• Title/Summary/Keyword: Man-In-The-Middle

Search Result 614, Processing Time 0.029 seconds

Electronic Payment Protocol using GDHP Blind Signature Scheme (GDHP 은닉서명기법을 이용한 전자지불 프로토콜)

  • Lee, Hyun-Ju;Rhee, Chung-Sei
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.12-20
    • /
    • 2006
  • In this paper, we propose electronic payment protocol using GDHP blind signature scheme to activate e-business in the wire/wireless integrated environment. The protocol applied elliptic curve algorithm on the GDHP base and improved the efficiency of the existing blind signature technique on the basis of communication frequency and calculation number. And the protocol accelerated speed and strengthened safety against man-in-the-middle attacks and forward secrecy because the certification between individuals is performed by the session key created by Weil paring using elliptic curve cryptosystem in the limited entity $F_q$ instead of the certification used in the existing PayWord protocol.

  • PDF

Secure NTRU-based Authentication and Key Distribution Protocol in Quantum Computing Environments (양자 컴퓨팅 환경에 안전한 NTRU 기반 인증 및 키 분배 프로토콜)

  • Jeong, SeongHa;Lee, KyungKeun;Park, YoungHo
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1321-1329
    • /
    • 2017
  • A quantum computer, based on quantum mechanics, is a paradigm of information processing that can show remarkable possibilities of exponentially improved information processing. This paradigm can be solved in a short time by calculating factoring problem and discrete logarithm problem that are typically used in public key cryptosystems such as RSA(Rivest-Shamir-Adleman) and ECC(Elliptic Curve Cryptography). In 2013, Lei et al. proposed a secure NTRU-based key distribution protocol for quantum computing. However, Lei et al. protocol was vulnerable to man-in-the-middle attacks. In this paper, we propose a NTRU(N-the truncated polynomial ring) key distribution protocol with mutual authentication only using NTRU convolution multiplication operation in order to maintain the security for quantum computing. The proposed protocol is resistant to quantum computing attacks. It is also provided a secure key distribution from various attacks such as man-in-the middle attack and replay attack.

The Fast and Secure Authentication Mechanism for Proxy Mobile IPv6 (고속의 안전한 Proxy Mobile IPv6 인증 메커니즘)

  • Park, Chang-Seop;Kang, Hyun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.11-24
    • /
    • 2012
  • Without a proper protection mechanism for the signaling messages to be used for the mobility support in the Proxy Mobile IPv6 (PMIPv6), it is also vulnerable to several security attacks such as redirect attack, MITM (Man-In-The-Middle) attack, replay attack and DoS (Denial of Service) attack as in Mobile IPv6. In this paper, we point out some problems of previous authentication mechanisms associated with PMIPv6, and also propose a new fast and secure authentication mechanism applicable to PMIPv6. In addition, it is also shown that the proposed one is more efficient and secure than the previous ones.

A Countermeasure against the Abatement Attack to the Security Server (중간자공격을 이용한 보안서버 무효화공격에 대한 대응법)

  • Cho, Seong-Min;Lee, Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.94-102
    • /
    • 2016
  • In this work we propose a new method to countermeasure against the abatement attack to the security server that is induced by man-in-the-middle attack. To that purpose, we first investigate the state of the art in the current research about the abatement attack. After that, we propose a new countermeasure method that can cope with the unresolved problems in the current method, which can cover diverse types of network.

A study on the vulnerability of OTP implementation by using MITM attack and reverse engineering (MITM 공격과 리버스 엔지니어링을 이용한 OTP 적용환경의 취약점 연구)

  • Kang, Byung-Tak;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.83-99
    • /
    • 2011
  • OTP (One Time Password) is widely used for protecting accounts on Internet banking, portal services and online game services in Korea. OTP is very strong method for enforcing account security but there are several ways for exploiting vulnerabilities caused by implementation errors. These attacks can work because of the weakness from OTP enabled system's vulnerabilities, not for OTP's algorithm itself. In this paper, we present the known attack scenarios such as MITM (Man-in-the-Middle) attack and various reverse engineering techniques; also, we show the test result of the attacks and countermeasures for these attacks.

A Study on the Improvement of Sex Education in Middle and High School Girls -Gyeong Nam Area- (중등학교의 성교육 개선방안을 위한 연구 -경남지역 여학생을 중심으로-)

  • 구자옥;박정희;이남기
    • Journal of Korean Home Economics Education Association
    • /
    • v.9 no.2
    • /
    • pp.131-142
    • /
    • 1997
  • The purpose of this study was to collect fundamental data for sex education by investigating the actual conditions of sex education, concerns about sex, knowledge of sex and consciousness about sex. The subjects were 212 middle school girls and 219 high school girls in Ggyeong Nam. The results were as follows 1. There was no significant difference between middle school girls in knowledge of sex. 2. The most frequently experienced problem concering other sex was about dating and the many consultants were friends. 3. The stimulation of sexual desire was brought by film$.$TV$.$VTR, and advertisement, and sex information was acquired from friends or magazines in both schools students. 4. The reason of high school students for needing sex education was to solve moral problems and the reason of middle school students was to solve the anxiety in adolescence. 5. The students wanted their sex educator to be the expert in the field of sex education, home economist and nurse teacher, in order. 6. The contents of sex education desired by students were; physiological differences of a man and woman, etiquette and matter with other sex, a sexual problem of teenager and pregnancy$.$delivery$.$child care.

  • PDF

A Study on Urinary Incontinence Related Health Problems in Women above Middle Age in Rural Areas and Their Coping with the Problems (농촌 지역 중년기 이후 여성들의 요실금 관련 건강문제와 대처)

  • Kim, Chunmi;Lee, Hung Sa;Kim, Eun Man
    • Research in Community and Public Health Nursing
    • /
    • v.24 no.3
    • /
    • pp.368-376
    • /
    • 2013
  • Purpose: The purpose of this study was to identify the current urinary incontinence states in women above middle age dwelling in rural areas and their coping with the problems. Methods: The participants were 261 women above middle age. Data were collected from February to May, 2012 using a structured questionnaire. The data were analyzed with the SPSS/WIN 20 program. Results: The frequency of urinary incontinence in women above middle age was 45.4%. There were significant differences in urinary incontinence due to age, education, job status, frequency of delivery, and menstrual status. And, there were significant relations among urinary symptoms, difficulty of ADL, incontinence stress and depression. Frequently used coping-methods with urinary incontinence were washing frequently in order to avoid awful smell, paying attention to perineal cleaning, and going to restroom frequently. Conclusion: Community nurses who are in charge of primary health care ought to assess urinary incontinence and develop a urinary incontinence program that includes psychological and social factors.

A Study on Change of Fashion Taste of Korean Middle-Aged Men -Focused on Newspaper Media from the 1960s-1980s- (한국 중년 남성의 패션 취향 변화 연구 -1960~1980년대 신문 매체를 중심으로-)

  • Lee, Nahyun;Ha, Jisoo
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.42 no.1
    • /
    • pp.26-39
    • /
    • 2018
  • This study analyzed fashion taste changes for middle-aged men (40-50s) from the 1960s-1980s through newspapers evaluated as socially influential media. As a result, the fashion interest of middle-aged men in the 1960s was very low, and the formation and selection of fashion taste was mainly decided by the wife. However, as the interest in fashion and fashion gradually increased in the 1970s, the interest and taste of fashion in middle-aged men started to change. In the 1980s, social equality and women's advancement into society began, and initiated the appearance of a youthful-looking casual style and establishing an individual subjectivity about fashion taste. Based on this, the specificity of the change of fashion taste among Korean middle-aged men in the 1960s-1980s were as follows. First, the changes in the aesthetic sense of middle-aged men and the increase of fashion interest were due to changes in socio-cultural appearance standards. Second, there was an increase in the pursuit of individuality due to the weakening of fashion consciousness as a collective norm. Third, there were change in subjectivity about fashion taste and consumption.

Self-Updating One-Time Password Mutual Authentication Protocol for Ad Hoc Network

  • Xu, Feng;Lv, Xin;Zhou, Qi;Liu, Xuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1817-1827
    • /
    • 2014
  • As a new type of wireless network, Ad hoc network does not depend on any pre-founded infrastructure, and it has no centralized control unit. The computation and transmission capability of each node are limited. In this paper, a self-updating one-time password mutual authentication protocol for Ad hoc network is proposed. The most significant feature is that a hash chain can update by itself smoothly and securely through capturing the secure bit of the tip. The updating process does not need any additional protocol or re-initialization process and can be continued indefinitely to give rise to an infinite length hash chain, that is, the times of authentication is unlimited without reconstructing a new hash chain. Besides, two random variable are added into the messages interacted during the mutual authentication, enabling the protocol to resist man-in-the-middle attack. Also, the user's identity information is introduced into the seed of hash chain, so the scheme achieves anonymity and traceability at the same time.

A study of Association between Growth and Body Composition in Teenagers (청소년의 성장과 체성분과의 상관성에 관한 연구)

  • 홍상훈;김성환;강창완
    • The Journal of Korean Medicine
    • /
    • v.22 no.4
    • /
    • pp.114-120
    • /
    • 2001
  • Objectives : Man adapts himself to nature, so accordingly as he grows up, changes of body composition appear. This study measured the changes of body compositions on the ground of Sasang constitution and seasons Methods : 253 middle school students who live in Busan were studied from the 20th of March, 1999 to the 20th of March, 2001. We measured height and body compositions with Inbody 3.0, six times during that period. Results : According as they grew up, total body water, muscle area, body weight, BMI (Body Mass Index), BMR (Basal Metabolic Rate), ACM (Arm Muscle Circumference), and BCM (Body Cell Mass) increased, but fat body weight ratio decreased. From March to June, total body water, muscle area, height, ACM, and BCM increased. From September to December fat body weight, fat body weight ratio, waist hip ratio increased as compared with other seasons. Height of Soyangin and BMI of both Soyangin and Taeumin increased more than those of other groups, with statistical significance Conclusions : The growth of man is adapting oneself to changes of nature, and it corresponds to the theory of (correspondence between man and universe).

  • PDF