• Title/Summary/Keyword: ID Based

Search Result 1,080, Processing Time 0.026 seconds

ID-based Key Exchange Protocol using Smart cards (스마트 카드를 이용한 ID기반의 키 교환 프로토콜)

  • 배헌중;김현성;유기영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.491-493
    • /
    • 2003
  • 본 논문에서는 사용자의 식별 정보를 이용하여 두 시스템간에 인증과 키 교환을 스마트 카드를 이용하여 수행하는 ID기반의 키 교환 프로토콜을 제안한다. 제안한 프로토콜은 사용자의 스마트 카드와 입력 지문 특징점 정보를 이용하여 스마트 카드와 시스템간에 세션키를 교환한다. 제안한 프로토콜의 안전성은 이산 대수 문제와 Diffie-Hellman 문제의 어려움에 기반하며 완전한 전 방향 보안을 제공하고 가장 공격, 잠재적인 재전송 공격을 방지할 수 있다.

  • PDF

New Species of the Genus Metschnikowia Isolated from Flowers in Indonesia, Metschnikowia cibodasensis sp. nov.

  • Sjamsuridzal, Wellyzar;Oetari, Ariyanti;Nakashima, Chiharu;Kanti, Atit;Saraswati, Rasti;Widyastuti, Yantyati;Ando, Katsuhiko
    • Journal of Microbiology and Biotechnology
    • /
    • v.23 no.7
    • /
    • pp.905-912
    • /
    • 2013
  • A novel species, Metschnikowia cibodasensis, is proposed to accommodate eight strains (ID03-$0093^T$, ID03-0094, ID03-0095, ID03-0096, ID03-0097, ID03-0098, ID03-0099, and ID03-0109) isolated from flowers of Saurauia pendula, Berberis nepalensis, and Brunfelsia americana in Cibodas Botanical Garden, West Java, Indonesia. The type strain of M. cibodasensis is ID03-$0093^T$ (= NBRC $101693^T$ =UICC $Y-335^T$ = BTCC-$Y25^T$). The common features of M. cibodasensis are a spherical to ellipsoidopedunculate shaped ascus, which contains one or two needle-shaped ascospores, and lyse at maturity. Asci generally develop directly from vegetative cells but sometimes from chlamydospores. The neighbor-joining tree based on the D1/D2 domain of nuclear large subunit (nLSU) ribosomal DNA sequences strongly supports that M. cibodasensis (eight strains) and its closest teleomorphic species, M. reukaufii, are different species by a 100% bootstrap value. The type strain of M. cibodasensis, ID03-$0093^T$, differed from M. reukaufii NBRC $1679^T$ by six nt (five substitutions and one deletion) in their D1/D2 region of nLSU rDNA, and by 18 nt (five deletions, four insertions, and nine substitutions) in their internal transcribed spacer regions of rDNA, respectively. Four strains representative of M. cibodasensis (ID03-$0093^T$, ID03-0095, ID03-0096, and ID03-0099) showed a mol% G+C content of $44.05{\pm}0.25%$, whereas that of M. reukaufii NBRC $1679^T$ was 41.3%. The low value of DNA-DNA homology (5-16%) in four strains of M. cibodasensis and M. reukaufii NBRC $1679^T$ strongly supported that these strains represent a distinct species.

Two-round ID-based Group Key Agreement Fitted for Pay-TV System (유료 방송 시스템에 적합한 ID기반의 2 라운드 그룹키 동의 프로토콜)

  • Kim Hyunjue;Nam Junghyun;Kim Seungjoo;Won Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.41-55
    • /
    • 2005
  • A group key agreement protocol allows a group of user to share a key which may later be used to achieve certain cryptographic goals. In this paper, we propose a new scalable two-round ID-based group key agreement protocol which would be well fit to a Pay-TV system, additionally. to the fields of internet stock quotes, audio and music deliveries, software updates and the like. Our protocol improves the three round poop key agreement protocol of Nam et al., resulting in upgrading the computational efficiency by using the batch verification technique in pairing-based cryptography. Also our protocol simplifies the key agreement procedures by utilizing ID-based system. We prove the security of our protocol under the Computational Diffie-Hellman assumption and the Bilinear Decisional Diffie-Hellman assumption. Also we analyze its efficiency.

Pharmacokinetic Properties and Antiinflammatory Activity of Ketoprofen Lotion (케토프로펜 로오숀의 약물동력학적 특성과 항염증작용)

  • 단현광;배준호;박은석;지상철
    • Biomolecules & Therapeutics
    • /
    • v.6 no.1
    • /
    • pp.45-49
    • /
    • 1998
  • The pharmacokinetic properties and antiinflammatory activity of 3% ketoprofen lotion (ID-lotion), formulated with poloxamer 407, were evaluated using rats. For the pharmacokinetic study, the lotion, at the dose of 4.5 mg/kg, was applied on the dorsal skin of rats and the drug concentration in plasma was determined using an HPLC method. As references, ketoprofen suspended in saline was administered orally, and E-lotion, which is a 3% ketoprofen lotion in the Japanese market was applied transdermally. Following the transdermal application of ID-lotion and E-lotion, $C_{max}$ were 316 $\pm$22.3 ng/ml and 163 $\pm$ 12.2 ng/ml, respectively, at the same Tma of 2 hours postdose, while $C_{max}$ and $T_{max}$ after oral administration of the drug were 1,030$\pm$89.1 ng/ml and 0.25 hours, respectively. Relative bioavailabilities of ID-lotion and I-lotion were 69.3% and 34.2%, respectively. The antiinflammatory activity of the two 3% ketoprofen lotions was evaluated with carrageeneninduced edema method after 50 mg of the lotions was applied on the paw of rats. ID-lotion showed 67.6% inhibition of the edema formation, while I-lotion showed 34.\\\\`r%. The calculated ED5o after transdermal application of ID-lotion was 2.5 mg/kg, while that after oral administration was 7.0 mg/kg. Based on these results, the relative equiponderal availability of ID-lotion was 296% compared to the oral administration of ketoprofen.n.n.n.

  • PDF

Design and Implementation of User Authentication System Using USIM Information (USIM 정보를 이용한 사용자 인증 방안 설계 및 구현)

  • Lee, Jin-Woo;Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.571-578
    • /
    • 2017
  • In order to approach information system through smart device and pc, user has to authenticate him or herself via user authentication. At that time when user tries reaching the system, well-used user authentication technologies are ID/PW base, OTP, certificate, security card, fingerprint, etc. The ID/PWbased method is familiar to users, however, it is vulnerable to brute force cracking, keylogging, dictionary attack. so as to protect these attacks, user has to change the passwords periodically as per password combination instructions. In this paper, we designed and implemented a user authentication system using smartphone's USIM without using password while enhancing security than existing ID / PW based authentication technology.

Efficient Digital Signal Processing of DTV TxID Based On Decimated Correlation Scheme (Decimated Correlation 기법을 이용한 DTV TxID수신 신호의 효율적인 신호처리 기법에 관한 연구)

  • Son, Ju-Hee;Lee, Yong-Tae;Park, Seong-Ik;Kim, Heung-Muk;Kim, Seung-Won;Lee, Jae-Young;Cha, Jae-Sang
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2006.11a
    • /
    • pp.219-222
    • /
    • 2006
  • 최근 들어 ATSC-DTV의 미래형 핵심기술로 손꼽히고 있는 송신기 식별기술(TxID ; Transmitter Identification)이 새로운 신기술로 대두되고 있으며, 이에 대한 구현성 검증은 현재 활발하게 논의 중인 재생중계기(EDOCR)와 연계된 단일주파수망(SFN; Single Frequency Network)기술의 실용화를 위한 핵심적 역할을 한다고 볼 수 있다. 하지만 종래의 TxID기술은 긴 주기의 워터마킹용 확산코드를 사용하므로 수신기 입장에서 하드웨어 부피가 크게 증가되는 문제점을 갖고 있다. 따라서 본 논문에서는 TxID 수신기 하드웨어 부피를 크게 경감시킬 수 있는 새로운 Decimated Correlation 기법을 이용한 DTV TxID 수신 신호의 효율적인 신호처리 기법을 제시하였으며, 모의실험을 통한 성능평가를 통해 제안한 알고리즘의 유용성을 입증하였다.

  • PDF

Lightweight RFID Authentication Protocols Based on Hash Function (해쉬함수에 기반한 경량화된 RFID 인증 프로토콜)

  • Ha, Jae-Cheol;Baek, Yi-Roo;Kim, Hwan-Koo;Park, Jea-Hoon;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.61-72
    • /
    • 2009
  • To guarantee security between the tag and back-end server and implementation efficiency in low power tag, we propose two typed mutual authentication protocols in RFID system. One is static-ID authentication scheme which is well suitable in distributed server environments. The other is dynamic-ID scheme which is additively satisfied forward security. In proposed scheme, it does not need any random number generator in tag and requires only one(maximally three) hash operation(s) in tag or server to authenticate each other. Furthermore, we implement the proposed schemes in RFID smart card system and verify its normal operations.

AN IDENTITY BASED AUTHENTICATED KEY AGREEMENT PROTOCOL ON THE TATE PAIRING

  • Yoon, Suk-Bong
    • Communications of the Korean Mathematical Society
    • /
    • v.20 no.3
    • /
    • pp.611-621
    • /
    • 2005
  • This paper introduces an ID based authenticated two pass key agreement protocol of Smart[4] which used the Weil pairing. We propose other an ID based authenticated two pass key agreement protocol which using the Tate Pairing. We will compare protocol of Smart with this protocol.

An Analysis of Indoor Positioning Technologies using Wireless Signals

  • Choi, Min-Seok;Jang, Beakcheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.6
    • /
    • pp.55-62
    • /
    • 2016
  • In this paper, we present indoor positioning technologies using the wireless signal categorizing them into triangulation based, fingerprinting based, and cell ID based technologies. We describe several representative techniques for each of them emphasizing their strengths and weaknesses. We define important performance issues for indoor positioning technologies and analyze recent technologies according to the performance issues. We believe that this paper provide wise view and necessary information for recent indoor positioning technologies using wireless signals.

A Design of Hadoop Security Protocol using One Time Key based on Hash-chain (해시 체인 기반 일회용 키를 이용한 하둡 보안 프로토콜 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.4
    • /
    • pp.340-349
    • /
    • 2017
  • This paper is proposed Hadoop security protocol to protect a reply attack and impersonation attack. The proposed hadoop security protocol is consists of user authentication module, public key based data node authentication module, name node authentication module, and data node authentication module. The user authentication module is issued the temporary access ID from TGS after verifing user's identification on Authentication Server. The public key based data node authentication module generates secret key between name node and data node, and generates OTKL(One-Time Key List) using Hash-chain. The name node authentication module verifies user's identification using user's temporary access ID, and issues DT(Delegation Token) and BAT(Block Access Token) to user. The data node authentication module sends the encrypted data block to user after verifing user's identification using OwerID of BAT. Therefore the proposed hadoop security protocol dose not only prepare the exposure of data node's secret key by using OTKL, timestamp, owerID but also detect the reply attack and impersonation attack. Also, it enhances the data access of data node, and enforces data security by sending the encrypted data.