• 제목/요약/키워드: Shamir and Adleman (RSA)

검색결과 14건 처리시간 0.019초

사용자 인증 시스템의 보안성 향상을 위한 생체인식 데이터의 암호화 (Encryption of Biometrics data for Security Improvement in the User Authentication System)

  • 박우근
    • 전기전자학회논문지
    • /
    • 제9권1호
    • /
    • pp.31-39
    • /
    • 2005
  • 본 논문에서는 생체인식 데이터의 보안성을 향상시키기 위하여 MD5(Message Digest5) 와 RSA(Ron Rivest, Adi Shamir, Len Adleman) 알고리즘 등을 이용한 새로운 생체인식 데이터 전송 모델을 제시함으로써 보다 안전하게 사용자 인증을 수행할 수 있도록 하였다. 즉, 클라이언트를 통해 생체인식 종류 가운데 지문을 입력 하도록 하고, 처리된 지문을 서버로 전송한다. 지문 정보가 전송 될 때, 외부로부터의 불법적인 생체 정보를 가로채는 등의 문 제를 해결하기 위해 MD5 알고리즘을 이용하여 정보를 Digest화하고, 이것을 RSA 방식으로 다시 전송하는 과정을 거치도록 하는 것을 보여주었으며, 암호화 되지 않은 일반 텍스트 데이터와 생체 데이터, 암호화 하여 전송하는 생체 데이터의 전송 속도 및 보안성을 각각 비교 실험 하였다. 이러한 개선된 방법을 통하여 사용자 인증을 수행함으로써 인증 절차를 간소화하고 좀 더 정확하고 안정된 방법으로 여러 분야에 적용될 수 있을 것으로 예상 된다.

  • PDF

RSA-type Algebra Structures

  • Tran, Long D.;Tran, Thu D.;Choi, Deokjai;Nguyen, Thuc D.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권6호
    • /
    • pp.2835-2850
    • /
    • 2016
  • RSA is a public key cryptosystem that is currently the most popularly used in information security. Development of RSA variants has attracted many researchers since its introduction in 1978 by Ron Rivest, Adi Shamir, and Leonard Adleman. In this paper, we propose an algebraic structure for RSA and show that the proposed structure covers all known RSA variants. The usefulness of the proposed structure is then proved by showing that, following the structure we can construct a RSA variant based on the Bergman ring. We compare the original RSA and its variants from the point of view of factoring the modulus to determine why the original RSA is widely used than its variants.

카오스 이론을 이용한 암호화 기법 (Encrytion Method Based on Chaos Technique)

  • 정성용;김태식
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 1998년도 가을 학술발표논문집 Vol.25 No.2 (2)
    • /
    • pp.45-47
    • /
    • 1998
  • 본 연구에서는 로버트 메이의 논리차이방정식(Logistic difference equation)을 이용하여 ASCII코드로 만들어진 문서를 암호화 할 수 있도록 하는 카오스 LCC(Logistic Chaos Cryptosystem)을 제안한다. 카오스를 이용한 암호화 기법은 기존의 암호화 기법으로 알려진 DES(Data Encrypion Standard)나 RSA(Rivest,Shamir,Adleman)등과는 비교되는 기법으로 초기 조건에 민감한 카오스의 특징을 이용하였다. 실험결과 제안된 LCC 기법을 통해 암호문은 카오스적으로 표현되었으며, 원문과 암호문 사이에 어떠한 관련성도 찾아 볼수 없었다. 향후 안전성이나 처리속도에 대한 검증과 표준화 문제 및 멀티미디어 자료등에 대한 암호화 기법을 계속 연구해야 할 것이다.

  • PDF

보안성 및 범용성이 강화된 3세대 블록체인 플랫폼 "큐본" ("Q-Bone", a 3rd Generation Blockchain Platform with Enhanced Security and Flexibility)

  • 임노간;이요한;조지연;이성수
    • 전기전자학회논문지
    • /
    • 제24권3호
    • /
    • pp.791-796
    • /
    • 2020
  • 본 논문에서는 보안성이 강화된 3세대 블록체인 플랫폼인 "큐본"을 개발하였다. "큐본"은 3세대 블록체인의 특징인 BP(block producer)를 도입하여 처리 속도를 높였다. "큐본"의 장점으로는 보안성이 높은 RSA (Rivest-Shamir-Adleman)와 속도가 빠른 AES (advanced encryption standard)를 혼용하여 보안성과 속도를 모두 높였으며, 서로 다른 프로그래밍 언어를 사용하는 앱과 블록체인을 연결해주는 게이트웨이를 채용하여 범용성을 높였으며, 과도한 횟수의 트랜잭션이 발생하는 경우에는 이 트랜잭션을 하나로 묶어서 배포함으로서 처리 속도를 높였으며, 트랜잭션 데이터에 시퀀스 해쉬를 삽입하여 검색 속도를 높였다. "큐본"은 펫 커뮤니티 서비스, 학원-강사-학생 매칭 서비스에 적용되어 정확하고 효과적으로 동작하는 것을 확인하였으며, "큐본"의 트랜잭션 처리 속도는 3,557 TPS (transactions per second)로 매우 높은 성능을 보여주었다.

An IPSO-KELM based malicious behaviour detection and SHA256-RSA based secure data transmission in the cloud paradigm

  • Ponnuviji, N.P.;Prem, M. Vigilson
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권11호
    • /
    • pp.4011-4027
    • /
    • 2021
  • Cloud Computing has emerged as an extensively used technology not only in the IT sector but almost in all sectors. As the nature of the cloud is distributed and dynamic, the jeopardies present in the current implementations of virtualization, numerous security threats and attacks have been reported. Considering the potent architecture and the system complexity, it is indispensable to adopt fundamentals. This paper proposes a secure authentication and data sharing scheme for providing security to the cloud data. An efficient IPSO-KELM is proposed for detecting the malicious behaviour of the user. Initially, the proposed method starts with the authentication phase of the data sender. After authentication, the sender sends the data to the cloud, and the IPSO-KELM identifies if the received data from the sender is an attacked one or normal data i.e. the algorithm identifies if the data is received from a malicious sender or authenticated sender. If the data received from the sender is identified to be normal data, then the data is securely shared with the data receiver using SHA256-RSA algorithm. The upshot of the proposed method are scrutinized by identifying the dissimilarities with the other existing techniques to confirm that the proposed IPSO-KELM and SHA256-RSA works well for malicious user detection and secure data sharing in the cloud.

IC 카드용 타원곡선 암호 알고리즘 (Elliptic Curve Cryptography Algorithms for IC Card)

  • 이택희;서창호;김영철;이태훈;윤보현
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제10권4호
    • /
    • pp.319-327
    • /
    • 2004
  • 본 논문에서는 IC 카드 용 ECC(Elliptic Curve Cryptography) 및 ECKCDSA(Elliptic Curve KCDSA) 알고리즘 설계, 구현 및 테스트 결과에 대해 기술하고 있다. 타원곡선 암호는 160 비트의 키 길이를 이용하여 현재 사용되는 공개키 암호 알고리즘(RSA)과 동등한 안전도를 제공해준다. 또한. 짧은 키 길이를 사용하기 때문에 작은 메모리와 처리 능력이 제한된 IC 카드나 이동 통신 등과 같은 분야에서 매우 유용하게 사용될 수 있으며, ECC나 ECKCDSA를 자바 카드 상에 구현하여 사용함으로써 사용자들은 보다 강화된 보안성과 안전성을 제공받을 수 있을 것이다.

Utilizing Block chain in the Internet of Things for an Effective Security Sharing Scheme

  • Sathish C;Yesubai Rubavathi, C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권6호
    • /
    • pp.1600-1619
    • /
    • 2023
  • Organizations and other institutions have recently started using cloud service providers to store and share information in light of the Internet of Things (IoT). The major issues with this storage are preventing unauthorized access and data theft from outside parties. The Block chain based Security Sharing scheme with Data Access Control (BSSDAC) was implemented to improve access control and secure data transaction operations. The goal of this research is to strengthen Data Access Control (DAC) and security in IoT applications. To improve the security of personal data, cypher text-Policy Attribute-Based Encryption (CP-ABE) can be developed. The Aquila Optimization Algorithm (AOA) generates keys in the CP-ABE. DAC based on a block chain can be created to maintain the owner's security. The block chain based CP-ABE was developed to maintain secures data storage to sharing. With block chain technology, the data owner is enhancing data security and access management. Finally, a block chain-based solution can be used to secure data and restrict who has access to it. Performance of the suggested method is evaluated after it has been implemented in MATLAB. To compare the proposed method with current practices, Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are both used.

The Novel Efficient Dual-field FIPS Modular Multiplication

  • Zhang, Tingting;Zhu, Junru;Liu, Yang;Chen, Fulong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권2호
    • /
    • pp.738-756
    • /
    • 2020
  • The modular multiplication is the key module of public-key cryptosystems such as RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography). However, the efficiency of the modular multiplication, especially the modular square, is very low. In order to reduce their operation cycles and power consumption, and improve the efficiency of the public-key cryptosystems, a dual-field efficient FIPS (Finely Integrated Product Scanning) modular multiplication algorithm is proposed. The algorithm makes a full use of the correlation of the data in the case of equal operands so as to avoid some redundant operations. The experimental results show that the operation speed of the modular square is increased by 23.8% compared to the traditional algorithm after the multiplication and addition operations are reduced about (s2 - s) / 2, and the read operations are reduced about s2 - s, where s = n / 32 for n-bit operands. In addition, since the algorithm supports the length scalable and dual-field modular multiplication, distinct applications focused on performance or cost could be satisfied by adjusting the relevant parameters.

Practical Silicon-Surface-Protection Method using Metal Layer

  • Yi, Kyungsuk;Park, Minsu;Kim, Seungjoo
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • 제16권4호
    • /
    • pp.470-480
    • /
    • 2016
  • The reversal of a silicon chip to find out its security structure is common and possible at the present time. Thanks to reversing, it is possible to use a probing attack to obtain useful information such as personal information or a cryptographic key. For this reason, security-related blocks such as DES (Data Encryption Standard), AES (Advanced Encryption Standard), and RSA (Rivest Shamir Adleman) engines should be located in the lower layer of the chip to guard against a probing attack; in this regard, the addition of a silicon-surface-protection layer onto the chip surface is a crucial protective measure. But, for manufacturers, the implementation of an additional silicon layer is burdensome, because the addition of just one layer to a chip significantly increases the overall production cost; furthermore, the chip size is increased due to the bulk of the secure logic part and routing area of the silicon protection layer. To resolve this issue, this paper proposes a practical silicon-surface-protection method using a metal layer that increases the security level of the chip while minimizing its size and cost. The proposed method uses a shift register for the alternation and variation of the metal-layer data, and the inter-connection area is removed to minimize the size and cost of the chip in a more extensive manner than related methods.

Novel Method for DNA-Based Elliptic Curve Cryptography for IoT Devices

  • Tiwari, Harsh Durga;Kim, Jae Hyung
    • ETRI Journal
    • /
    • 제40권3호
    • /
    • pp.396-409
    • /
    • 2018
  • Elliptic curve cryptography (ECC) can achieve relatively good security with a smaller key length, making it suitable for Internet of Things (IoT) devices. DNA-based encryption has also been proven to have good security. To develop a more secure and stable cryptography technique, we propose a new hybrid DNA-encoded ECC scheme that provides multilevel security. The DNA sequence is selected, and using a sorting algorithm, a unique set of nucleotide groups is assigned. These are directly converted to binary sequence and then encrypted using the ECC; thus giving double-fold security. Using several examples, this paper shows how this complete method can be realized on IoT devices. To verify the performance, we implement the complete system on the embedded platform of a Raspberry Pi 3 board, and utilize an active sensor data input to calculate the time and energy required for different data vector sizes. Connectivity and resilience analysis prove that DNA-mapped ECC can provide better security compared to ECC alone. The proposed method shows good potential for upcoming IoT technologies that require a smaller but effective security system.