• Title/Summary/Keyword: Identification certificate

Search Result 52, Processing Time 0.022 seconds

An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model

  • Chin, Ji-Jian;Heng, Swee-Huay;Phan, Raphael C.W.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2532-2553
    • /
    • 2014
  • In Asiacrypt 2003, Al-Riyami and Paterson proposed the notion of certificateless cryptography, a technique to remove key escrow from traditional identity-based cryptography as well as circumvent the certificate management problem of traditional public key cryptography. Subsequently much research has been done in the realm of certificateless encryption and signature schemes, but little to no work has been done for the identification primitive until 2013 when Chin et al. rigorously defined certificateless identification and proposed a concrete scheme. However Chin et al.'s scheme was proven in the random oracle model and Canetti et al. has shown that certain schemes provable secure in the random oracle model can be insecure when random oracles are replaced with actual hash functions. Therefore while having a proof in the random oracle model is better than having no proof at all, a scheme to be proven in the standard model would provide stronger security guarantees. In this paper, we propose the first certificateless identification scheme that is both efficient and show our proof of security in the standard model, that is without having to assume random oracles exist.

A Study of Node Authentication for Home Networking (홈 네트워크 환경에서 보안성을 가진 노드 인식기술)

  • Lee, Jeong-Yoon;Lee, Ki-Young
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.225-228
    • /
    • 2005
  • In this paper, we put a focus with a node cognition section of home gateway for information equipments to operate in a home network environment organically individually. We used an IPv6 protocols on a home network node connection on IP base. A node used a certificate published in a registered process by a home gateway for security. We designed secure node cognition structure to have had strong identification.

  • PDF

A cryptographic API to provide the secure key protection function (안전한 키보호 기능을 제공하는 암호 API)

  • 김명희;전문석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.334-336
    • /
    • 2004
  • 국내 전자상거래 제품과의 호환성과 확장성을 위하여 국내 전자서명 표준인 KCDSA(Korean Certificate-based Digital Signature Algorithm) 메커니즘을 PKCS(Public Key Cryptographic Standard) #11 암호 API(Application Programming Interface)에 기능을 추가한다. PKCS #11에서 정의한 키 관리(Hey Management) 함수의 입력 파라미터에 암호화할 키를 바로 입력하면 변조된 키를 전달할 수 있으므로, 본 논문에서는 안전한 키보호(Key Protection) 함수를 새로 정의하여 암호화할 키 대신 사용자 PIN(Personal Identification Number: 패스워드) 입력하여 사용자의 KCDSA 개인키와 공개키를 보다 더 안전하게 보관하고자 한다.

  • PDF

Identification of Noise Source of the HVAC Using Complex Acoustic Intensity Method (복소음향인텐시티법을 이용한 HVAC의 소음원 검출)

  • Yang, Jeong-Jik;Lee, Dong-Ju
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.20 no.11
    • /
    • pp.1089-1096
    • /
    • 2010
  • The relation between the vibration induced from machinery and the radiated sound is complicated. Acoustic intensity method is widely used to obtain the accuracy of noise measurement and noise identification. In this study, as groundwork, the complex acoustic intensity method is performed to identify noise source and transmission path on different free space point source fields. As an industrial application, the complex acoustic intensity method is applied to HVAC to identify sound radiation characteristics in the near field. Experimental complex acoustic intensity method was applied to HVAC, it is possible to identify noise sources in complicated sound field characteristics which noise sources are related with each other, and certificate the validity of complex acoustic intensity. Especially, it can be seen that complex acoustic intensity method using both of active and reactive intensity is vital in devising a strategy for identification of noise. Also, the vector flow of acoustic intensity was investigated to identify sound intensity distributions and energy flow in the near field of HVAC.

Study on Application of Safety Management System to K-Drone Delivery (K-드론배송에 대한 항공안전관리시스템(SMS) 적용 방안)

  • Jeong Kwen Park;Keumjin Lee
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.32 no.3
    • /
    • pp.189-195
    • /
    • 2024
  • K-drone delivery system is a commercial delivery system that ensures compliance with aviation safety. It is equipped with flight routes for automated deliveries and features a drone identification device along with a real-time monitoring system for drone positions. This study proposes the application of an ICAO SMS-based safety management system as an appropriate safety management framework that non-aviation personnel drone operators can adopt. It suggests that applying an ICAO SMS-based safety management system to the K-drone delivery system, similar to Europe and the USA, is valid. To introduce ICAO SMS into the K-drone delivery system, procedures must be established for building a drone safety management system, from business registration to drone operation and training. The main components of the drone safety management system are presented, including 8 items: safety policy and authority and responsibility, risk management, safety assurance, safety promotion, drone control system, drone delivery operation manual, drone maintenance manual, and accident response, incorporating the four fundamental elements of ICAO SMS and European Light UAV operator Certificate standards. Additionally, as a core aspect of the drone safety management system, a seven-step risk assessment procedure is proposed, which includes basic risk identification, hazard identification, risk scenario development, calculation of severity and likelihood, SMS matrix risk assessment, mitigation measures, and implementation determination.

Development of Adult Authentication System using Numeral Recognition (숫자인식을 이용한 성인인증기 개발)

  • 김갑순;박중조
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.19 no.12
    • /
    • pp.100-108
    • /
    • 2002
  • This paper describes the development of adult authentication system using numerical recognition. Nowadays, the automats are very popular and they are dealing in many item suck as coffee, soft drinks, alcoholic drinks and cigarettes, etc. Among these items, some are harmful to the minor, and so the sale of these to the minor must be prohibited. In relation to this, adult authentication system is required to be equipped to the automat which deals in items harmful to minor. According to these demands, we develop the adult authentication system. This system capture the image of a residence certificate card by the identification card-reader, and recognize its numbers and identify it as adult or minor by main computer, where numeral recognition is accomplished by using image processing methods and neural network recognizer. The characteristic test of the system is carried out, and its result reveals that the system has the error of less than 1%. Thus, It is thought that the system can be used for identifying adult in the automats.

Service Identification Method for Encrypted Traffic Based on SSL/TLS (SSL/TLS 기반 암호화 트래픽의 서비스 식별 방법)

  • Kim, Sung-Min;Park, Jun-Sang;Yoon, Sung-Ho;Kim, Jong-Hyun;Choi, Sun-Oh;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.11
    • /
    • pp.2160-2168
    • /
    • 2015
  • The SSL/TLS, one of the most popular encryption protocol, was developed as a solution of various network security problem while the network traffic has become complex and diverse. But the SSL/TLS traffic has been identified as its protocol name, not its used services, which is required for the effective network traffic management. This paper proposes a new method to generate service signatures automatically from SSL/TLS payload data and to classify network traffic in accordance with their application services. We utilize the certificate publication information field in the certificate exchanging record of SSL/TLS traffic for the service signatures, which occurs when SSL/TLS performs Handshaking before encrypt transmission. We proved the performance and feasibility of the proposed method by experimental result that classify about 95% SSL/TLS traffic with 95% accuracy for every SSL/TLS services.

Study on the Connection with Public Authentication and Bio Authentication (공인인증서와 바이오인증 연계를 위한 연구)

  • Ryu, Gab-Sang
    • Journal of Internet of Things and Convergence
    • /
    • v.1 no.1
    • /
    • pp.39-44
    • /
    • 2015
  • Organization is increasing the authorizing process to use public certificate and bio information. Certificate, has evolved to be able to parallel distributes the bio authentication and portable bio-authentication device. Authentication using an individual's PC and smart devices continue to generalize, while convenience for authentication is increased by comparison Study on cooperation with the security at the network level's a weak situation. If ask authentication method through the cooperation of the public certificate and bio information work with current network access control, there is a possibility to develop a more powerful security policy. by cooperation weaknesses against vulnerable personal authentication techniques on security token in a reliable and secure personal authentication techniques, such as bio-recognition, Bio Information for identification and to prevent exposing a methodology suggest to validate whether or not to carry out in this paper. In addition, organize the scenario that can work with the 802.1x network authentication method, and presented a proposal aimed at realization.

Device Security Bootstrapping Mechanism on the IEEE 802.15.4-Based LoWPAN (IEEE 802.15.4 기반 LoWPAN에서의 디바이스 보안 설정 메커니즘)

  • Lee, Jong-Hoon;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1561-1569
    • /
    • 2016
  • As the use of the sensor device increases in IoT environment, the need for device security is becoming more and more important When a sensor device is deployed in IEEE 802.15.4-based LoWPAN, it has to perform the join operation with PAN Coordinator and the binding operation with another device. In the join and binding process, authentication and key distribution of the device are performed using the pre-distributed network key or certificate. However, the network key used in the conventional method has problems that it's role is limited to the group authentication and individual identification is not applied in certificate issuing. In this paper, we propose a secure join and binding protocol in LoWPAN environment that solves the problems of pre-distributed network key.

A New Fingerprinting Method Using Safranine O for Adhesive Tapes and Non-Porous Papers

  • Kim, Young-Sam;Oh, In-Sun;Yoon, Kwang-Sang;Kim, Young-Joo;Eom, Yong-Bin
    • Biomedical Science Letters
    • /
    • v.16 no.3
    • /
    • pp.197-200
    • /
    • 2010
  • All citizens over 17 year old living in Korea have to be fingerprinted to obtain a certificate of resident registration. For this reason, human identification through fingerprints has been used actively in crime scene investigation. The fingerprint is so unique that it is one of the most certain ways to identify oneself and it can differentiate between genetically identical twins. Fingerprints gained in crime scene indicate a direction of criminal investigation in conjecturing a suspect. Fingerprints help a reunion of family got scattered for a long time and make it possible to get a personal identification for missing person who met with natural calamity. We developed a new fingerprinting method using safranine O, so as to develop fingerprints on the adhesive tapes and non-porous papers in various physical environments. Results were compared to the preexisting fingerprinting method, the minutiae numbers of fingerprints were greatly increased in our newly developed safranine O fingerprinting method. This newly developed safranine O method showed a quantity and quality comparable to the preexisting fingerprinting method routinely used in these days. In our hands, the safranine O fingerprinting method is another easy and obvious choice when the forensic case sample is available for fingerprints on the adhesive tapes and non-porous papers.