• Title/Summary/Keyword: Signature Identification

Search Result 115, Processing Time 0.022 seconds

A Digital Multisignature Scheme Suitable for Transmission to Multi-destination by EDI Message (EDI 메시지 동보 전송에 적합한 디지탈 다중 서명 방법)

  • 윤성현;김태윤
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.6
    • /
    • pp.981-993
    • /
    • 1994
  • As the EDI message is the commercial electronic document having legal binding forces, it is necessary to use the method of digital signature for the message integrity and identification between trading partners. This research proposes a new digital multisignature scheme suitable for transmission to multi-destination of the EDI message. The proposed scheme is based on Fiat-Shamir signature scheme and can perform the message authentication suitable for the EDI message. It can verify the message forged by a hash function attack from intruder or intruder. It also can perform the digital signature using smaller hash value than that of Fiat-Shamir signature scheme. When the EDI message is transmitted to multi-destination, all designated receivers can perform the digital signature faster and safer.

  • PDF

ID-Based Cryptosystem and Digital Signature Scheme Using Discrete Logarithm Complexity (이산대수 문제를 이용한 ID 기본 암호시스템과 디지틀 서명방식에 관한 연구)

  • 염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.1 no.1
    • /
    • pp.3-15
    • /
    • 1991
  • in 1984 Shamir proposed the concept of ID(identity)-based cryptosystem and digital signature scheme wich does not require any public file for storing the user' s public keys. In this paper, the concept of the ID-based cryptosystem based on discrete logarithm problem using the conven-tional public-key cryptosystems is described, and the implementation method of the ID-based cryptosystem is also presented. The new digital signaturw schme based on the ID-based crypto-system is proposed and possible atacks are considered and analyzed for the security of digital signature scheme. The proposed ID-based schemes are particularrly useful for smart card and personal identification card application.

Automated Signature Sharing to Enhance the Coverage of Zero-day Attacks (제로데이 공격 대응력 향상을 위한 시그니처 자동 공유 방안)

  • Kim, Sung-Ki;Jang, Jong-Soo;Min, Byoung-Joon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.4
    • /
    • pp.255-262
    • /
    • 2010
  • Recently, automated signature generation systems(ASGSs) have been developed in order to cope with zero-day attacks with malicious codes exploiting vulnerabilities which are not yet publically noticed. To enhance the usefulness of the signatures generated by (ASGSs) it is essential to identify signatures only with the high accuracy of intrusion detection among a number of generated signatures and to provide them to target security systems in a timely manner. This automated signature exchange, distribution, and update operations have to be performed in a secure and universal manner beyond the border of network administrations, and also should be able to eliminate the noise in a signature set which causes performance degradation of the security systems. In this paper, we present a system architecture to support the identification of high quality signatures and to share them among security systems through a scheme which can evaluate the detection accuracy of individual signatures, and also propose a set of algorithms dealing with exchanging, distributing and updating signatures. Though the experiment on a test-bed, we have confirmed that the high quality signatures are automatically saved at the level that the noise rate of a signature set is reduced. The system architecture and the algorithm proposed in the paper can be adopted to a automated signature sharing framework.

Performance of rotational mode based indices in identification of added mass in beams

  • Rajendrana, Prakash;Srinivasan, Sivakumar M.
    • Structural Engineering and Mechanics
    • /
    • v.54 no.4
    • /
    • pp.711-723
    • /
    • 2015
  • This study investigates the identification of added mass and its location in the glass fiber reinforced polymer (GFRP) beam structures. The main emphasis of this paper is to ascertain the importance of inclusion of rotational degrees of freedom (dofs) in the introduction of added mass or damage identification. Two identification indices that include the rotational dofs have been introduced in this paper: the modal force index (MFI) and the modal rotational curvature index (MRCI). The MFI amplifies damage signature using undamaged numerical stiffness matrix which is related to changes in the altered mode shapes from the original mode shapes. The MRCI is obtained by using a higher derivative of rotational mode shapes. Experimental and numerical results are compared with the existing methods leading to a conclusion that the contributions of the rotational modes play a key role in the identification of added mass. The authors believe that the similar results are likely in the case of damage identification also.

Application Traffic Classification using PSS Signature

  • Ham, Jae-Hyun;An, Hyun-Min;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2261-2280
    • /
    • 2014
  • Recently, network traffic has become more complex and diverse due to the emergence of new applications and services. Therefore, the importance of application-level traffic classification is increasing rapidly, and it has become a very popular research area. Although a lot of methods for traffic classification have been introduced in literature, they have some limitations to achieve an acceptable level of performance in real-time application-level traffic classification. In this paper, we propose a novel application-level traffic classification method using payload size sequence (PSS) signature. The proposed method generates unique PSS signatures for each application using packet order, direction and payload size of the first N packets in a flow, and uses them to classify application traffic. The evaluation shows that this method can classify application traffic easily and quickly with high accuracy rates, over 99.97%. Furthermore, the method can also classify application traffic that uses the same application protocol or is encrypted.

Fuzzy identity-based signature scheme from lattice and its application in biometric authentication

  • Zhang, Xiaojun;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2762-2777
    • /
    • 2017
  • A fuzzy identity based signature (FIBS) scheme allows a signer with identity ${\omega}$ to generate a signature which could be verified under identity ${\omega}^{\prime}$ if and only if ${\omega}$ and ${\omega}^{\prime}$ are within a certain distance of each other as judged by some metric. In this paper, we propose an efficient FIBS scheme from lattice assumption, which can resist quantum-computer attacks. Without using the Bonsai Tree technique, we utilize the lattice basis delegation technique to generate the private key, which has the advantage of keeping the lattice dimension invariant. We also prove that our proposed scheme is existentially unforgeable under an adaptive chosen message and identity attack in the random oracle model. Compared with existing scheme, our proposed scheme is much more efficient, especially in terms of communication overhead. Since our FIBS scheme possesses similar error-tolerance property, it can be well applied in post-quantum communication biometric authentication environments, where biometric identifiers such as fingerprints, voice, iris and gait are used in human identification.

Forecast and Present Technology of Hand Vascular Pattern Recognition System (손혈관 인식 시스템의 경쟁기술현황과 전망)

  • Kim, Jae-Woo;Yeo, Woon-Dong;Bae, Sang-Jin;Seong, Kyung-Mo
    • Proceedings of the KIEE Conference
    • /
    • 2004.05a
    • /
    • pp.114-116
    • /
    • 2004
  • Biometrics consist of technologies that support automatic identification or verification of identity based on behavioral or physical traits. Biometrics can authenticate identities since they measure unique individual characteristics including fingerprints, hand geometry, iris, hand vascular patterns and facial characteristics. we review the state of the hand vascular patterns identification technology and compare other competitive authentication technologies such as cryptography, electronic signature and PKI.

  • PDF

GENESIS: An Automatic Signature-generating Method for Detecting Internet Disk P2P Application Traffic (GENESIS: Internet Disk P2P 트래픽 탐지를 위한 시그너춰 자동 생성 방안)

  • Lee, Byung-Joon;Yoon, Seung-Hyun;Lee, Young-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.4
    • /
    • pp.246-255
    • /
    • 2007
  • Due to the bandwidth-consuming characteristics of the heavy-hitter P2P applications, it has become critical to have the capability of pinpointing and mitigating P2P traffic. Traditional port-based classification scheme is no more adequate for this purpose because of newer P2P applications, which incorporating port-hopping techniques or disguising themselves as HTTP-based Internet disk services. Alternatively, packet filtering scheme based on payload signatures suggests more practical and accurate solution for this problem. Moreover, it can be easily deployed on existing IDSes. However, it is significantly difficult to maintain up-to-date signatures of P2P applications. Hence, the automatic signature generation method is essential and will be useful for successful signature-based traffic identification. In this paper, we suggest an automatic signature generation method for Internet disk P2P applications and provide an experimental results on CNU campus network.

Enhanceement of Vertical Resolution of GPR data through Signature Deconvolution (신호파형 역대합을 통한 지중레이다 자료의 수직해상도 향상)

  • Kim, Gi-Yeong;Son, Ho-Ung;Lee, Ju-Han;Hong, Myeong-Ho
    • Journal of the Korean Geophysical Society
    • /
    • v.9 no.1
    • /
    • pp.1-6
    • /
    • 2006
  • To remove ringing and increase vertical resolution of GRP data, signature deconvolution was applied to GPR data obtained using a 100 MHz antenna in the Soyang Lake. The signature was extracted through stacking reflection signals from the lake bottom. Results of this deterministic deconvolution was compared with those from the conventional Wienner method. Due to increased vertical resolution, both deconvolution methods are able to resolve three or more layers in an apparent single layer on the input data. However, identification of reflection boundaries from ringing is not easy due to poor definition in the output data of the Wienner filter. On the contrary, the signature deconvolution greatly enhances both vertical resolution and definition of reflection boundaries, showing detailed internal stratigraphic features of the three sedimentary layers. Since extraction of signature at various depths is possible, this deconvolution method can be appled effectively to unstationary GPR data.

  • PDF

Identification of B52-dependent Gene Expression Signature and Alternative Splicing Using a D. melanogaster B52-null Mutant

  • Hong, Sun-Woo;Jung, Mi-Sun;Kim, Eun-Kyung;Lee, Dong-Ki;Kim, So-Youn
    • Bulletin of the Korean Chemical Society
    • /
    • v.30 no.2
    • /
    • pp.323-326
    • /
    • 2009
  • SR proteins are essential splicing regulators and also modulate alternative splicing events, which function both as redundant and substrate-specific manner. The Drosophila B52/SRp55, a member of the SR protein family, is essential for the fly development in vivo, as deletion of B52 gene results in lethality of animals at the second instar larval stage. Identification of the splicing target genes of B52 thus should be crucial for the understanding of the specific developmental role of B52 in vivo. In this study, we performed whole-genome DNA microarray experiments with a B52- knock-out animal. Analysis of the microarray data not only provided the B52-dependent gene expression signature, but also revealed a larval-stage specific, alternative splicing target gene of B52. Our result thus provides a starting point to understand the essential function of B52 at the organismal level.