• Title/Summary/Keyword: TLS

Search Result 276, Processing Time 0.028 seconds

An Implement TLS VPN Client for Gooroom OS (국산 개방형 구름 OS를 위한 TLS VPN Client)

  • Park, J.P.
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.452-454
    • /
    • 2018
  • 본 논문에서는 국내 OS시장의 편중화 현상을 해결하기 위해 개발된 개방형 OS 인 구름 플랫폼에서 동작 할 수 있는 가상사설망(Virtual Private Network, VPN) Client를 암호화 기술, 터널링 기술을 적용한 사용자 인증 기반의 안전한 통신망을 제공하는 목적에서 TLS[1](Transport Layer Security,TLS 1.2) 프로토콜을 사용하여 원천기술을 개발하며 이의 고도화를 추구한다.

  • PDF

An Implement TLS VPN for Internet of Things (IoT기기를 위한 TLS VPN 구현)

  • Park, J.P
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.191-192
    • /
    • 2015
  • 본 논문에서는 최근 급성장하는 사물인터넷(Internet of Things, IoT) 시장의 안전한 원격 네트워크 통신을 위한 가상사설망(Virtual Private Network, VPN) 구축을 TLS(Transport Layer Security, TLS 1.0 또는 SSL 3.0) 프로토콜을 사용하여 암호화 기술, 터널링 기술을 적용한 인증 기반의 안전한 통신망을 제공하는 목적에서 기술개발의 고도화를 추구한다.

  • PDF

FIR System Identification Method Using Collaboration Between RLS (Recursive Least Squares) and RTLS (Recursive Total Least Squares) (RLS (Recursive Least Squares)와 RTLS (Recursive Total Least Squares)의 결합을 이용한 새로운 FIR 시스템 인식 방법)

  • Lim, Jun-Seok;Pyeon, Yong-Gook
    • The Journal of the Acoustical Society of Korea
    • /
    • v.29 no.6
    • /
    • pp.374-380
    • /
    • 2010
  • It is known that the problem of FIR filtering with noisy input and output data can be solved by a total least squares (TLS) estimation. It is also known that the performance of the TLS estimation is very sensitive to the ratio between the variances of the input and output noises. In this paper, we propose a convex combination algorithm between the ordinary recursive LS based TLS (RTLS) and the ordinary recursive LS (RLS). This combined algorithm is robust to the noise variance ratio and has almost the same complexity as the RTLS. Simulation results show that the proposed algorithm performs near TLS in noise variance ratio ${\gamma}{\approx}1$ and that it outperforms TLS and LS in the rage of 2 < $\gamma$ < 20. Consequently, the practical workability of the TLS method applied to noisy data has been significantly broadened.

A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS

  • Behrens, Reinhard;Ahmed, Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6092-6115
    • /
    • 2017
  • This paper demonstrates a case for an end-to-end pure Application Security Layer for reliable and confidential communications within an Internet of Things (IoT) constrained environment. To provide a secure key exchange and to setup a secure data connection, Transport Layer Security (TLS) is used, which provides native protection against replay attacks. TLS along with digital signature can be used to achieve non-repudiation within app-to-app communications. This paper studies the use of TLS over the JavaScript Object Notation (JSON) via a The Constrained Application Protocol (CoAP) RESTful service to verify the hypothesis that in this way one can provide end-to-end communication flexibility and potentially retain identity information for repudiation. As a proof of concept, a prototype has been developed to simulate an IoT software client with the capability of hosting a CoAP RESTful service. The prototype studies data requests via a network client establishing a TLS over JSON session using a hosted CoAP RESTful service. To prove reputability and integrity of TLS JSON messages, JSON messages was intercepted and verified against simulated MITM attacks. The experimental results confirm that TLS over JSON works as hypothesised.

New EAP-TLS based on Password Authentication (패스워드 기반 EAP-TLS)

  • Lee, Sok-Joon;Nyang, Dae-Hun;Chung, Byung-Ho;Chung, Kyo-Il
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1067-1070
    • /
    • 2002
  • EAP(Extensible Authentication Protocol)[3]은 다양한 인증 방법을 제공하기 위한 표준 인증 메커니즘이다. EAP는 PPP[16], 802.1x[17] 등에서 사용되며, 실제 인증 능력을 가지는 TLS[2] 등과 같은 인증 프로토콜과 결합하여 사용된다. TLS(Transport Layer Security)는 두 peer 간에 전송계층에서 상호 인증, 무결성, 기밀성을 제공하기 위해 개발되었다. TLS 는 상호 인증을 위하여 공개키 기반 인증서를 사용한다. 그러나, 인증서를 사용하는 것은 대부분의 사용자들이 ID, password 기반의 응용에 익숙하다는 것을 생각하면 일반적인 인증 방법이 아님을 알 수 있다. 따라서, EAP-TLS와 같은 인증 방법 역시 그런 면에서 PPP 혹은 802.1x에서 사용하기에 부적합하다고 볼 수 있다. 본 논문에서는 패스워드 기반 인증 및 키교환 프레임웍을 TLS 에 적용하고 이를 다시 EAP 와 결합한다. 패스워드 기반 EAP-TLS 는 인증서에 관련된 복잡한 연산을 수행하지 않으면서도 안전성에 있어 수학적 증명을 가지며, PPP 혹은 802.1x 서비스를 받고자 하는 사용자가 인증서를 가질 필요가 없는 장점을 가지게 된다.

  • PDF

Robust Total Least Squares Method and its Applications to System Identifications (견인한 완전최소자승법과 시스템 식별에의 적용)

  • Kim, Jin-Young;Choi, Seung-Ho
    • The Journal of the Acoustical Society of Korea
    • /
    • v.15 no.4
    • /
    • pp.93-97
    • /
    • 1996
  • The Total Least Squares(TLS) method is an unbiased estimator for solving overdetermined sets of linear equations Ax${\simeq}$b when errors occur in all data. However, as well as Least Squares(LS) method it doesn't show robustness while the errors have a heavy tailed probability density function. In this paper we proposed a robust method of TLS (Robust TLS, ROTLS) based on the characteristics of TLS solution. And the ROTLS is verified by applying it to system identification problems.

  • PDF

Accuracy Analysis of Earthwork Volume Estimating for Photogrammetry, TLS, MMS (토공사 계측 방식(Photogrammetry, TLS, MMS)별 토공량 산정 정밀도 분석)

  • Park, Jae-Woo;Yeom, Dong-Jun;Kang, Tai-Kyung
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.24 no.4_2
    • /
    • pp.453-465
    • /
    • 2021
  • Recently, photogrammetry, TLS(Terrestrial Laser Scanner), MMS(Mobile Mapping System)-based techniques have been applied to estimate earthwork volume for construction management. The primary objective of this study is to analyze the accuracy of earthwork volume estimating between photogrammetry and TLS, MMS that improves the traditional surveying method in convenience, estimating accuracy. For this, the following research works are conducted sequentially; 1) literature review, 2) core algorithm analysis, 3) surveying data acquisition using photogrammetry, TLS, MMS, 4) estimated earthwork volume comparison according to surveying method. As a result of the experiment, it was analyzed that there were earthwork volume errors of 1,207.5m3 (14.03%) of UAV-based digital map, 391.5m3(4.55%) of UAV, TLS integrated digital map, and 294.9m3(3.43%) of UAV, MMS integrated digital map. It is expected that the result of this study will be enormous due to the availability of the analyzed data.

New Security Approaches for SSL/TLS Attacks Resistance in Practice (SSL/TLS 공격에 대한 신규 대응 방안)

  • Phuc, Tran Song Dat;Lee, Changhoon
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.169-185
    • /
    • 2017
  • Juliano Rizzo and Thai Duong, the authors of the BEAST attack [11, 12] on SSL, have proposed a new attack named CRIME [13] which is Compression Ratio Info-leak Made Easy. The CRIME exploits how data compression and encryption interact to discover secret information about the underlying encrypted data. Repeating this method allows an attacker to eventually decrypt the data and recover HTTP session cookies. This security weakness targets in SPDY and SSL/TLS compression. The attack becomes effective because the attacker is enable to choose different input data and observe the length of the encrypted data that comes out. Since Transport Layer Security (TLS) ensures integrity of data transmitted between two parties (server and client) and provides strong authentication for both parties, in the last few years, it has a wide range of attacks on SSL/TLS which have exploited various features in the TLS mechanism. In this paper, we will discuss about the CRIME and other versions of SSL/TLS attacks along with countermeasures, implementations. We also present direction for SSL/TLS attacks resistance in practice.

Development of a New RAIM Algorithm for GPS Applications I (GPS 응용을 위한 새로운 RAIM 알고리즘 개발 I)

  • Jeon, ChangWan
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2004.05a
    • /
    • pp.774-777
    • /
    • 2004
  • RAIM techniques based on TLS have rarely born addressed because TLS requires a great number of computations. In this paper, the special form of the observation matrix H, that is, one column is exactly known, is exploited so as to develop a new TLS-based sequential algorithm to identify an errant satellite. The algorithm makes us enjoy the advantages of TLS with less computational burden. The proposed algorithm is verified through a numerical simulation.

  • PDF

A System for SSL/TLS Vulnerability Detection of Servers (서버 SSL/TLS 취약점 자동 탐지를 위한 시스템 개발)

  • Cho, Sungwon;Choi, Hyunsang;Heo, Gyu;Cho, Sanghyun;Kim, Young-Gab
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.145-153
    • /
    • 2018
  • SSL (Secure Socket Layer) and TLS (Transport Layer Security) are widely used protocols for secure and encrypted communication over a computer network. However, there have been reported several security vulnerabilities of SSL/TLS over the years. The vulnerabilities can let an adversary carry out critical attacks on SSL/TLS enabled servers. In this paper, we have developed a system which can periodically scan SSL/TLS vulnerabilities on internal network servers and quickly detects, reports and visualizes the vulnerabilities. We have evaluated the system on working servers of Naver services and analyzed detected vulnerabilities. 816 vulnerabilities are found on 213 internal server domains (4.2 vulnerabilities on average) and most vulnerable servers are not opened to public. However, 46 server domains have old vulnerabilites which were found 2016. We could patch and response to SSL/TLS vulnerabilites of servers by leveraging the proposed system.