• Title/Summary/Keyword: Stolen

Search Result 149, Processing Time 0.034 seconds

Comparison of Physiological Properties of Gamma-Irradiated Root and Stolen Extracts of Gamcho (Licorice, Glycyrrhiza uralensis Fischer)

  • Cheorun ;Kim, Myung-Cheol;Kim, Kwan-Soo;Kang, Seong-Mo;Kim, Chi-Bong;Lee, Hyun-Ja;Byun, Myung-Woo
    • Preventive Nutrition and Food Science
    • /
    • v.7 no.3
    • /
    • pp.273-277
    • /
    • 2002
  • Physiological properties of root and stolen of Gamcho (Licorice, Glycyrrhiza uralensis Fischer) were compared following irradiation at 20 kGy. The root and stolen of Gamcho were extracted with 70 % ethanol, irradiated and stoved in a 4"C refrigerator. Irradiation induced color changes, electron donating ability (EDA), and tyro-sinase inhibition effect (TIE) were investigated. The color of the non-irradiated stolen extract was darker than the non-irradiated root extract (p<0.05), but irradiation eliminated color differences between stolen and root extracts. Generally, irradiation did not affect EDA and TIE of either of the extracts. However, EDA and TIE were higher in stolen extract than in root extract, when the higher dilution factor was considered. These results indicate that the stolen of Gamcho, which is mostly wasted, is a valuable source of phytochemicals with greater EDA and TIE activities than Gamcho root.root.

An Unproved Optimal Strong-Password Authentication (I-OSPA) Protocol Secure Against Stolen-Verifier Attack and Impersonation Attack (Stolen-Verifier 공격과 Impersonation 공격에 안전한 개선된 OSPA 프로토콜)

  • Kwak, Jin;Oh, Soo-Hyun;Yang, Hyung-Kyu;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.439-446
    • /
    • 2004
  • In the Internet, user authentication is the most important service in secure communications. Although password-based mechanism is the most widely used method of the user authentication in the network, people are used to choose easy-to-remember passwords, and thus suffers from some Innate weaknesses. Therefore, using a memorable password it vulnerable to the dictionary attacks. The techniques used to prevent dictionary attacks bring about a heavy computational workload. In this paper, we describe a recent solution, the Optimal Strong-Password Authentication (OSPA) protocol, and that it is vulnerable to the stolen-verifier attack and an impersonation attack. Then, we propose an Improved Optimal Strong-Password Authentication (I-OSPA) protocol, which is secure against stolen-verifier attack and impersonation attack. Also, since the cryptographic operations are computed by the processor in the smart card, the proposed I-OSPA needs relatively low computational workload and communicational workload for user.

A secure token-updated authentication scheme using security key (비밀키를 이용한 토큰 업데이트 보안 인증 기법)

  • Liang, Jun;Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.1
    • /
    • pp.89-97
    • /
    • 2007
  • Recently, a large number of authentication schemes based on smart cards have been proposed, using the thinking of OTP (one-time password) to withstand replay attack. Unfortunately, if these schemes implement on PCs instead of smart cards, most of themcannot withstand impersonation attack and Stolen-Verifier attack since the data on PCs is easy to read and steal. In this paper, a secure authentication scheme based on a security key and a renewable token is proposed to implement on PCs. A comparison with other schemes demonstrates the proposed scheme has following merits: (1) Withstanding Stolen-Verifier attack (2) Withstanding Impersonation attack (3) Providing mutual authentication; (4) Easy to construct secure session keys.

  • PDF

A Verifier-free Scheme for User Authentication and Access Control Using Smart Cards: Improvement of Chen-Yeh's Method (스마트 카드를 사용한 검증자 없는 사용자 인증 및 접근 제어 방법: Chen-Yeh 방법의 개선)

  • Kim, Yong;Chung, Min Gyo
    • Journal of Internet Computing and Services
    • /
    • v.14 no.4
    • /
    • pp.43-51
    • /
    • 2013
  • User authentication and access control are two important components in high security applications. Recently, Chen and Yeh proposed a method to integrate both of them seamlessly. However, Chen-Yeh's scheme is vulnerable to a stolen verifier attack, since it maintains a smart card identifier table in a remote server. Therefore, this paper modifies Chen-Yeh's scheme and propose a new integrated authentication and access control scheme that is resilient to the stolen verifier attack while inheriting all the merits of Chen-Yeh's scheme. Security analysis shows that the proposed scheme withstands well-known security attacks and exhibits many good features.

Analysis of the Lee-Chen's One-Time Password Authentication Scheme (Lee와 Chen의 일회용 비밀번호 인증기법 분석)

  • You, Il-Sun;Kim, Bo-Nam;Kim, Heung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.285-292
    • /
    • 2009
  • In 2005, Lee and Chen suggested an enhanced one-time password authentication scheme which can prevent the stolen verifier attack that the Yeh-Shen-Whang's scheme has. The Lee-Chen's scheme addresses the stolen verifier attack by deriving each user's pre-shared secret SEED from the server secret. However, we investigated the weakness of the Lee-Chen's scheme and found out that it was suffering from the off-line dictionary attack on the server secret. We demonstrated that the off-line dictionary attack on the server secret can be easily tackled with only the help of the Hardware Security Modules (HSM). Moreover, we improved the scheme not to be weak to the denial of service attack and allow compromise of the past session keys even though the current password is stolen. Through the comparison between the Lee-Chen's scheme and the proposed one, we showed that the proposed one is stronger than other.

Invariant Iris Key Generation Method Robust To Stolen Token Scenario (ID 도난 시나리오에 강인한 불변 홍채 키 생성 방법)

  • Lee, Youn-Joo;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.959-960
    • /
    • 2008
  • Recently, biometric authentication mechanism has been used to provide high level of security in cryptographic systems. In this paper, we propose an efficient method of generating invariant iris key to be applied in cryptographic systems. In order to generate iris key and improve the performance at the stolen token scenario, multiple random projection technique was combined with multiple linear transformation methods. From the experimental results, we proved that invariant iris keys were generated and the proposed method was robust to stolen token scenario.

  • PDF

Study on the Transplanting Methods of Raising Turf seedling from Seedling Tray; III. Effects of Turf Growth to Transplanting Times (이식시기가 잔디 생장에 미치는 영향)

  • Lee Myoung-Sun;Lim Sang-Cheol
    • Korean Journal of Plant Resources
    • /
    • v.18 no.1
    • /
    • pp.194-197
    • /
    • 2005
  • This experiment was conducted to investigate the effect of turf growth characteristics to different transplanting times. It observed that the turf growth was decreased according to delaying the transplanting time. In respect to the turf growth characteristics, it appeared that there was good for transplanting time to transplant the turf seedling before early July. With sustaining the short day length after early July, it shown that number of branch on stolen, number of nodes and Total length of stolen were apparently decreased. Especially, number of branch on stolon was decreased from 2nd up-growing branch.

Design Flaws and Cryptanalysis of Cui et al's User Authentication Scheme

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.41-48
    • /
    • 2019
  • In 2018, Cui et al proposed a three-factor remote user authentication scheme using biometrics. Cui et al claimed that their authentication scheme is vulnerable to eavesdropping attack, stolen smart card attack, and especially Dos(denial-of-service) attack. Also they claimed that it is safe to password guessing attack, impersonation attack, and anonymity attack. In this paper, however, we analyze Cui et al's authentication scheme and show that it is vulnerable to replay attack, insider attack, stolen smart card attack, and user impersonation attack, etc. In addition, we present the design flaws in Cui et al's authentication scheme as well.

In Vitro Plant Regeneration from Stolen Node Explant in Eremochloa Ophiuroides (Munro) Hack

  • Barampuram, Shyamkumar;Chung, Byung-Yeoup;Lee, Seung-Sik;An, Byung-Chull;Kim, Jae-Sung
    • Journal of Plant Biotechnology
    • /
    • v.34 no.2
    • /
    • pp.161-166
    • /
    • 2007
  • In vitro shoot regeneration and multiple shoot induction has been obtained from the stolen node explants in Eremochloa ophiuroides (Munro) Hack. The highest number of shoots ($10.66{\pm}0.21$) was observed from initial explants after one month culture duration on Murashige and Skoog (MS) medium containing 6-benzyladenine (BA: 0.5 mg/l). First generation shoot was excised and sub-cultured on the same fresh media for further multiplication of shoots. An enhanced number of second round shoots ($15.33{\pm}0.21$) was obtained compared to the initial culture media containing BA (0.5 mg/l). The number of shoots/stolon node was higher among all the concentrations of BA than kinetin (KN). In vitro regenerated shoots were successfully rooted in the phytohormone free MS medium. Plantlets generated with roots were transferred to pots containing compound mixture of soil and kept in green house conditions. Acclimatized plants showed 100% survival rate with normal morphology in green house conditions. The present study demonstrates the effect of explant and different plant growth regulators towards in vitro response in E. ophiuroides. Moreover, the study reveals the effect of cytokinin on induction of shoot number per stolen node explant in E. ophiuroides.