• Title/Summary/Keyword: EKE

Search Result 38, Processing Time 0.022 seconds

AUTHENTICATION PROTOCOL: METHODS REVIEW

  • Cahyo Crysdian;Abdullah, Abdul-Hanan
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.242-245
    • /
    • 2002
  • Authentication protocol as a part of security system has been growth rapidly since it was known that sending clear text password in the network is unsecured. Many protocols could be noted proposed to strengthen the authentication process. In 1985 an attempt to safeguard network services within Athena project resulting on the born of Kerberos 〔1〕〔8〕, one of the protocol that has a lot of attention from the research community. Several years later researchers were discovered some weaknesses carried by this protocol 〔2〕〔21〕. In 1992. EKE was introduced by Bellovin and Merrit. Since that time, many protocols introduced could be considered as its variant 〔5〕〔9〕〔13〕〔14〕. Some other protocols such as OKE〔5〕 and SRP〔18〕 although claimed different from EKE, they have the same basic mechanism in holding authentication process. Here, we explain the mechanism of those protocols, their strength and their weaknesses and shortcomings. Due to the limitations of the number of paper pages, only two types of authentication protocol can be explained here i.e EKE and SRP.

  • PDF

Variability of Mesoscale Eddies in the Pacific Ocean Simulated by an Eddy Resolving OGCM of $1/12^{\circ}$

  • Yim B.Y.;Noh Y.;You S.H.;Yoon J.H.;Qiu B.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2006.05a
    • /
    • pp.133-136
    • /
    • 2006
  • The mesoscale eddy field in the North Pacific Ocean, simulated by a high resolution eddy-resolving OGCM ($1/12^{\circ}C$ horizontal resolution), was analyzed, and compared with satellite altimetry data of TOPEX/Poseidon. High levels of eddy kinetic energy (EKE) appear near the Kurosho, North Equatorial Current (NEC), and Subtropical Countercurrent (STCC) in the western part of the subropical gyre. In particlure, it was found that the EKE level of the STCC has a well-defined annual cycle, but no distinct annual cycle of the EKE exists in any other zonal current of the North Pacific Ocean.

  • PDF

Three-Party Key Exchange Protocol based Verifier (검증자 기반의 Three-Party키 교환 프로토콜)

  • 김해문;최영근;김순자
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.784-786
    • /
    • 2003
  • 패스워드 기반 키 교환 프로토콜은 참여자들이 쉽게 기억할 수 있는 자신의 패스워드를 사용하므로 단순성, 편리성, 이동성의 장점 때문에 광범위하게 사용된다. 2000년에 Lin, Sun, Hwang[1]이 Steiner, Tsudik, Waidner[2]가 제안한 three-party EKE 프로토콜(STW-3PEKE)이 패스워드 추측 공격에 취약함을 증명하고 이를 개선한 서버의 공개키를 이용한 새로운 three-party EKE 프로토콜(LSH-3PEKE)을 제안했다. 2001년에는 Lin, Sun, Steiner, Hwang[3]이 서버의 공개키를 사용하지 않는 새로운 three-party EKE 프로토콜(LSSH-3PEKE)을 제안했다. 본 논문에서는 검증자(verifier) 기반 즉 서버가 사용자의 패스워드를 저장하지 않고 패스워드에 의해 생성되는 검증자를 가지는 프로토콜을 제안하며 이전에 제안한 프로토콜의 안전성을 그대로 유지하면서 좀 더 간단하며 효율적인 프로토콜을 제시한다.

  • PDF

OTP-EKE: A Key Exchange Protocol based on One-Time-Password (OTP-EKE:원-타임-패스워드 기반의 키 고환 프로토콜)

  • Seo, Seung-Hyun;Cho, Tae-Nam;Lee, Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.5
    • /
    • pp.291-298
    • /
    • 2002
  • Mutual authentication is essential for key exchange protocols and password-based authentication scheme is used widely, which is convenient to users and executed on the cheap. Password-based protocol should be not only secure against attach but also efficient to reduce user's load. In this paper, we propose a new key exchange protocol, called OTP-EKE(One Time Password based Encrypted Key Exchange), to provide authentication and to share a session key between a server and a user. We choose a password-based scheme as a user authentication. Especially, we use a one-time-password verifier and server's public password to protect against attacks on server's directory. As for efficiency, we improve the performance by reducing the number of modular exponentiations and the number of rounds.

Formal Methodology for Safety Analysis of Security Protocols (보안 프로토콜의 안전성 분석을 위한 정형적 방법론)

  • Kim Il-Gon;Jeon Chul-Wuk;Kim Hyun-Seok;Choi Jin-Young;Kang In-Hye
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.17-27
    • /
    • 2005
  • With the development of wire and wireless based networks, a various security protocols have been proposed to protect important resources and user information against attackers. However, many security protocols have found oかy to be later vulnerable to attacks. In this Paper, we introduce the formal methodology to verify the safety of security protocols in the design phase, and we take advantage of the formal methodology which uses Casper/CSP and FDR tools by introducing the verification example of EKE protocol and BCY protocol. Lastly, we propose a new BCY protocol after verifying it's safety.

Remark on the Security of Password Schemes (패스워드 인증 키교환 프로토콜의 안전성에 관한 고찰)

  • 이희정
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.161-168
    • /
    • 2003
  • We discuss the security of two famous password authenticated key exchange protocols, EKE2 and PAK. We introduce ′insider assisted attack′ Based on this assumption we point out weakness of the security of EKE2 and PAK protocols. More precisely, when the legitimate user wants to find other user′s password, called "insider-assisted attacker", the attacker can find out many ephemeral secrets of the server and then after monitoring on line other legitimate user and snatching some messages, he can guess a valid password of the user using the previous information. Of course for this kind of attack there are some constraints. Here we present a full description of the attack and point out that on the formal model, one should be very careful in describing the adversary′s behavior.

Authenticated Key Exchange Protocol for the Secure Communication (안전한 암호 통신을 위한 키교환 프로토콜)

  • Seo, Hwa-Jeong;Kim, Ho-won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1083-1085
    • /
    • 2010
  • 상호간의 보안 통신을 위해서는 서로간의 안전한 비밀키 교환이 이루어져야 한다. 이를 보장하기 위해서는 안전한 키교환 프로토콜이 사용되어야 한다. 키교환 프로토콜은 안전성을 보장함과 동시에 키의 신선도와 확신에 대한 요구사항을 모두 만족시켜야한다. 현재 대표적인 키교환 프로토콜인 Diffie-Hellman을 기본으로 하는 다양한 프로토콜이 연구 및 개발되고 있다. 최근에 연구된 EKE-E(Encrypted Key Exchange-Efficient) 프로토콜은 Diffie-Hellman 알고리즘을 통한 키교환을 제공하며 man-in-the-middle공격과 오프라인 사전공격에 대한 안정성을 보장한다. 하지만 재전송 공격에 취약성을 가진다. 본 논문에서는 최근에 제안된 키교환 프로토콜인 EKE-E의 안전성을 만족하며 재전송공격에 안전한 프로토콜을 제안한다. 동시에 연산을 줄여 보다 성능을 향상시킨다.

Magneto-optical and optical properties of Fe-Au alloy films in a wide composition range

  • Hyun, Y.H.;Kim, C.O.;Lee, Y.P.;Kudryavtsev, Y.V.;Gontarz, R.;Kim, K.W.
    • Journal of Korean Vacuum Science & Technology
    • /
    • v.5 no.2
    • /
    • pp.43-46
    • /
    • 2001
  • Fe-Au alloys are characterized by the complete solubility, and exhibit an fcc-bcc structural transformation at the Fe-rich side. The magneto-optical(equatorial Ken effect : EKE) and optical properties of Fe$\_$1-x/Aux (0 < x < 1) were investigated in the 0.5 - 5.0 eV energy range. The x-ray diffraction study shows the structural fcc-bcc transformation about 80 at. % of Fe. Noticeable changes in the optical properties caused by the fcc-bcc structural transformation was observed. The shape and intensity of the EKE spectra as well as the field dependence of the magneto-optical response were also significantly changed. It is thought that these changes are mainly comes from the induced magnetic moment in Au(and/or the emhanced magnetic moment of Fe). The nature of the prominent structure observed in the UV range of the magneto-optical Ken effect of Au/Fe multilayered films are disscussed in connection with the above results.

  • PDF

Secure Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks (비대칭 무선랜 환경을 위한 안전한 패스워드 인증 키 교환 프로토콜)

  • Yang, Hyung-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.173-181
    • /
    • 2011
  • User authentication and key exchange protocols are the most important cryptographic applications. For user authentication, most protocols are based on the users' secret passwords. However, protocols based on the users' secret passwords are vulnerable to the password guessing attack. In 1992, Bellovin and Merritt proposed an EKE(Encrypted Key Exchange) protocol for user authentication and key exchage that is secure against password guessing attack. After that, many enhanced and secure EKE protocols are proposed so far. In 2006, Lo pointed out that Yeh et al.'s password-based authenticated key exchange protocol has a security weakness and proposed an improved protocol. However, Cao and Lin showed that his protocol is also vulnerable to off-line password guessing attack. In this paper, we show his protocol is vulnerable to on-line password guessing attack using new attack method, and propose an improvement of password authenticated key exchange protocol for imbalanced wireless networks secure against password guessing attack.

광대역 위성 액세스 망 분석 및 규격 제안

  • 오흥룡;김문기;류종호;김락현;염흥열
    • Review of KIISC
    • /
    • v.13 no.6
    • /
    • pp.92-100
    • /
    • 2003
  • 본 논문에서는 국내 광대역 위성 액세스 망(BSAN: Broadband Satellite Access Network)에 적용 가능한 보안 기능을 위한 가이드 라인을 살펴보고, RCST(Return Channel Satellite Terminal)와 NCC(Network Control Centre)간에 인증 및 키 관리 기능을 위하여 요구되는 주요 핵심 보안 메커니즘에 대하여 기술한다. 더불어 국내 광대역 위성 액세스 망의 ETSI(European Telecommunications Standards Institute) 표준을 분석한다. 특히 위성 망에서 이용되는 세 가지 키교환 메커니즘 MKE(Main Key Exchange), QKE(Quick Key Exchange), EKE(Explicit Key Exchange)에 대해 분석하였으며, 국내 보안 알고리즘과 키교환을 위한 향상된 보안 알고리즘을 적용한 규격을 제안하였다.