• Title/Summary/Keyword: Man-In-The-Middle

Search Result 614, Processing Time 0.027 seconds

Blind Signature based on Mobile Commerce (무선 인터넷에서의 은익기반 서명에 의한 전자상거래)

  • Kim, Jang-Hwan;Rhee, Chung-Sei
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.1-6
    • /
    • 2008
  • Designing efficient and secure electronic payment is important for M-Commerce. In this paper, we propose an efficient Micro-payment protocol that allows multiple transactions using ID-based public key encryption-system. The proposed payword system requires to generate authenticated key generated by Weil-pairing which uses an elliptic curve cryptosystem over finite field Fq for transactions. Therefore, it is more secure in known key attacks as well as man-in-the middle attacks.

  • PDF

Mechanism for Access Control to Clients in Intranet with Using ARP Spoofing (ARP Spoofing을 이용한 LAN 클라이언트 접속 제어 기법)

  • Lee, Geonwoo;Koo, Sangsoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.15-18
    • /
    • 2018
  • This paper proposes mechanism to build a economical access control system when a user's host requires block to an external network, such as computer class conducted at educational institutions. The proposed mechanism is to block clients from accessing the external network by using the one of MITM(Man In The Middle) technique, ARP Spoofing. It prevents packets from being forwarded to outside by gateway. So It can build system simply and economically because Client hosts are don't need to install firewall or any extra agent.

  • PDF

Post-modern Characteristics Expressed on Characters' Make-up Coordination of Fantasy Movies - Focused on the works of Tim Burton - (판타지 영화의 캐릭터 분장 코디네이션에 나타난 포스트모던 특성 - Tim Burton 감독의 작품을 중심으로 -)

  • Chang, Mee-Sook
    • Fashion & Textile Research Journal
    • /
    • v.11 no.2
    • /
    • pp.219-230
    • /
    • 2009
  • The purpose of this paper is to study characters' make-up coordination that changes the narrative of the fantasy movies to a visual fantasy, especially it focuses on the post-modern features from the works of Tim Burton, a post-modernist. The contents of the study are, firstly, studying post-modernism that influenced the works of Tim Burton, secondly, researching (1988), (1989), (1990), (1992), (2003) and (2005) and their main characters' make-up design. Thirdly, analyzing the otherness and plural-code that are the post-modern characteristics expressed on characters' make-up coordination of fantasy movies. The otherness means the division of the middle and the surroundings and the rise of the outsiders. Fantasy characters that scares off human such as ghosts, aliens, apes, kidults, mutations, man-made men are in the middle. The plural-code takes the symbolic and pluralistic dimension in to the movie, mixes the sign system, and which natural and supernatural system cross over. In the movies, Beetle Juice who was both ghost and devil expresses life and death, Bat man, Cat woman, Penguin man expresses human and animal, and Edward means human and inhuman. Willy Wonka's makeup makes him look younger, but his grown-up-like clothes show doubleness. For that matter, make-up coordination is the mirror of reflection of period and human being's inner life.

Security Analysis and Improvements of a Biometrics-based User Authentication Scheme Using Smart Cards (스마트 카드를 이용한 생체인식 기반 사용자 인증 스킴의 안전성 분석 및 개선)

  • An, Young-Hwa
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.159-166
    • /
    • 2012
  • Many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2010, Chang et al. proposed an improved biometrics-based user authentication scheme without concurrency system which can withstand forgery attack, off-line password guessing attack, replay attack, etc. In this paper, we analyze the security weaknesses of Chang et al.'s scheme and we have shown that Chang et al.'s scheme is still insecure against man-in-the-middle attack, off-line biometrics guessing attack, and does not provide mutual authentication between the user and the server. And we proposed the improved scheme to overcome these security weaknesses, even if the secret information stored in the smart card is revealed. As a result, the proposed scheme is secure for the user authentication attack, the server masquerading attack, the man-in-the-middle attack, and the off-line biometrics guessing attack, does provide the mutual authentication between the user and the remote server. And, in terms of computational complexities, the proposed scheme is more effective than Chang et al.'s scheme.

Vulnerability Analysis and Improvement in Man-in-the-Middle Attack for Remote User Authentication Scheme of Shieh and Wang's using Smart Card (Shieh and Wang's의 스마트카드 상호인증 스킴에 대한 중간자공격 개선)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.4
    • /
    • pp.1-16
    • /
    • 2012
  • Shieh and Wang [10] recently proposed an efficient mutual authentication scheme that combined the cost-effectiveness of operations of Lee et al. [6]. scheme and the security and key agreement of Chen and Yeh scheme. Shieh and Wang [10] scheme, however, does not satisfy the security requirements against a third party (the man-in the middle, attacker) that have to be considered in remote user authentication scheme using password-based smart cards. Shieh and Wang weaknesses are the inappropriateness that it cannot verify the forged message in 3-way handshaking mutual authentication, and the vulnerability that the system (server) secret key can easily be exposed. This paper investigates the problems of Shieh and Wang scheme in the verification procedure of the forged messages intercepted by the eavesdrop. An enhanced two-way remote user authentication scheme is proposed that is safe and strong against multiple attacks by adding the ability to perform integrity check on the server and proposed scheme is not expose user password information and the system's confidential information.

A Case of Middle Mediastinal Malignant Paraganglioma (중간 세로칸 악성 곁신경절종)

  • Park, Sung-Bum;Park, Silvia;Bang, Sun-Ha;Kim, Eun-Kyung;Jeon, Kyeong-Man;Koh, Won-Jung;Suh, Gee-Young;Chung, Man-Pyo;Kim, Ho-Joong;Kwon, O-Jung;Go, Young-Hyeh;Um, Sang-Won
    • Tuberculosis and Respiratory Diseases
    • /
    • v.70 no.2
    • /
    • pp.165-169
    • /
    • 2011
  • Pheochromocytomas are neuroendocrine tumors of chromaffin cell that originate in the paraganglia of the adrenal medulla. Approximately 10% of pheochromocytomas are found in the extra-adrenal paraganglia and are called paragangliomas. However, cases of middle mediastinal paragangliomas are very rare. In this case, the patient presented with a voice change and a headache. A middle mediastinal soft tissue mass with marked enhancement was detected on computed tomography of the chest. The 24-hour urine catecholamine level was markedly elevated. The middle mediastinal mass was biopsied via mediastinoscopy and the resulting immunohistochemical staining was compatible with a diagnosis of middle mediastinal paraganglioma. The mass was resected surgically and the symptoms were relieved.

Intrapulmonary and Endobronchial Hamartoma (폐실질내 및 기관지내 과오종)

  • 김기만
    • Journal of Chest Surgery
    • /
    • v.22 no.4
    • /
    • pp.709-712
    • /
    • 1989
  • The hamartoma is the commonest benign tumor of the lung and proved incidentally as asymptomatic coin lesion on routine chest radiologic examination, but has very low incidence, especially in endobronchial origin. The authors experienced a case of coincidental with intrapulmonary and endobronchial hamartoma. The patient, a 60-year-old man, a farmer, was admitted due to coughing and fever. Preoperative diagnosis was achieved by flexible bronchoscopic biopsy and managed by right middle lobectomy. Three lobulated masses were palpable in the right middle lobe. He was discharged on 15th postoperative day, without problem.

  • PDF

Design of A One-time Password Generator on A Mobile Phone Providing An Additional Authentication for A Particular Transaction (특정 트랜잭션용 추가 인증을 제공하는 휴대폰 상의 일회용 암호 생성기 설계)

  • Park, Jun-Cheol
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.6
    • /
    • pp.552-557
    • /
    • 2009
  • One-time passwords are used just once and discarded, which makes it more secure than the repeatedly used conventional passwords. This paper proposes a challenge-response based one-time password generator on a user's mobile phone always carried with the user. The generator can provide an additional authentication for a user to issue a money transfer request within his Internet banking session on a PC. A currently used device for Internet banking generates a password that changes every 30 seconds or so, which allows a man-in-the-middle to use it for stealing money within the 30 seconds. Unlike such a device, the proposed generator resists against the man-in-the-middle attack by a novel challenge-response scheme, provides better accessability and protection against stolen devices. As the currently used devices do, it prevents any unauthorized transfer even if the victim's all other credentials are revealed through his PC infected with spyware such as a keyboard logger.

Distal Middle Cerebral Artery M4 Aneurysm Surgery Using Navigation-CT Angiography

  • Lee, Seung-Hwan;Bang, Jae-Seung
    • Journal of Korean Neurosurgical Society
    • /
    • v.42 no.6
    • /
    • pp.478-480
    • /
    • 2007
  • Unruptured non-traumatic dissecting aneurysm in the M4 segment of the middle cerebral artery (MCA) accompanied by complete occlusion of the ipsilateral internal cerebral artery (ICA) has never been reported. A 41-year-old man presented with an infarction manifesting as left-sided weakness and dysarthria. Magnetic resonance angiography revealed a subacute stage infarction in the right MCA territory and complete occlusion of the right ICA. Angiography demonstrated aneurysmal dilatation of the M4 segment of the right MCA. Surgery was performed to prevent hemorrhage from the aneurysm. The aneurysm was proximally clipped guided by Navigation-CT angiography and flow to the distal MCA was restored by superficial temporal artery-middle cerebral artery (STA-MCA) anastornosis. We report this rare case with literature review.