• Title/Summary/Keyword: Key Exchange

Search Result 777, Processing Time 0.021 seconds

Session Key Distribution Scheme in V2I of VANET using Identity-Based Cryptography (VANET의 V2I 환경에서 IBC를 이용한 세션키 분배 기법)

  • Roh, Hyo-Sun;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.1
    • /
    • pp.112-120
    • /
    • 2009
  • This paper proposes a session key distribution scheme on non-interactive key distribution algorithm of Identity-based cryptography in V2I of VANET. In the current VANET, IEEE 802.11i is used to provide secure data communication between the vehicle and infrastructure. However, since the 4-way handshake procedure reply when the vehicle handover to another RSU/AP, IEEE 802.11i increases the communication overhead and latency. The proposed scheme using non-interactive key distribution algorithm of Identity-based cryptography provided session key generation and exchange without message exchange and reduced communication overhead and latency than the IEEE 802.11i.

Design and Implementation of Web Security Module for a Safe Data Transmission in Heterogeneous Systems (이기종 시스템에서 안전한 데이타 전송을 보장하는 웹 보안 모듈의 설계 및 구현)

  • Kim, Ki-Sung;Kim, Kwang;Heu, Shin
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.12
    • /
    • pp.1238-1246
    • /
    • 2005
  • This thesis is written with web security module for safe data transmission between heterogeneous systems(ex. OS). Web system has allowed users to have great convenience and a lot of information. Though web service business has been progressed much, because of the limitation of it's own system, lots of loss, derived from data spillage which is the weakest point of security, has also followed. Suggested security module is realized by two module. One for server security module for web server, the other is client security module for client. The security structure, suggested on this thesis guarantee safe data transmission by only simple installation of modules in clients and servers. for speed sensitive transmission between web server and browser, Triple-DES, symmetric encryption system suitable for fast encryption communication, is adapted. To solve problems caused from key management, Diffie-Hellman's key exchange algorithm is adapted. By this method, all symmetric encryption troubles from key distribution and management, speed could be work out a solution. And Diffie-Hellman type algorithm secures Authentication for safe data Protection.

Enhancing Security of Transaction Session in Financial Open API Environment Using Hybrid Session Protection Protocol Combined with NTRU (NTRU를 결합한 하이브리드 세션 보호 프로토콜을 이용한 금융 오픈 API 환경의 거래 세션 안전성 강화)

  • Sujin Kwon;Deoksang Kim;Yeongjae Park;Jieun Ryu;Ju-Sung Kang;Yongjin Yeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.75-86
    • /
    • 2023
  • Public key cryptography algorithm such as RSA and ECC, which are commonly used in current financial transaction services, can no longer guarantee security when quantum computers are realized. Therefore it is necessary to convert existing legacy algorithms to Post-Quantum Cryptography, but it is expected that will take a considerable amount of time to replace them. Hence, it is necessary to study a hybrid method combining the two algorithms in order to prepare the forthcoming transition period. In this paper we propose a hybrid session key exchange protocol that generates a session key by combining the legacy algorithm ECDH and the Post-Quantum Cryptographic algorithm NTRU. We tried the methods that proposed by the IETF for TLS 1.3 based hybrid key exchange, and as a result, it is expected that the security can be enhanced by applying the protocol proposed in this paper to the existing financial transaction session protection solution.

Analysis on Zhou et al.'s ID-Based Authenticated Group Key Agreement To Exchange Secure Contents among Group Users (그룹 사용자간 안전한 콘텐츠 전송을 위한 Zhou의 ID-기반의 인증된 그룹 키 교환 프로토콜 분석)

  • Choi, Jae-Tark;Kwon, Jeong-Ok;Yoon, Seok-Koo
    • Journal of Broadcast Engineering
    • /
    • v.13 no.1
    • /
    • pp.79-85
    • /
    • 2008
  • An authenticated group key agreement protocol allows a group of parties communicating over an insecure network to share a common secret key. In this paper, we show that Zhou et al.'s ID-based authenticated group key agreement schemes do not provide forward secrecy.

An efficient Authentication and Key Agreement Protocol in Mobile Systems (이동 시스템에서의 효율적인 인증 및 키 교환 프로토콜)

  • 최영근;김순자
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.2
    • /
    • pp.73-82
    • /
    • 2001
  • In this paper we propose an efficient authentication and key agreement protocol which has been designed specifically for use with low powered computationally weak equipment such as Cellular phone and PDA(Personal Digital Assistant). Imple-menting the protocol based on the Rabin cryptosystem provides the efficiency requirements for mobile communications including minimum number of passes and low computational lead. The paper outlines the new protocol, examines it s various aspects, and compares them to those representative authentication and key agreement protocols.

높은 유상비에서 Rhodococcus rhodochrous IGTS8를 이용한 탈황효율의 분석과 5-L 배양기에의 적용

  • Kim, Jin-Hong;Park, Hong-U
    • 한국생물공학회:학술대회논문집
    • /
    • 2002.04a
    • /
    • pp.121-125
    • /
    • 2002
  • Rhodococcus rhodochrous IGTSS (ATCC 5396S) can break organo sulfur compounds such as dibenzothiophene. Since the environment for biodesulfurization process is invariably hydrophobic, parameters in hydrophobic systems should be examined. For the model oil, hexadecane-containing 5.43mM dibenzothiophene, the volumetric desulfurization rate was decreased with the oil-to-aqueous phase ratio up to 50%. The rate declined sharply after 48h because the cell activity, which is refreshed by medium exchange, was lost. To supply the exhausted nutrients, medium exchange was performed. At 30% oil phase, most of DBT was removed by medium exchange on 48h, and the rate was 2.03mg $DBT_{removed}/L_{dispersion}-hr.$ At 50% oil phase, medium exchange on 60h was performed and the rate was 1.79mg $DBT_{removed}/L_{dispersion}-hr.$ The 300mL flask system was scaled up to a 5-L bioreactor system. On 60 h, a medium exchange was performed and the rate was 5.28mg $DBT_{removed}/L_{dispersion}-hr.$ and all of DBT was removed. It means that we can use the biodesulfurization process even 10 the high oil-to-water phase by some appropriate methods such as controlled feeding of key nutrients and the dilution or removal of some toxic metabolites by continuous reactor.

  • PDF

Research Trend of Polymeric Ion-Exchange Membrane for Vanadium Redox Flow Battery (바나듐계 레독스 흐름 전지용 고분자 이온교환막의 연구개발 동향)

  • Kim, Deuk Ju;Nam, Sang Yong
    • Membrane Journal
    • /
    • v.22 no.5
    • /
    • pp.285-300
    • /
    • 2012
  • Vanadium redox flow battery is believed to be one of important energy storage technologies, because it has many advantages, including long cycle life, high energy efficiency, low cost of maintenance, and environmental friendship. As one of the key components of vanadium redox flow battery system, an ion exchange membrane is required to prevent cross-mixing of the positive and negative electrolytes while allowing ionic continuity. However, ion exchange membrane such as Nafion using in VRBs still face some challenges in meeting performance and cost requirements for broad penetration. Therefore, to resolve these problems, developed various ion exchange membranes are investigated and compared with Nafion membranes in terms of their performance in vanadium redox flow battery.

Testing on the Efficiency of Korean FX Market Implemented by USD, JPY, GBP, and EURO (한국의 외환시장 효율성 검정 - 미국, 일본, 영국, 및 유로지역과의 비교를 중심으로 -)

  • Rhee, Hyun-Jae
    • International Area Studies Review
    • /
    • v.13 no.1
    • /
    • pp.103-122
    • /
    • 2009
  • The paper is basically designed to investigate any existence of co-movement among foreign exchange market, goods market, and monetary market implemented by relative PPP and interest rate parity. And, rational expectation and GARCH-M model are employed for an empirical application. The result revealed that since the co-movement among the markets is hardly found, an efficiency of foreign exchange market is independent from any shocks from the goods market and the monetary market. Whereas, the exchange rate is strongly effected by a real interest rate parity. To this end, the real interest rate should be a key policy instrument to stabilize the foreign exchange market.

Security Scheme for Prevent malicious Nodes in WiMAX Environment (WiMAX 환경에서 악의적 노드 예방을 위한 보안 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.382-389
    • /
    • 2009
  • As the use of mobile device is popularized, the needs of variable services of WiMAX technique and the importance of security is increasing. There is a problem that can be easily attacked from a malicious attack because the action is achieved connectionlessly between neighbor link establishing procedure and TEK exchange procedure in mobile WiMAX even though typical 1 hop network security technique is adapted to WiMAX for satisfying these security requirement. In this paper, security connected mechanism which safely connects neighbor link establishing procedure of WiMAX and TEK exchange procedure additional to the basic function provided by IEEE 802.16e standard to satisfy security requirement of mobile WiMAX is proposed. The proposed mechanism strengthens the function of security about SS and BS by application random number and private value which generated by SS and BS to public key of neighbor link establishing procedure and TEK exchange procedure. Also, we can prevent from inside attack like man-in-the-middle which can occur in the request of TEK through cryptographic connection of neighbor link establishing procedure and TEK exchange procedure.

Cryptographic Key Exchange in Wireless LAN System for Efficient Key Refreshment (효율적인 키 갱신을 위한 무선랜 시스템의 암호 키 교환)

  • 강유성;오경희;양대헌;정병호
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.499-503
    • /
    • 2002
  • 초고속 무선인터넷 환경을 구축하기 위한 인프라의 강력한 대안이 되고 있는 무선랜 시스템은 사무실 단위의 소규모 네트워크 환경에서 벗이나 공중망 환경으로 진화하고 있다. 무선랜 시스템의 공중망 적용을 위한 주요 기술 중 하나는 무선랜 시스템의 보안성을 보장하는 것이다. 본 논문에서는 무선랜 사용자와 액세스포인트 사이에서 이루어지는 새로운 암호 키 교환 프레임을 제시하고, 그 결과로써 효율적인 무선구간 암호 키 갱신 및 보안성이 향상된 무선구간 데이터 프레임 암호화 효과를 보인다.

  • PDF