• Title/Summary/Keyword: Key Change

Search Result 1,926, Processing Time 0.038 seconds

An Efficient Key Distribution for Broadcast Encryption at Embedded Computing Environment (임베디드 컴퓨팅 환경에서 브로드캐스트 암호화를 위한 효율적인 키 분배)

  • Lee, Deok-Gyu;Kim, Tai-Hoon;Yeo, Sang-Soo;Kim, Seok-Soo;Park, Gil-Cheol;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.1
    • /
    • pp.34-45
    • /
    • 2008
  • Broadcast encryption schemes are applied to transmit digital informations of multimedia, software, Pay-TV etc. in public network. User acquires message or session key to use key that broadcaster transmits, broadcaster need process that generation and distribution key in these process. Also, user secession new when join efficient key renewal need. In this paper, introduce about efficient key generation and distribution, key renewal method. The temporary conference environment base structure against an each mobile device wild gap. Without the transmission possible, it follows infrequent location change and with the quality where the key information change flow. Thus, in this paper, in order to apply to the embedded computing environment and the key generation and the efficient key renewal are done when the mobile device is used of the specify space it proposes.

  • PDF

Design of a Private Key Escrow System based on the Fingerprint Identification (지문 인식 기반의 개인키 위탁 시스템의 설계)

  • Shin, Yong-Nyuo;Lee, Yong-Jun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.2
    • /
    • pp.21-28
    • /
    • 2008
  • There are some problems on the system that uses a password comprising a digital signature to identify the secret key owner under the public key infrastructure. For example, the password can be difficult to remember or easy to be disclosure, and users should make more complex password to protect it. A number of studies have been proceeded in order to overcome these defects using the fingerprint identification technologies, but they need to change the current standard of public key infrastructure. On the suggested private key escrow system, the private key can be withdrawn only through the enrollment and identification of a fingerprint template after it is saved to a reliable third system. Therefore, this new private key escrow system can remove previous inconveniences of managingthe private key on current public key infrastructure, and it exhibited superior results in terms of the evaluation items when compared with the integrated method of the existing fingerprint identification and public key infrastructure.

Behavior Change Theories in Diabetes Self-management: A Conceptual Review (당뇨 자기관리를 위한 행위변화 이론: 개념적 고찰)

  • Choi, Su-Young;Song, Mi-Soon
    • Perspectives in Nursing Science
    • /
    • v.7 no.1
    • /
    • pp.1-9
    • /
    • 2010
  • Purpose: The purpose of this study was to review behavior change theories in terms of important variables, concept definitions, and applicability to diabetes self-management behavior. Methods: Six behavior change theories (the Transtheoretical Model, the Health Belief Model, the Theory of Reasoned Action, the Theory of Planned Behavior, Social cognitive theory, and Information-Motivation-Behavioral skills Model) were reviewed which were applied in diabetes self-management interventions. Results: The five key concepts from the five non-stage behavior change theories were delineated. Based on the key concepts, a theoretical framework was formulated as the explanatory model of diabetes self-management behaviors. The four major concepts in Information-Motivation- Behavioral skills Model were included. The cognitive arm of the proposed theoretical framework included constructs related to diabetes knowledge, motivation (beliefs, attitude, social norm), self-efficacy, and intention. Conclusion: The theoretical framework described here includes the key factors of successful diabetes self- management intervention. However, the concept of motivation needs further exploration and clarification for operationalization.

  • PDF

A Mutual Authentication Protocol using Key Change Step by Step for RFID Systems (단계적 키 변환을 이용한 RFID 상호 인증 프로토콜)

  • Chung, Kyung-Ho;Kim, Kyoung-Youl;Oh, Se-Jin;Lee, Jae-Kang;Park, Yong-Soo;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.462-473
    • /
    • 2010
  • The RFID system has the security problem of location tracking and user privacy. In order to solve this problem, the cryptographic access method using hash function is difficult to in real applications. Because there is a limit of computing and storage capacity of Tag, but the safety is proved. The lightweight authentication methods like HB and LMAP guarantee the high efficiency, but the safety is not enough to use. In this paper, we use the AES for RFID Authentication, and solve the problem of using fixed key with key change step by step. The symmetric keys of the tag and server are changed by the random number generated by tag, reader and server successively. This could prevent the key exposure. As a result, the output of the tag and reader always changes. These key changes could make it possible to prevent eavesdropping, replay attack, location tracking and spoofing.

A Dynamic Key Lifetime Change Algorithm for Performance Improvement of Virtual Private Networks (가상사설망의 성능개선을 위한 동적 키 재생성 주기 변경 알고리즘)

  • HAN, Jong-Hoon;LEE, Jung Woo;PARK, Sung Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.10 s.340
    • /
    • pp.31-38
    • /
    • 2005
  • Ipsec is a security protocol suite that provides encryption and authentication services for IP messages at the network layer of the internet. Internet Key Exchange (IKE) is a protocol that is used to negotiate and provide authenticated keying materials in a protected manner for Security Associations (SAs). In this paper, we propose a dynamic key lifetime change algorithm for performance enhancement of virtual private networks using IPSec. The proposed algorithm changes the key lifetime according to the number of secure tunnels. The proposed algorithm is implemented with Linux 2.4.18 and FreeS/WAN 1.99. The system employing our proposed algorithm performs better than the original version in terms of network performance and security.

Detection of Assault and Violence Using Color Histogram in Elevator (컬러히스토그램을 이용한 승강기에서 폭행 및 폭력 사건의 추출)

  • Shin, Seong-Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.95-100
    • /
    • 2012
  • In this paper, we see the means for the assault, the type of unlawful exercise of power. Also, we see the violence, the physical exercise accompanying with assault. Now, it has caused numerous crimes in elevators. This paper is to present a way to extract the violence and assault that occurred in elevators. Key frame was extract by color histogram method, one of the ways to scene change detection techniques. Extracted key frames are key frames of a scene containing a forensic crime scene video. Also, the key frames of the scene should be submitted to the forensic evidence.

Study on Forensic Analysis with Access Control Modification for Registry (레지스트리 접근권한 변조에 관한 포렌식 분석 연구)

  • Kim, Hangi;Kim, Do-Won;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1131-1139
    • /
    • 2016
  • In the Hive file format, the sk(Security Key) cell provides access control to registry key. An attacker can figure out secret information on registry or change the security set-up if she could apply modified hive files on system. This paper presents various methods to change access control of registry key by modifying or replacing cell on hive file. We also discuss threats by access control modification and signs of attacks analysis by modified hive files.

Biochemical Characterization of Exoribonuclease Encoded by SARS Coronavirus

  • Chen, Ping;Jiang, Miao;Hu, Tao;Liu, Qingzhen;Chen, Xiaojiang S.;Guo, Deyin
    • BMB Reports
    • /
    • v.40 no.5
    • /
    • pp.649-655
    • /
    • 2007
  • The nsp14 protein is an exoribonuclease that is encoded by severe acute respiratory syndrome coronavirus (SARS-CoV). We have cloned and expressed the nsp14 protein in Escherichia coli, and characterized the nature and the role(s) of the metal ions in the reaction chemistry. The purified recombinant nsp14 protein digested a 5'-labeled RNA molecule, but failed to digest the RNA substrate that is modified with fluorescein group at the 3'-hydroxyl group, suggesting a 3'-to-5' exoribonuclease activity. The exoribonuclease activity requires $Mg^{2+}$ as a cofactor. Isothermal titration calorimetry (ITC) analysis indicated a two-metal binding mode for divalent cations by nsp14. Endogenous tryptophan fluorescence and circular dichroism (CD) spectra measurements showed that there was a structural change of nsp14 when binding with metal ions. We propose that the conformational change induced by metal ions may be a prerequisite for catalytic activity by correctly positioning the side chains of the residues located in the active site of the enzyme.