• Title/Summary/Keyword: Key Exchange

Search Result 777, Processing Time 0.022 seconds

Public Key based LR-WPAN Security Algorithm (공개키 방식의 LR-WPAN 보안 알고리즘)

  • Kim, Jin-Cheol;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.54-67
    • /
    • 2006
  • Low Rate WPAN (Wireless Personal Area Network) designed for low power and low cost wireless communication is an important technology to realize ubiquitous environment. IEEE 802.15.4 and ZigBee Alliance recommend the SKKE (Symmetric-Key Key Establishment) protocol for key establishment and management. The SKKE algorithm has security weakness such as the absence of authentication process or electric signature in key generation and exchange when devices join the role of coordinators. In this paper, we propose new key establishment and security algorithm based on public key encryption to solve low rate WPAN security problems. Also, to improve PLC AMR system's weaknesses in communication reliability and security, we propose a new AMR system model based on IEEE 802.15.4 and we apply our security algorithm to AMR profile for security enhancement.

AVK based Cryptosystem and Recent Directions Towards Cryptanalysis

  • Prajapat, Shaligram;Sharma, Ashok;Thakur, Ramjeevan Singh
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.97-110
    • /
    • 2016
  • Cryptanalysis is very important step for auditing and checking strength of any cryptosystem. Some of these cryptosystem ensures confidentiality and security of large information exchange from source to destination using symmetric key cryptography. The cryptanalyst investigates the strengths and identifies weakness key as well as enciphering algorithm. With increase in key size the time and effort required to guess the correct key increases so trend is increase key size from 8, 16, 24, 32, 56, 64, 128 and 256 bits to strengthen the cryptosystem and thus algorithm continues without compromise on the cost of time and computation. Automatic Variable Key (AVK) approach is an alternative to the approach of fixing up key size and adding security level with key variability adds new dimension in the development of secure cryptosystem. Likewise, whenever any new cryptographic method is invented to replace per-existing vulnerable cryptographic method, its deep analysis from all perspectives (Hacker / Cryptanalyst as well as User) is desirable and proper study and evaluation of its performance is must. This work investigates AVK based cryptic techniques, in future to exploit benefits of advances in computational methods like ANN, GA, SI etc. These techniques for cryptanalysis are changing drastically to reduce cryptographic complexity. In this paper a detailed survey and direction of development work has been conducted. The work compares these new methods with state of art approaches and presents future scope and direction from the cryptic mining perspectives.

Design and Implementation of Public key-based Video Conference System for Authentication and Encryption (공개키기반 사용자인증과 암호화를 적용한 영상회의 시스템 설계 및 구현)

  • Jung Yong-Deug;Lee Sang-Hun;Jin Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.971-980
    • /
    • 2004
  • This paper describes the design and implementation of the video conferencing system using public key infrastructure which is used for user authentication and encryption. Public key infrastructure reinforces the authentication process for conference participant, and the symmetric key system blocks malicious access to information and protect conference control information. This paper shows the implementation of the trans portation layer secure protocol in conformity with Korea public key authentication algorithm standard and symmetric encryption algorithm (DES, 3DES and AES) for media stream encryption. In this paper, we deal with two ways of protecting information : transportation layer secure protocol secures user authentication process and the conference control information; while public key-based authentication system protects personal information of users when they connect to the network. When distributing the session keys for encryption, Internet Key Exchange is used for P2P communication, and secure protocol is employed for 1 : N multi-user communication in the way of distributing the public key-based en-cryption key.

Password-based Authenticated Key Agreement Protocol Secure Against Advanced Modification Attack (Advanced Modification 공격에 안전한 패스워드 기반 키 동의 프로토콜)

  • Kwak, Jin;Oh, Soo-Hyun;Yang, Hyung-Kyu;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.277-286
    • /
    • 2004
  • Password-based mechanism is widely used methods for user authentication. Password-based mechanisms are using memorable passwords(weak ferrets), therefore Password-based mechanism are vulnerable to the password guessing attack. To overcome this problem, man password-based authenticated key exchange protocols have been proposed to resist password guessing attacks. Recently, Seo-Sweeny proposed password-based Simple Authenticated Key Agreement(SAKA) protocol. In this paper, first, we will examine the SAKA and authenticated key agreement protocols, and then we will show that the proposed simple authenticated key agreement protocols are still insecure against Advanced Modification Attack. And we propose a password-based Simple Authenticated Key Agreement Protocol secure against Advanced Modification Attack.

Molecular Dynamics (MD) Study of Proton Exchange Membranes for Fuel Cells (연료전지용 수소이온 교환막의 분자동역학 연구)

  • Park, Chi Hoon;Nam, Sang Yong;Hong, Young Taik
    • Membrane Journal
    • /
    • v.26 no.5
    • /
    • pp.329-336
    • /
    • 2016
  • Proton exchange membrane (PEM) is one of the key components of membrane-electrode assembly (MEA), which plays important role in fuel cell performance together with catalysts. It is widely accepted that water channel morphology inside PEMs as a proton pathway significantly affects the PEM performance. Molecular dynamics (MD) simulations are a very useful tool to understand molecular and atomic structures of materials, so that many related researches are currently being studied. In this paper, we summarize the current research trend in MD simulations, present which properties can be characterized, and finally introduce the usefulness of MD simulations to the researchers for proton exchange membranes.

Using Tower Flux Data to Assess the Impact of Land Use and Land Cover Change on Carbon Exchange in Heterogeneous Haenam Cropland (비균질한 해남 농경지의 탄소교환에 미치는 토지사용 및 피복변화의 영향에 대한 미기상학 자료의 활용에 관하여)

  • Indrawati, Yohana Maria;Kang, Minseok;Kim, Joon
    • Proceedings of The Korean Society of Agricultural and Forest Meteorology Conference
    • /
    • 2013.11a
    • /
    • pp.30-31
    • /
    • 2013
  • Land use and land cover change (LULCC) due to human activities directly affects natural systems and contributes to changes in carbon exchange and climate through a range of feedbacks. How land use and land cover changes affect carbon exchanges can be assessed using multiyear measurement data from micrometeorological flux towers. The objective of the research is to assess the impact of land use and land cover change on carbon exchange in a heterogeneous cropland area. The heterogeneous cropland area in Haenam, South Korea is also subjected to a land conversion due to rural development. Therefore, the impact of the change in land utilization in this area on carbon exchange should be assessed to monitor the cycle of energy, water, and carbon dioxide between this key agricultural ecosystem and the atmosphere. We are currently conducting the research based on 10 years flux measurement data from Haenam Koflux site and examining the LULCC patterns in the same temporal scale to evaluate whether the LULCC in the surrounding site and the resulting heterogeneity (or diversity) have a significant impact on carbon exchange. Haenam cropland is located near the southwestern coast of the Korean Peninsula with land cover types consisting of scattered rice paddies and various croplands (seasonally cultivated crops). The LULCC will be identified and quantified using remote sensing satellite data and then analyzing the relationships between LULCC and flux footprint of $CO_2$ from tower flux measurement. We plan to calculate annual flux footprint climatology map from 2003 to 2012 from the 10 years flux observation database. Eventually, these results will be used to quantify how the system's effective performance and reserve capacity contribute to moving the system towards more sustainable configuration. Broader significance of this research is to understand the co-evolution of the Haenam agricultural ecosystem and its societal counterpart which are assumed to be self-organizing hierarchical open systems.

  • PDF

A Study on the Performance Improvement of the Security Transmission Using the SSFNet (SSFNet을 이용한 보안전송 성능개선에 관한 연구)

  • Ryu, Jung-Eun;Ryu, Dong-Ju;Lee, Taek-Hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.811-815
    • /
    • 2005
  • IPSec(Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication. IPSec is providing authentication, integrity and confidentiality security services. The specifications for Internet Key Exchange(IKEv1) were released to the world. Some criticisms of IKEv1 were that it was too complex and endeavored to define too much functionality in one place. Multiple options for multiple scenarios were built into the specification. The problem is that some of the included scenarios are rarely if ever encountered. For IPsec to work, the sending and receiving devices must chare a Public Key. This is accomplished through a protocol known as Internet Security Association and Key Management Protocol/Oakley(ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the sender using digital certificates. This thesis is a study on the performance improvement of the security transmission using the SSFNet(Scalable Simulation Framework Network Models)

  • PDF

Study on Transient Response of a Unit Proton Exchange Membrane Fuel Cell with an Aged Gas Diffusion Layer (내구성능저하된 기체확산층이 고분자전해질 연료전지의 과도응답성능에 미치는 영향 연구)

  • Cho, Junhyun;Ha, Tahun;Park, Jaeman;Oh, Hwanyeong;Min, Kyoungdoug;Jyoung, Jy-Young;Lee, Eunsook
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2010.11a
    • /
    • pp.76.2-76.2
    • /
    • 2010
  • The gas diffusion layer is the key component of the proton exchange membrane fuel cell because it directly affect to the mass transport mechanism and dynamic behavior of the cell. In this study, the effects of GDL aging on the transient response of the PEM fuel cell is systematically investigated using current step transient response analysis under different stoichiometric ratios and humidity conditions. With GDLs aged by the accelerated stress test, the effects of hydrophobicity and structural changes due to carbon loss in the GDL on the transient response of PEM fuel cells are determined. The degraded GDLs that had uneven hydrophobicity distributions cause local water flooding inside the GDL and induce lower and unstable voltage responses after load changes.

  • PDF

Web Services based XML Security Model for Secure Information Exchange in Electronic Commerce (전자상거래에서 안전한 정보 교환을 위한 웹 서비스 기반의 XML 보안 모델)

  • Cho, Kwang-Moon
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.5
    • /
    • pp.93-99
    • /
    • 2004
  • The most important technology in the electronic commerce based on Internet is to guarantee the security of trading information exchange. Many technologies are proposed as a standard to support this security problem. One of them is an XML (eXtensible Markup Language). This is used in various applications as the document standard for electronic commerce system. The XML security has become very important topic. In this paper an XML security model for web services based electronic commerce system to guarantee the secure exchange of trading information. To accomplish the security of XML, the differences of XML signature, XML encryption and XML key management scheme respect to the conventional system should be provided. The new architecture is proposed based on unique characteristics of XML. Especially the method to integrate the process management system need to the electronic commerce is proposed.

  • PDF

Investigation of Lattice Effects in Perovskites by $O-isotope^{18}$ Exchange

  • Itoh, Mitsuru;Mahesh, Rajappan;Wang, Ruiping
    • The Korean Journal of Ceramics
    • /
    • v.6 no.3
    • /
    • pp.309-314
    • /
    • 2000
  • In the present study, preliminary experimental results of the change in the properties of perovskite-type oxides caused by the $^{18}O$- exchange have been reported. Two systems were selected for the exchange, (1) $ATiO_3$(A=Ca,Sr,Ba) and (2) manganese perovskite. The dielectric properties of isotope-exchanged $SrTi^{18}O_3$showed a drastic change from a quantum paraelectricity below 3K to ferroelectric-like behavior with a peak at 23K and an enhanced dielectric constant, 35000 at the peak. On the contrary, the $T_c$ for $BaTiO_3$was found to increase by 0.9K. The observed isotope shift of $T_c$ as well as $T_co$ for the manganese perovskites is correlated with the key parameters controlling the lattice such as $Mn^{3+}$ content, average ionic radius of the A-site cation <$r_A$> ad A-site ionic disorder $\sigma^2$.

  • PDF