties that could be used to estimate the water pollution sources and the tide-included by turbid water in estuarine and coastal areas. These objectives are to characterize environmental and ecological monitoring applications of the Nak-Dong River Basin by using Fuyo-1 OPS VNIR data acquired on December 26, 1992. The results of this paper are as follows : 1. The spectral digital numbers and vegetation indexes (NDVI and TVI) of mountainous forest are higher on the slope facing the sun than on the slope hidden the sun under low sun elevation condition. 2. The spectral angle mapper algorithm produces a more accurate land cover classification of areas with steep slope, various aspects and low solar elevation than the maximum likelihood classifier. 3. The maximum likelihood classification images can be used for identifying the location and movement of both freshwater and salt water, regardless of geometric illumination conditions. 4. The color-coded density sliced image of selected water bodies by using the near-infrared band 3 can provide distribution of the water quality of the Lower Nak-Dong River. 5. The color-coded normalized difference vegetation index image of the selected mountain forest is suitable to classify winter vegetation cover types, i.e., forest canopy densities for slope orientations.

Proposal and Analysis of Primality and Safe Primality test using Sieve of Euler (오일러체를 적용한 소수와 안전소수의 생성법 제안과 분석)

  • Jo, Hosung;Lee, Jiho;Park, Heejin
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.438-447
    • /
    • 2019
  • As the IoT-based hyper-connected society grows, public-key cryptosystem such as RSA is frequently used for encryption, authentication, and digital signature. Public-key cryptosystem use very large (safe) prime numbers to ensure security against malicious attacks. Even though the performance of the device has greatly improved, the generation of a large (safe)prime is time-consuming or memory-intensive. In this paper, we propose ET-MR and ET-MR-MR using Euler sieve so it runs faster while using less memory. We present a running time prediction model by probabilistic analysis and compare time and memory of our method with conventional methods. Experimental results show that the difference between the expected running time and the measured running time is less than 4%. In addition, the fastest running time of ET-MR is 36% faster than that of TD-MR, 8.5% faster than that of DT-MR and the fastest running time of ET-MR-MR is 65.3% faster than that of TD-MR-MR and similar to that of DT-MR-MR. When k=12,381, the memory usage of ET-MR is 2.7 times more than that of DT-MR but 98.5% less than that of TD-MR and when k=65,536, the memory usage of ET-MR-MR is 98.48% less than that of TD-MR-MR and 92.8% less than that of DT-MR-MR.

$AB^2$ Semi-systolic Architecture over GF$GF(2^m)$ ($GF(2^m)$상에서 $AB^2$ 연산을 위한 세미시스톨릭 구조)

  • 이형목;전준철;유기영;김현성
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.45-52
    • /
    • 2002
  • In this contributions, we propose a new MSB(most significant bit) algorithm based on AOP(All One Polynomial) and two parallel semi-systolic architectures to computes $AB^2$over finite field $GF(2^m)$. The proposed architectures are based on standard basis and use the property of irreducible AOP(All One Polynomial) which is all coefficients of 1. The proposed parallel semi-systolic architecture(PSM) has the critical path of $D_{AND2^+}D_{XOR2}$ per cell and the latency of m+1. The modified parallel semi-systolic architecture(WPSM) has the critical path of $D_{XOR2}$ per cell and has the same latency with PSM. The proposed two architectures, PSM and MPSM, have a low latency and a small hardware complexity compared to the previous architectures. They can be used as a basic architecture for exponentiation, division, and inversion. Since the proposed architectures have regularity, modularity and concurrency, they are suitable for VLSI implementation. They can be used as a basic architecture for algorithms, such as the Diffie-Hellman key exchange scheme, the Digital Signature Algorithm(DSA), and the ElGamal encryption scheme which are needed exponentiation operation. The application of the algorithms can be used cryptosystem implementation based on elliptic curve.