• Title/Summary/Keyword: Secret codes

Search Result 24, Processing Time 0.019 seconds

Secure Data Forwarding based on Source Routing in Mobile Ad Hoc Networks (소스 라우팅 기반의 이동 Ad-hoc 네트워크에서 안전한 데이터 전송 방법)

  • Roh, Hyo-Sun;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12C
    • /
    • pp.1188-1193
    • /
    • 2007
  • This paper proposes a secure data forwarding scheme on source routing-based ad-hoc networks. The scheme uses two hash-key chains generated from a trusted third party to generate Message Authentication Codes for data integrity The selected MAC keys are delivered to the ad-hoc node using a pre-shared secret between the trusted third party and a node. The proposed scheme does not require the PKI, or the provisioning of the pre-shared secrets among the ad-hoc nodes.

A Study on the Authenticity Verification of UxNB Assisting Terrestrial Base Stations

  • Kim, Keewon;Park, Kyungmin;Kim, Jonghyun;Park, Tae-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.131-139
    • /
    • 2022
  • In this paper, to verify the authenticity of UxNB that assists terrestrial base stations, the solutions for SI (System Information) security presented in 3GPP TR 33.809 are analyzed from the perspective of UxNB. According to the definition of 3GPP (Third Generation Partnership Project), UxNB is a base station mounted on a UAV (Unmanned Aerial Vehicle), is carried in the air by the UAV, and is a radio access node that provides a connection to the UE (User Equipment). Such solutions for SI security can be classified into hash based, MAC (Message Authentication Codes) based, and digital signature based, and a representative solution for each category is introduced one by one. From the perspective of verifying the authenticity of UxNB for each solution, we compare and analyze the solutions in terms of provisioning information and update, security information leakage of UxNB, and additionally required amount of computation and transmission. As a result of the analysis, the solution for verifying the authenticity of the UxNB should minimize the secret information to be stored in the UxNB, be stored in a secure place, and apply encryption when it is updated over the air. In addition, due to the properties of the low computing power of UxNB and the lack of power, it is necessary to minimize the amount of computation and transmission.

A Data Hiding Scheme for Binary Image Authentication with Small Image Distortion (이미지 왜곡을 줄인 이진 이미지 인증을 위한 정보 은닉 기법)

  • Lee, Youn-Ho;Kim, Byoung-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.2
    • /
    • pp.73-86
    • /
    • 2009
  • This paper proposes a new data hiding scheme for binary image authentication with minimizing the distortion of host image. Based on the Hamming-Code-Based data embedding algorithm, the proposed scheme makes it possible to embed authentication information into host image with only flipping small number of pixels. To minimize visual distortion, the proposed scheme only modifies the values of the flippable pixels that are selected based on Yang et al's flippablity criteria. In addition to this, by randomly shuffling the bit-order of the authentication information to be embedded, only the designated receiver, who has the secret key that was used for data embedding, can extract the embedded data. To show the superiority of the proposed scheme, the two measurement metrics, the miss detection rate and the number of flipped pixels by data embedding, are used for the comparison analysis between the proposed scheme and the previous schemes. As a result of analysis, it has been shown that the proposed scheme flips smaller number of pixels than the previous schemes to embed the authentication information of the same bit-length. Moreover, it has been shown that the proposed scheme causes smaller visual distortion and more resilient against recent steg-analysis attacks than the previous schemes by the experimental results.

Paradox, Impossibility or Superabundance - Theories of Gift of Mauss, Derrida and Ricœur (역설, 불가능성 혹은 넘침 - 모스, 데리다, 리쾨르의 선물론 -)

  • Byun, Kwang-bai
    • Cross-Cultural Studies
    • /
    • v.52
    • /
    • pp.1-29
    • /
    • 2018
  • The notion of 'gift' is one of the effective and fruitful codes for understanding Western civilization. In this study, we will shed light on several meanings, especially by comparing among the three French philosophers that expressed interest in this notion: they are Mauss, Derrida and $Ric{\oe}ur$. Called "father of French ethnography", Mauss claims, in his famous article "Essay on the Gift", that the gift is paradoxically a kind of economic exchange dominated by three obligations: to give, receive, and return. But he strives to establish a moral theory based on the obligation to give. Under the influence of Mauss, Derrida deconstructs the theory of Mauss by devoting attention to 'time', one of the determining elements in studies on the gift. Derrida observes that the gift is established just at the extremely short moment of emergence of the act of giving and that this act is transformed into an economic exchange with passing of time. From it, the impossibility of the gift is derived despite its concrete and real emergence and existence. Under the influence of Mauss, $Ric{\oe}ur$, for his part, is interested in the notion of giving as part of the dialectic between 'love' and 'justice'. According to him, whereas justice is dominated by the economy of gift, namely the logic of equivalence, love, by the logic of 'superabundance'. He focuses on establishing 'Supra-ethics' by considering the fact that the gift is at the core of his religious and philosophical vision. Finally, let us point out that in $Ric{\oe}ur$, this notion of gift ('don') is closely linked to forgiveness ('pardon'), that holds in it the secret of understanding regarding the 'fallible' and 'capable' man.