• Title/Summary/Keyword: EC Security

Search Result 90, Processing Time 0.027 seconds

An Implementation of 128bit Block Cipher Algorithm for Electronic Commerce (전자상거래를 위한 128비트 블록 암호 알고리즘의 구현)

  • 서장원;전문석
    • The Journal of Society for e-Business Studies
    • /
    • v.5 no.1
    • /
    • pp.55-73
    • /
    • 2000
  • Recently; EC(Electronic Commerce) is increasing with high speed based on the expansion of Internet. EC which is done on the cyber space through Internet has strong point like independence from time and space. On the contrary, it also has weak point like security problem because anybody can access easily to the system due to open network attribute of Internet. Therefore, we need the solutions that protect the security problem for safe and useful EC activity. One of these solutions is the implementation of strong cipher algorithm. NC(Nonpolynomial Complete) cipher algorithm proposed in this paper is good for the security and it overcome the limit of current 64bits cipher algorithm using 128bits key length for input, output and encryption key, Moreover, it is designed for the increase of calculation complexity and probability calculation by adapting more complex design for subkey generation regarded as one of important element effected to encryption. The result of simulation by the comparison with other cipher algorithm for capacity evaluation of proposed NC cipher algorithm is that the speed of encryption and decryption is 7.63 Mbps per block and the speed of subkey generation is 2,42 μ sec per block. So, prosed NC cipher algorithm is regarded as proper level for encryption. Furthermore, speed of subkey generation shows that NC cipher algorithm has the probability used to MAC(Message Authentication Code) and block implementation of Hash function.

  • PDF

A Study on Web Security using NC Cipher System (NC 암호시스템을 이용한 웹 보안에 관한 연구)

  • 서장원;전문석
    • Proceedings of the IEEK Conference
    • /
    • 2000.11c
    • /
    • pp.55-58
    • /
    • 2000
  • EC, which is done the virtual space through Web, has weakly like security problem because anybody can easily access to the system due to open network attribute of Web. Therefore, we need the solutions that protect the Web security for safe and useful EC. One of these solutions is the implementation of a strong cipher system. NC(Nonpolynomial Complete) cipher system proposed in this paper is advantage for the Web security and it overcomes the limit of the 64 bits cipher system using 128 bits key length for input, output, encryption key and 16 rounds. Moreover, it is designed for the increase of time complexity by adapted more complex design for key scheduling regarded as one of the important element effected to encryption.

  • PDF

Design of YK2 Cipher Algorithm for Electronic Commerce Security (전자상거래 보안을 위한 YK2 암호 알고리즘 설계)

  • Kang, Young-Ku;Rhew, Sung-Yul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3138-3147
    • /
    • 2000
  • EC(Electronic Commerce) which is cone the virtual space through Internet, has the advantage of time and space. On the contrary, it also has weak point like security probelm because anybody can easily access to the system due to open network attribute of Internet. Theretore, we need the solutions that protect the EC security problem for safe and useful EC activity. One of these solution is the implemonlation of a strong cipher algorithm. YK2(YoungKu Kang) cipher algorithm proposed in this paper is advantage for the EC security and it overcomes the limit of the current 6/1 bits block cipher algorithm using 128 bits key length for input, output, encryption key and 32 rounds. Moreover, it is degigned for the increase of time complexity and probability calculation by adapting more complex design for key scheduling regarded as one of the important element effected to enciyption.

  • PDF

A Study on Valuation of Security Property in Electronic Commerce (전자상거래에 있어서 보안성의 가치추정에 관한 연구)

  • Kim, Min-Cheol;Noh, Kyoo-Sung
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.615-620
    • /
    • 2001
  • This paper is a study on the model that measures economic values for the non-market properties of Electronic Commerce(EC). For development of this model, first of all, we reviewed the properties of EC service, and looked around the relation between customer satisfaction and/or payment value and EC properties. In addition, we checked the method to measure economic values of these properties. This measurement method is the contingent valuation method which is a method of measuring the value of the environmental product. We modified it to adapt to the EC. Finally, in this paper, we proposed an economic value model which measures the value of willingness to pay(WTP) to our objectives. However, there could be some restrictions at the time when surveying empirically. Therefore, the succeeding study should be done in order to improve these restrictions some day.

  • PDF

A Study on EC-Signcryption providing efficient message decryption for Electronic Payment System (전자지불시스템에서 사용 가능한 효율적인 메시지 복호화를 제공하는 EC-Signcryption에 관한 연구)

  • 김수연;김근옥;이승우;김현주;원동호
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.248-252
    • /
    • 2003
  • 최근 전자상거래의 발달로 전자화폐의 사용이 증가하고, 이에 전자결제의 안전한 처리를 위한 전자서명의 생성 및 검증과 메시지의 암호화와 복호화 등의 효율적인 연산이 필요하게 되었다 더욱이 전자상거래가 무선통신 환경으로 확대되며, 적은 메모리 용량을 사용해서 빠른 연산을 수행하고, 적은 통신량을 보장해야 하는 요구사항 등이 증가함에 따라, 이러한 제약사항을 지원할 수 있는 방식이 요구된다. 이러한 전자상거래의 전자지불시스템의 제약사항은 메시지 인증과 은닉성을 동시에 효율적으로 제공하면서 계산량과 통신비용을 줄인 기법인 signcryption 개념과 계산상 효율적인 ECC 기반의 연산을 수행하여 해결 가능하다. 간 논문에서는 기존의 signcryption 방식을 분석하고 문제점을 도출하여, 통신의 각 객체의 비밀정보를 사용한 일차 다항식으로 메시지 복호화를 제공하는 효율적인 EC-Signcryption 방식을 제안한다.

  • PDF

Analysis of Components Endangering Information Protection in CALS/EC (전자상거래상에서의 정보보호 위협요소 분석에 관한 연구)

  • Kang Suck-Joo;Kim Chang-Tae
    • Management & Information Systems Review
    • /
    • v.4
    • /
    • pp.1-28
    • /
    • 2000
  • CALS(Commerce At Light Speed)/EC(Electronic Commerce) is drawing considerable interest as strategic part of efforts for computerization of the government and companies and for industry-wide innovation, using Internet and information superhighway that is widely expanding world-wide with the development of computers and information communication technology. In the current industry infrastructure, standardization is difficult but very important among the parties that want to share the added value, as external environmental components increase since the advent of computers. However, information security technology is not permitted to be exported in light of national interest or high amount of royalty should be paid. Moreover, if we cannot fully analyze the international standard and imported technology in order to verify the safety of using them, domestic information can be exposed according to the desire of the country exporting the technology. In particular, information security technology should be developed by ourselves, considering technology Protection and export Prevention Policies of foreign countries. Therefore, this paper presents information security technology and standardization trends for several application fields regarding CALS/EC implementation in our and foreign countries. This paper also analyzes such trends and proposes strategic direction for standardization suited for domestic environment.

  • PDF

Business Process Models for the Implementation and Operation of Internet Shopping Mall (인터넷 쇼핑몰 구축 및 운영을 위한 비즈니스 프로세스 모델)

  • 김형수;김중인
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.3
    • /
    • pp.95-118
    • /
    • 1999
  • There have been many research papers and practical implementations on the various EC(Electronic Commerce) aspects such as merchant system, security, payment gateway, legal and policy issues. However, it is very hard to find the systematic approaches and business process models from the viewpoint of the company willing to start B2C(Business-To-Customer) EC. Therefore, we develop business process models for the planning, systems analysis and design, implementation, and operation of internet shopping mall to suggest a guideline and reference model for the realization of successful B2C EC.

  • PDF

The Design of NPC Encryption Algorithms for Electronic Commerce (전자상거래를 위한 NPC 암호 알고리즘 설계)

  • 김재각;전문석
    • The Journal of Society for e-Business Studies
    • /
    • v.6 no.2
    • /
    • pp.159-166
    • /
    • 2001
  • EC(Electronic Commerce) is increasing with high speed based on the expansion of Internet. EC which is done through Internet has strong point like independence from time and space, On the contrary, it also has weak point like security problem because anybody can access easily to the system due to open network attribute of Internet. Therefore, we need the solutions that protect the security problem for safe and useful U activity, One of these solutions is the implementation of strong cipher algorithm. NPC(Non-Polynomial Complete) cipher algorithm proposed in this paper is good for the security and it overcome the limit of current 64bits cipher algorithm using 256bits key for input output and encryption key, Moreover, it is designed for the increase of calculation complexity and probability calculation by adapting more complex design for subkey generation regarded as one of important element effected to encryption.

  • PDF

RFID Authenticated Encryption Scheme of Multi-entity by Elliptic Curve's Coordinates (타원곡선 좌표계를 이용한 RFID 다중객체 간 인증 암호기법)

  • Kim, Sung-Jin;Park, Seok-Cheon
    • Journal of Internet Computing and Services
    • /
    • v.9 no.3
    • /
    • pp.43-50
    • /
    • 2008
  • Authenticated Encryption scheme in RFID system is the important issue for ID security. But, implementing authenticated Encryption scheme in RFID systems is not an easy proposition and systems are often delivered for reasons of complexity, limited resources, or implementation, fail to deliver required levels of security. RFID system is so frequently limited by memory, performance (or required number of gates) and by power drain, that lower levels of security are installed than required to protect the information. In this paper, we design a new authenticated encryption scheme based on the EC(Elliptic Curve)'s x-coordinates and scalar operation. Our scheme will be offers enhanced security feature in RFID system with respect to user privacy against illegal attack allowing a ECC point addition and doubling operation.

  • PDF

CALS/EC Security Framework considering OECD Cryptography Guidelines (OECD 암호정책을 수용한 CALS/EC 보안 기술 체계)

  • 임신영;유창열;송유진;함호상
    • Proceedings of the CALSEC Conference
    • /
    • 1997.11a
    • /
    • pp.143-160
    • /
    • 1997
  • 정보화 사회에서 개인의 프라이버시와 국가 차원의 보안의 균형있는 발전은 매우 중요한 과제이며, 1997년 3월 국제 경제개발 협력기구(OECD)는 암호기능을 적용하기 위한 정책인 ‘OECD 암호정책’을 수립하였으며, 이 지침의 특기할 점은 암호화된 데이터를 국가 등의 제 3자가 강제적으로 해독하는 것을 인정하였다는 것이다. 이러한 OECD 암호정책은 공공의 안전성 확보에 필요한 조치임과 동시에 개인 프라이버시 침해의 위험을 내포한 암호정책으로 세계를 상대로한 CALS/EC 산업에 이러한 기술이 표준화되어 적용될 가능성이 높기 때문에 향후 국내의 CALS/EC 보안 서비스 제공시 중요한 지침이 될 것이다. 본 논문에서는 CALS/EC 보안 서비스를 실현하기 위하여 연구 개발해야 할 보안 기술 중 암호문의 강제 해독 기술 및 인중 기술을 포함한 보안 프레임워크를 제안한다.

  • PDF