• Title/Summary/Keyword: Key Exchange

Search Result 777, Processing Time 0.029 seconds

Authenticated Key Exchange Protocol for the Secure Communication (안전한 암호 통신을 위한 키교환 프로토콜)

  • Seo, Hwa-Jeong;Kim, Ho-won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1083-1085
    • /
    • 2010
  • 상호간의 보안 통신을 위해서는 서로간의 안전한 비밀키 교환이 이루어져야 한다. 이를 보장하기 위해서는 안전한 키교환 프로토콜이 사용되어야 한다. 키교환 프로토콜은 안전성을 보장함과 동시에 키의 신선도와 확신에 대한 요구사항을 모두 만족시켜야한다. 현재 대표적인 키교환 프로토콜인 Diffie-Hellman을 기본으로 하는 다양한 프로토콜이 연구 및 개발되고 있다. 최근에 연구된 EKE-E(Encrypted Key Exchange-Efficient) 프로토콜은 Diffie-Hellman 알고리즘을 통한 키교환을 제공하며 man-in-the-middle공격과 오프라인 사전공격에 대한 안정성을 보장한다. 하지만 재전송 공격에 취약성을 가진다. 본 논문에서는 최근에 제안된 키교환 프로토콜인 EKE-E의 안전성을 만족하며 재전송공격에 안전한 프로토콜을 제안한다. 동시에 연산을 줄여 보다 성능을 향상시킨다.

Automatic Configuration Method for the IKE Protocol based on X.509

  • Zhao, Zhen;Ko, Kwang-Sun;Eom, Young-Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.917-920
    • /
    • 2008
  • The Internet Key Exchange (IKE) protocol is most widely used as a security key exchange protocol on the Internet. Security policies used by the IKE protocol must be configured in advance, however the complex options and manual settings cause inconvenience. This paper proposes an automatic configuration method for the IKE protocol based on X.509 certificate. Security policies are embedded in the certificate, read, and added into the IKE configuration file by a negotiation assistant module in order to achieve automatic IKE configuration. Our proposed method reduces the complexity of configuration process and improves the adaptability of the IKE protocol.

Encryption Algorithm Technique for Device's key Protect in M2M environment (M2M 환경의 디바이스 키 보호를 위한 암호 알고리즘 응용 기법)

  • Choi, Do-Hyeon;Park, Jung-Oh
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.343-351
    • /
    • 2015
  • With the diverse services of the current M2M environment being expanded to the organizations, the corporations, and the daily lives, the possibility of the occurrence of the vulnerabilities of the security of the related technologies have become an issue. In order to solve such a problem of the vulnerability of the security, this thesis proposes the technique for applying the cryptography algorithm for the protection of the device key of the M2M environment. The proposed technique was based on the elliptic curve cryptography Through the key exchange and the signature exchange in the beginning, the security session was created. And the white box cipher was applied to the encryption that creates the white box table using the security session key. Application results cipher algorithm, Elliptic Curve Cryptography provides a lightweight mutual authentication, a session key for protecting the communication session and a conventional white-box cipher algorithm and was guaranteed the session key used to encrypt protected in different ways. The proposed protocol has secure advantages against Data modulation and exposure, MITM(Man-in-the-middle attack), Data forgery and Manipulation attack.

Preparation of pore-filling membranes for polymer electrolyte fuel cells and their cell performances (고분자 연료전지용 세공충진막의 제조 및 연료전지 특성)

  • Choi, Young-Woo;Park, Jin-Soo;Lee, Mi-Soon;Park, Seok-Hee;Yang, Tae-Hyun;Kim, Chang-Soo
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2009.06a
    • /
    • pp.278-281
    • /
    • 2009
  • Proton exchange membrane is the key material for proton exchange membrane fuel cells (PEMFC). Currently widely-used perfluorosulfonic acid membranes have some disadvantages, such as low thermal stability, easy swelling, excessive crossover of methanol and high price etc. Other membranes, including sulfonated polymer, radiation grafted membranes, organic-inorganic hybrids and acid-base blends, do not satisfy the criteria for PEMFC, which set a barrier to the development and commercialization of PEMFC. Pore-filling type proton exchange membrane is a new proton exchange membrane, which is formed by filling porous substrate with electrolytes. Compared with traditional perfluorosulfonic acid membranes, pore-filling type proton exchange membranes have many advantages, such as non- swelling, low methanol permeation, high proton conductivity, low cost and a wide range of materials to choose. In this research, preparation methodology of pore-filling membranes by particularly using all hydrocarbon polymers and fuel cell performances with the membranes are evaluated.

  • PDF

Research Trends and Prospects of Reverse Electrodialysis Membranes (역전기투석용 이온교환막의 연구동향 및 전망)

  • Hwang, Jin Pyo;Lee, Chang Hyun;Jeong, Yeon Tae
    • Membrane Journal
    • /
    • v.27 no.2
    • /
    • pp.109-120
    • /
    • 2017
  • The reverse electrodialysis (RED) is an energy generation system to convert chemical potential of saline water directly into electric energy via the combination of current derived from a redox couple electrolyte and ionic potential obtained when cation ($Na^+$) and anion ($Cl^-$) pass through cation exchange membrane (CEM) and anion exchange membrane (AEM) into fresh water, respectively. Ion exchange membrane, a key element of RED system, should satisfy requirements such as 1) low swelling behavior, 2) a certain level of ion exchange capacity, 3) high ion conductivity, and 4) high perm-selectivity to achieve high power density. In this paper, research trends and prospects of ionomer materials and ion exchange membranes are dealt with.

Key Recovery Technology for Enterprise Information Infrastructure(EII) (기업 정보체계의 키 복구 기술)

  • 임신영;강상승;하영국;함호상;박상봉
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.3
    • /
    • pp.159-178
    • /
    • 1999
  • As Electronic Commerce is getting larger, the volume of Internet-based commerce by enterprise is also getting larger. This phenomenon applies to Internet EDI, Global Internet Business, and CALS information services. In this paper, a new type of cryptographic key recovery mechanism satisfying requirements of business environment is proposed. It is also applied to enterprise information infrastructure for managing employees' task related to handling official properties of electronic enterprise documents exchange. This technology needs to be complied to information management policy of a certain enterprise environment because behavior of cryptographic key recovery can cause interruption of the employees' privacy. However, the cryptographic key recovery mechanism is able to applied to any kind of information service, the application areas of key recovery technology must be seriously considered as not disturbing user's privacy It will depend on the policy of enterprise information management of a specific company.

  • PDF

Proposal of new GSM Authentication protocol (새로운 GSM의 인증프로토콜 제안)

  • Choi, Hyun;Song, Yun-Kyung;Park, Dong-Sun
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.113-116
    • /
    • 2003
  • Mobile communication network because information through radio channel is passed, information may be eavesdropped and need information security countermeasure in communication network dimension for safe information exchange because there is possibility that is manufactured. This paper used Public Key Cryptography for protection and authentication connected with user authentication. Use public key and private key that is asymmetry encryption key to quote that is used at encryption, decryption of Public key. Encrypt IMSI and authentication message that is transmitted MS, VLR and HLR interval to public key, wish to embody transmitted authentication protocol safety.

  • PDF

Antecedents and Consequence of Key Account Management Success: a Review, Framework and Research Agenda

  • Ahmmed, Kawsar;Noor, Nor Azila Mohd.
    • Asia-Pacific Journal of Business
    • /
    • v.4 no.1
    • /
    • pp.15-24
    • /
    • 2013
  • This paper traces the issue of key account management success which has regarded as a pressing concern of many companies' sales efforts at the organizational business-to-business context. Based on the extensive review of extant literatures, we introduced a theoretical framework that covers the antecedents and consequence of key account management success. We theorized the conditions under which organizational and relational factors influence the success of key account management approach. We endeavor to develop research propositions for each construct and provide necessary suggestions to isolate a platform for future empirical research. Beyond this span, an improved understanding from this framework will help developing policies for successful key account management approach.

  • PDF

A Modified IPsec Protocol for key sharing between a service provider and clients (서비스 제공자의 키 획득을 위한 IPsec 프로토콜)

  • Song, Se-Hwa;Lee, Jong-Eon;Hwang, In-Yong;Lee, You-Shin;Kim, Seok-Joong;Choi, Hyoung-Kee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2009.01a
    • /
    • pp.377-380
    • /
    • 2009
  • VoIP기반의 음성통화가 기존 PSTN망을 대체하여 빠르게 확산되고 있다. 이러한 IP기반의 음성통신은 IP 네트워크가 가진 보안 취약점을 그대로 가지고 있어 이에 대한 보완이 필요하다. IPsec은 IP망에서 보안을 제공하는 프로토콜로 데이터의 기밀성 및 무결성을 제공한다. 한편, 서비스 제공자는 적절한 과금 및 서비스 중재 및 부가 서비스 제공을 위해 통신에 사용된 암호화 키를 획득할 수 있어야 한다. 본 논문에서는 IPsec의 키 교환 프로토콜인 Internet Key Exchange v2를 수정하여 서비스 제공자와 통신하는 양 단말이 동시에 키 교환을 수행하도록 한다. 이 방식을 통하여 서비스 제공자가 키 생성에 참여함으로서 Men in the middle 공격을 효과적으로 막을 수 있고, 부가 서비스를 제공할 수 있는 발판을 마련할 수 있다.

  • PDF