• Title/Summary/Keyword: Signature Identification

Search Result 115, Processing Time 0.041 seconds

Multi User-Authentication System using One Time-Pseudo Random Number and Personal DNA STR Information in RFID Smart Card (RFID 스마트카드내 DNA STR Information과 일회용 의사난수를 사용한 다중 사용자 인증시스템)

  • Sung, Soon-Hwa;Kong, Eun-Bae
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.747-754
    • /
    • 2003
  • Thia paper suggests a milti user-authentication system comprises that DNA biometric informatiom, owner's RFID(Radio Frequency Identification) smartcard of hardware token, and PKI digital signqture of software. This system improved items proposed in [1] as follows : this mechanism provides one RFID smartcard instead of two user-authentication smartcard(the biometric registered seal card and the DNA personal ID card), and solbers user information exposure as RFID of low proce when the card is lost. In addition, this can be perfect multi user-autentication system to enable identification even in cases such as identical twins, the DNA collected from the blood of patient who has undergone a medical procedure involving blood replacement and the DNA of the blood donor, mutation in the DNA base of cancer cells and other cells. Therefore, the proposed system is applied to terminal log-on with RFID smart card that stores accurate digital DNA biometric information instead of present biometric user-authentication system with the card is lost, which doesn't expose any personal DNA information. The security of PKI digital signature private key can be improved because secure pseudo random number generator can generate infinite one-time pseudo randon number corresponding to a user ID to keep private key of PKI digital signature securely whenever authenticated users access a system. Un addition, this user-authentication system can be used in credit card, resident card, passport, etc. acceletating the use of biometric RFID smart' card. The security of proposed system is shown by statistical anaysis.

Extraction of bridge aeroelastic parameters by one reference-based stochastic subspace technique

  • Xu, F.Y.;Chen, A.R.;Wang, D.L.;Ma, R.J.
    • Wind and Structures
    • /
    • v.14 no.5
    • /
    • pp.413-434
    • /
    • 2011
  • Without output covariance estimation, one reference-based Stochastic Subspace Technique (SST) for extracting modal parameters and flutter derivatives of bridge deck is developed and programmed. Compared with the covariance-driven SST and the oscillation signals incurred by oncoming or signature turbulence that adopted by previous investigators, the newly-presented identification scheme is less time-consuming in computation and a more desired accuracy should be contributed to high-quality free oscillated signals excited by specific initial displacement. The reliability and identification precision of this technique are confirmed by a numerical example. For the 3-DOF sectional models of Sutong Bridge deck (streamlined) and Suramadu Bridge deck (bluff) in wind tunnel tests, with different wind velocities, the lateral bending, vertical bending, torsional frequencies and damping ratios as well as 18 flutter derivatives are extracted by using SST. The flutter derivatives of two kinds of typical decks are compared with the pseudo-steady theoretical values, and the performance of $H_1{^*}$, $H_3{^*}$, $A_1{^*}$, $A_3{^*}$ is very stable and well-matched with each other, respectively. The lateral direct flutter derivatives $P_5{^*}$, $P_6{^*}$ are comparatively more accurate than other relevant lateral components. Experimental procedure seems to be more critical than identification technique for refining the estimation precision.

A cryptographic API to provide the secure key protection function (안전한 키보호 기능을 제공하는 암호 API)

  • 김명희;전문석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.334-336
    • /
    • 2004
  • 국내 전자상거래 제품과의 호환성과 확장성을 위하여 국내 전자서명 표준인 KCDSA(Korean Certificate-based Digital Signature Algorithm) 메커니즘을 PKCS(Public Key Cryptographic Standard) #11 암호 API(Application Programming Interface)에 기능을 추가한다. PKCS #11에서 정의한 키 관리(Hey Management) 함수의 입력 파라미터에 암호화할 키를 바로 입력하면 변조된 키를 전달할 수 있으므로, 본 논문에서는 안전한 키보호(Key Protection) 함수를 새로 정의하여 암호화할 키 대신 사용자 PIN(Personal Identification Number: 패스워드) 입력하여 사용자의 KCDSA 개인키와 공개키를 보다 더 안전하게 보관하고자 한다.

  • PDF

Pattern-based Signature Generation for Identification of HTTP Applications (HTTP 응용들의 식별을 위한 패턴 기반의 시그니쳐 생성)

  • Jin, Chang-Gyu;Choi, Mi-Jung
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.1
    • /
    • pp.101-111
    • /
    • 2013
  • Internet traffic volume has been increasing rapidly due to popularization of various smart devices and Internet development. In particular, HTTP-based traffic volume of smart devices is increasing rapidly in addition to desktop traffic volume. The increased mobile traffic can cause serious problems such as network overload, web security, and QoS. In order to solve these problems of the Internet overload and security, it is necessary to accurately detect applications. Traditionally, well-known port based method is utilized in traffic classification. However, this method shows low accuracy since P2P applications exploit a TCP/80 port, which is used for the HTTP protocol; to avoid firewall or IDS. Signature-based method is proposed to solve the lower accuracy problem. This method shows higher analysis rate but it has overhead of signature generation. Also, previous signature-based study only analyzes applications in HTTP protocol-level not application-level. That is, it is difficult to identify application name. Therefore, previous study only performs protocol-level analysis. In this paper, we propose a signature generation method to classify HTTP-based traffics in application-level using the characteristics of typical semi HTTP header. By applying our proposed method to campus network traffic, we validate feasibility of our method.

Identification of Attack Group using Malware and Packer Detection (악성코드 및 패커 탐지를 이용한 공격 그룹 판별)

  • Moon, Heaeun;Sung, Joonyoung;Lee, Hyunsik;Jang, Gyeongik;Kwak, Kiyong;Woo, Sangtae
    • Journal of KIISE
    • /
    • v.45 no.2
    • /
    • pp.106-112
    • /
    • 2018
  • Recently, the number of cyber attacks using malicious code has increased. Various types of malicious code detection techniques have been researched for several years as the damage has increased. In recent years, profiling techniques have been used to identify attack groups. This paper focuses on the identification of attack groups using a detection technique that does not involve malicious code detection. The attacker is identified by using a string or a code signature of the malicious code. In addition, the detection rate is increased by adding a technique to confirm the packing file. We use Yara as a detection technique. We have research about RAT (remote access tool) that is mainly used in attack groups. Further, this paper develops a ruleset using malicious code and packer main feature signatures for RAT which is mainly used by the attack groups. It is possible to detect the attacker by detecting RAT based on the newly created ruleset.

A Study on Efficient Data De-Identification Method for Blockchain DID

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.60-66
    • /
    • 2021
  • Blockchain is a technology that enables trust-based consensus and verification based on a decentralized network. Distributed ID (DID) is based on a decentralized structure, and users have the right to manage their own ID. Recently, interest in self-sovereign identity authentication is increasing. In this paper, as a method for transparent and safe sovereignty management of data, among data pseudonymization techniques for blockchain use, various methods for data encryption processing are examined. The public key technique (homomorphic encryption) has high flexibility and security because different algorithms are applied to the entire sentence for encryption and decryption. As a result, the computational efficiency decreases. The hash function method (MD5) can maintain flexibility and is higher than the security-related two-way encryption method, but there is a threat of collision. Zero-knowledge proof is based on public key encryption based on a mutual proof method, and complex formulas are applied to processes such as personal identification, key distribution, and digital signature. It requires consensus and verification process, so the operation efficiency is lowered to the level of O (logeN) ~ O(N2). In this paper, data encryption processing for blockchain DID, based on zero-knowledge proof, was proposed and a one-way encryption method considering data use range and frequency of use was proposed. Based on the content presented in the thesis, it is possible to process corrected zero-knowledge proof and to process data efficiently.

Automatic identification of Java Method Naming Patterns Using Cascade K-Medoids

  • Kim, Tae-young;Kim, Suntae;Kim, Jeong-Ah;Choi, Jae-Young;Lee, Jee-Huong;Cho, Youngwha;Nam, Young-Kwang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.873-891
    • /
    • 2018
  • This paper suggests an automatic approach to extracting Java method implementation patterns associated with method identifiers using Cascade K-Medoids. Java method implementation patterns indicate recurring implementations for achieving the purpose described in the method identifier with the given parameters and return type. If the implementation is different from the purpose, readers of the code tend to take more time to comprehend the method, which eventually affects to the increment of software maintenance cost. In order to automatically identify implementation patterns and its representative sample code, we first propose three groups of feature vectors for characterizing the Java method signature, method body and their relation. Then, we apply Cascade K-Medoids by enhancing the K-Medoids algorithm with the Calinski and Harrabasez algorithm. As the evaluation of our approach, we identified 16,768 implementation patterns of 7,169 method identifiers from 50 open source projects. The implementation patterns have been validated by the 30 industrial practitioners with from 1 to 6 years industrial experience, resulting in 86% of the precision.

Differentiation of Actinomycete Genera Based on Partial rpoB Gene Sequences

  • Kim, Bum-Joon;Koh, Young-Hwan;Chun, Jong-Sik;Kim, Chang-Jin;Lee, Seung-Hyun;Cho, Moon-Jae;Hyun, Jin-Won;Lee, Keun-Hwa;Cha, Chang-Yong;Kook, Yoon-Hoh
    • Journal of Microbiology and Biotechnology
    • /
    • v.13 no.6
    • /
    • pp.846-852
    • /
    • 2003
  • rpoB DNAs (279 bp) from 34 species of 5 actinomycete genera were sequenced and a phylogenetic tree was constructed based on the sequences obtained. The genera were clearly differentiated in the rpoB tree, forming clades specific to their respective genus. In addition, 2 signature amino acid residues specific to Streptomyces were found in a multiple alignment of the deduced amino acid sequences. To empirically confirm that this rpoB gene analysis system could be used to differentiate actinomycete isolates, the proposed system was used to identify 16 actinomycete isolates from Jeju Island. All isolates were successfully differentiated into the genera Streptomyces and Micromonospora. Accordingly, this is the first report that an rpoB sequence analysis has been effectively used to differentiate actinomycete strains at the genus level.

The Biometric based Mobile ID and Its Application to Electronic Voting

  • Yun, Sung-Hyun;Lim, Heui-Seok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.166-183
    • /
    • 2013
  • It requires a lot of costs and manpower to manage an election. The electronic voting scheme can make the election system economic and trustful. The widespread use of smart phones causes mobile voting to be a major issue. The smart phone can be used as a mobile voting platform since it can carry out many services in addition to basic telephone service. To make mobile voting practical and trustful, we analyzed two subjects of study. Firstly, the way to make a biometric based mobile ID, which has legal binding forces. In mobile voting, user identification is accomplished on line since the voter should be able to vote wherever they go. The digital ID conducts a similar role to the need for a resident card. The user's identity is bound to the resident card legally. To bind the user's identity to the smart phone, we use USIM. Biometric recognition is also needed to authenticate the user, since the user cannot prove him or her on line face-to-face. The proposed mobile ID can be reissued by means of introducing a random secret value. Secondly, the mobile voting scheme is proposed where candidates can accept election results without doubt. The goal of an election is to select a leader among two or more candidates. Existing electronic voting schemes mainly focus on the study of ballot verification accomplished by voters. These approaches are not safe against collusion attacks where candidates and the election administration center are able to collude to fabricate election results. Therefore, a new type of voting and counting method is needed where candidates can directly take part in voting and counting stages. The biometric based multi-signature scheme is used to make the undeniable multi-signed ballot. The ballot cannot be verified without the help of all candidates. If candidates accept election results without a doubt, the fairness of the election is satisfied.

Doppler Profile Extraction to Air-Breathing Targets with PT-Waveform Received Signal and Target Tracking Information on a Ground Radar (지상레이다의 PT-파형 수신신호와 항공기 추적정보를 이용한 항공기 도플러 프로파일 추출)

  • Oh, Hyun-Seok;Kim, Soo-Geun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.2
    • /
    • pp.129-138
    • /
    • 2017
  • This paper has been shown for the extraction of Doppler signature from the radar signal for an air-breathing targets tracked in the ground radar. For the extractions, a Doppler resolution is confirmed from mathematical modeling of PT(pulse train) waveform. Doppler signatures of air-breathing target are varied to radar aspect angle of engine and are determined from physical parameter of jet engine. To confirm such Doppler signatures, the radar signal reflected from the air-breathing target is obtained by our radar signal storage. After this extraction, radar aspect angle of engine has estimated from tracking information. Relative differences of Doppler signatures to radar aspect angle of engine is verified from these results and Doppler profiles for radar target identification appliance are presented.