• 제목/요약/키워드: authenticated

검색결과 366건 처리시간 0.02초

경관주택의 선정기준과 성향에 관한 연구 -강원도 춘천시 농촌경관인증주택을 중심으로- (A Study on Standard and Tendency of Landscape Housing -Focused on the Rural Landscape Authenticated Housing of Chuncheon City, Gangwon Province-)

  • 심재학;윤영활;최장순
    • 한국농촌건축학회논문집
    • /
    • 제11권3호
    • /
    • pp.19-28
    • /
    • 2009
  • This research aimed at showing an improvement direction in the future by analyzing the tendency to select a rural landscape housing and the characteristics centering around the data of the landscape-authenticated housing executed in Chuncheon City from 2005 to 2008. For 4 years, 25 houses in all were authenticated by Chuncheon City after being selected as landscape housing. As the result of analyzing the authenticated 25 housing, lots of landscape houses were located in natural green areas, and small-scale houses of $99m^2$ or less in the house size were preferred. The structures introducing the nature-friendly materials such as wood, yellow earth and clay continued to increase in the house structure. And in the selection of the authenticated houses, the landscape architecture and the harmony with the surrounding environment had a big effect on the selection.

  • PDF

ANALYSIS OF THE SECURITY OF GENERIC HOMOMORPHIC AUTHENTICATED ENCRYPTION

  • Jinsu Kim
    • East Asian mathematical journal
    • /
    • 제39권3호
    • /
    • pp.291-298
    • /
    • 2023
  • Recently, a new type of encryption called Homomorphic Authenticated Encryption (HAE) has been proposed. This combines the functionality of homomorphic encryption with authentication. Several concrete HAE schemes have been developed and security results for homomorphic authenticated encryption, designed by combining a homomorphic message authentication scheme with a homomorphic secret-key encryption, have been partially reported. In this paper, we analyze the security of a design method that combines homomorphic message authentication and homomorphic encryption, with a focus on the encryption after authentication (EAA) type. The results of our analysis show that while non-forgeability and indistinguishability are maintained, strong non-forgeability is not.

Multi-party Password-Authenticated Key Exchange Scheme with Privacy Preservation for Mobile Environment

  • Lu, Chung-Fu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권12호
    • /
    • pp.5135-5149
    • /
    • 2015
  • Communications among multi-party must be fast, cost effective and secure. Today's computing environments such as internet conference, multi-user games and many more applications involve multi-party. All participants together establish a common session key to enable multi-party and secure exchange of messages. Multi-party password-based authenticated key exchange scheme allows users to communicate securely over an insecure network by using easy-to-remember password. Kwon et al. proposed a practical three-party password-based authenticated key exchange (3-PAKE) scheme to allow two users to establish a session key through a server without pre-sharing a password between users. However, Kwon et al.'s scheme cannot meet the security requirements of key authentication, key confirmation and anonymity. In this paper, we present a novel, simple and efficient multi-party password-based authenticated key exchange (M-PAKE) scheme based on the elliptic curve cryptography for mobile environment. Our proposed scheme only requires two round-messages. Furthermore, the proposed scheme not only satisfies security requirements for PAKE scheme but also achieves efficient computation and communication.

A Highly Secure Identity-Based Authenticated Key-Exchange Protocol for Satellite Communication

  • Yantao, Zhong;Jianfeng, Ma
    • Journal of Communications and Networks
    • /
    • 제12권6호
    • /
    • pp.592-599
    • /
    • 2010
  • In recent years, significant improvements have been made to the techniques used for analyzing satellite communication and attacking satellite systems. In 2003, a research team at Los Alamos National Laboratory, USA, demonstrated the ease with which civilian global positioning system (GPS) spoofing attacks can be implemented. They fed fake signals to the GPS receiver so that it operates as though it were located at a position different from its actual location. Moreover, Galileo in-orbit validation element A and Compass-M1 civilian codes in all available frequency bands were decoded in 2007 and 2009. These events indicate that cryptography should be used in addition to the coding technique for secure and authenticated satellite communication. In this study, we address this issue by using an authenticated key-exchange protocol to build a secure and authenticated communication channel for satellite communication. Our protocol uses identity-based cryptography. We also prove the security of our protocol in the extended Canetti-Krawczyk model, which is the strongest security model for authenticated key-exchange protocols, under the random oracle assumption and computational Diffie-Hellman assumption. In addition, our protocol helps achieve high efficiency in both communication and computation and thus improve security in satellite communication.

NIST Lightweight Cryptography Standardization Process: Classification of Second Round Candidates, Open Challenges, and Recommendations

  • Gookyi, Dennis Agyemanh Nana;Kanda, Guard;Ryoo, Kwangki
    • Journal of Information Processing Systems
    • /
    • 제17권2호
    • /
    • pp.253-270
    • /
    • 2021
  • In January 2013, the National Institute of Standards and Technology (NIST) announced the CAESAR (Competition for Authenticated Encryption: Security, Applicability, and Robustness) contest to identify authenticated ciphers that are suitable for a wide range of applications. A total of 57 submissions made it into the first round of the competition out of which 6 were announced as winners in March 2019. In the process of the competition, NIST realized that most of the authenticated ciphers submitted were not suitable for resource-constrained devices used as end nodes in the Internet-of-Things (IoT) platform. For that matter, the NIST Lightweight Cryptography Standardization Process was set up to identify authenticated encryption and hashing algorithms for IoT devices. The call for submissions was initiated in 2018 and in April 2019, 56 submissions made it into the first round of the competition. In August 2019, 32 out of the 56 submissions were selected for the second round which is due to end in the year 2021. This work surveys the 32 authenticated encryption schemes that made it into the second round of the NIST lightweight cryptography standardization process. The paper presents an easy-to-understand comparative overview of the recommended parameters, primitives, mode of operation, features, security parameter, and hardware/software performance of the 32 candidate algorithms. The paper goes further by discussing the challenges of the Lightweight Cryptography Standardization Process and provides some suitable recommendations.

Signcryption을 이용한 안전한 인증된 키 교환 프로토콜 연구 (Secure Authenticated key Exchange Protocol using Signcryption Scheme)

  • 김락현;염흥열
    • 정보보호학회논문지
    • /
    • 제16권4호
    • /
    • pp.139-146
    • /
    • 2006
  • 1997년 Yuliang Zheng에 의해 제안된 Signcryption은 서명과 암호 기법을 결합한 하이브리드 공개키 프리미티브로서 서명 기법 후 암호 기법을 각각 적용한 기법보다 계산 및 통신비용 측면에서 높은 효율성을 갖는 기법이다. 또한 PAK(Pass-word-Authenticated Key Exchange) 프로토콜은 사용자가 암기하거나 휴대하기 쉬운 짧은 길이의 패스워드를 기반으로 통신주체를 상호 인증하고, 결과적으로 안전한 통신을 위하여 충분히 큰 길이의 세션키를 분배하는 프로토콜이다. 본 논문에서는 PAK와 Signcryption의 특징을 이용하여 참여자의 비밀 정보를 이용한 상호 인증 및 안전한 통신을 위한 키 분배 프로토콜을 제안한다. 그리고 제안 프로토콜의 보안성을 증명하고 효율성을 비교한다.

Advanced Modification 공격에 안전한 패스워드 기반 키 동의 프로토콜 (Password-based Authenticated Key Agreement Protocol Secure Against Advanced Modification Attack)

  • 곽진;오수현;양형규;원동호
    • 정보처리학회논문지C
    • /
    • 제11C권3호
    • /
    • pp.277-286
    • /
    • 2004
  • 사용자의 인증기술로 패스워드를 기반으로 하는 메커니즘이 널리 사용되고 있다. 패스워드를 기반으로 하는 메커니즘은 사용자들이 기억하기 쉬운 패스워드를 선택하여 사용하는 경우가 대부분이므로 패스워드 추측 공격(password guessing attack)에 취약하다는 문제점이 있다. 이러한 패스워드 추측 공격을 방지하기 위해 많은 키 분배 프로토콜이 제안되고 있으며, 최근 Seo-Sweeny는 패스워드를 기반으로 하는 인증키 동의(SAKA Simple Authenticated Key Agreement) 프로토콜을 제안하였다. 본 논문에서는 먼저, 패스워드를 기반으로 하는 SAKA 프로토콜과 이를 개선한 방식들의 키 설정 및 키 확인 과정을 살펴보고, 각각의 프로토콜이 본 논문에서 정의한 Advanced Modification 공격에 대해 취약함을 보인다. 그리고 Advanced Modification 공격에 대해 안전한 패스워드 기반 인증 키 동의 프로토콜을 제안한다.

개선된 '간단한 인증키 동의 (Simple Authenticated Key Agreement)'프로토콜 (An Enhancement of Simple Authenticated Key Agreement Protocol)

  • 김영신;김윤정;황준
    • 인터넷정보학회논문지
    • /
    • 제4권6호
    • /
    • pp.95-102
    • /
    • 2003
  • Diffle-Hellman 키 교환 방법은 두 통신자간에 공통 세션키를 생성할 수 있으나, 중간자 공격 (mon-in-the-middle attack)이 가능하다는 문제점을 안고 있다. 이러한 문제점을 해결하기 위하여 여러 가지 프로토콜들이 제안되었는데 Simple Authenticated Key Agreement (SAKA) 프로토콜도 그 중 하나이다. 이 프로토콜은 Seo-Sweeney, Tseng, Ku-Wang 등에 의하여 각각 제안된 바 있는데, 본 논문에서는 이들 프로토콜을 종합적으로 개선하여 안전하면서도 수행성능이 개선된 새로운 프로토콜을 제안한다. 기존 프로토콜들이 공통 세션키 생성단계와 검증단계를 구분하여 이루어지는 것에 비하여 본 논문에서 제안하는 프로토콜은 생성 단계와 검증 단계를 한꺼번에 처리함으로써, 수행시간 단축의 효과를 갖는다.

  • PDF

Cross-Realm 환경에서 패스워드기반 키교환 프로토콜 (Password-Based Key Exchange Protocols for Cross-Realm)

  • 이영숙
    • 디지털산업정보학회논문지
    • /
    • 제5권4호
    • /
    • pp.139-150
    • /
    • 2009
  • Authentication and key exchange are fundamental for establishing secure communication channels over public insecure networks. Password-based protocols for authenticated key exchange are designed to work even when user authentication is done via the use of passwords drawn from a small known set of values. There have been many protocols proposed over the years for password authenticated key exchange in the three-party scenario, in which two clients attempt to establish a secret key interacting with one same authentication server. However, little has been done for password authenticated key exchange in the more general and realistic four-party setting, where two clients trying to establish a secret key are registered with different authentication servers. In fact, the recent protocol by Yeh and Sun seems to be the only password authenticated key exchange protocol in the four-party setting. But, the Yeh-Sun protocol adopts the so called "hybrid model", in which each client needs not only to remember a password shared with the server but also to store and manage the server's public key. In some sense, this hybrid approach obviates the reason for considering password authenticated protocols in the first place; it is difficult for humans to securely manage long cryptographic keys. In this work, we introduce a key agreement protocol and a key distribution protocol, respectively, that requires each client only to remember a password shared with its authentication server.