• Title/Summary/Keyword: banking security

Search Result 286, Processing Time 0.03 seconds

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

Passwordless Protection for Private Key Using USIM Information (USIM 정보를 활용한 패스워드리스 방식의 개인키 보호 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.32-38
    • /
    • 2017
  • Despite the opinion that certificate is useless, half of the population in Korea (approx. 35 million) get an certificate, and use it for internet banking, internet shopping, stock trading, and so on. Most users store their certificates on a usb memory or smartphone, and certificates or passwords stored on such storage media can be easily attacked and used to disguise as legitimate users. Due to these security problem of certificate, a various authentication technologies has been proposed such as smartphone owner authentication using SMS, and a personal authentication using biometric authentication. However, a safe technique is not presented yet without user password, and certificate. In this paper, I proposed a method to secure certificate/private key without a user password using a combination of USIM card and smartphone's information. Even if a hacker gets the user password, the certificate, and the private key, he can not use the certificate. User do not need to remember complex password which is a combination of alphabetic / numeric / special characters, and use his certificate safely.

Design of Encryption/Decryption Core for Block Cipher HIGHT (블록 암호 HIGHT를 위한 암·복호화기 코어 설계)

  • Sonh, Seung-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.778-784
    • /
    • 2012
  • A symmetric block cryptosystem uses an identical cryptographic key at encryption and decryption processes. HIGHT cipher algorithm is 64-bit block cryptographic technology for mobile device that was authorized as international standard by ISO/IEC on 2010. In this paper, block cipher HIGHT algorithm is designed using Verilog-HDL. Four modes of operation for block cipher such as ECB, CBC, OFB and CTR are supported. When continuous message blocks of fixed size are encrypted or decrypted, the desigend HIGHT core can process a 64-bit message block in every 34-clock cycle. The cryptographic processor designed in this paper operates at 144MHz on vertex chip of Xilinx, Inc. and the maximum throughput is 271Mbps. The designed cryptographic processor is applicable to security module of the areas such as PDA, smart card, internet banking and satellite broadcasting.

Structural and Functional Analyses of ProGuard Obfuscation Tool (프로가드 난독화 도구 구조 및 기능 분석)

  • Piao, Yuxue;Jung, Jin-Hyuk;Yi, Jeong Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.8
    • /
    • pp.654-662
    • /
    • 2013
  • Android applications can be easily decompiled owing to their structural characteristics, in which applications are developed using Java and are self-signed so that applications modified in this way can be repackaged. It will be crucial that this inherent vulnerability may be used to an increasing number of Android-based financial service applications, including banking applications. Thus, code obfuscation techniques are used as one of solutions to protect applications against their forgery. Currently, many of applications distributed on Android market are using ProGuard as an obfuscation tool. However, ProGuard takes care of only the renaming obfuscation, and using this method, the original opcodes remain unchanged. In this paper, we thoroughly analyze obfuscation mechanisms applied in ProGuard, investigate its limitations, and give some direction about its improvement.

An Implementation of Smart Card Identification System Using 1 vs. 1 Fingerprint Matching (1대1 지문매칭을 이용한 스마트 카드 인증 시스템의 구현)

  • 최순우;김영길
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.7
    • /
    • pp.1204-1209
    • /
    • 2001
  • According to the rapid development of information and communication, various services are offered using information and communication infrastructure for example e-commerce, internet banking, stock dealings, etc. This time, the most important problem is personal identification. But now secret number that is used to personal identification mostly can be misappropriated. To solve this problem, this paper proposes smart card identification system using 1 vs. 1 fingerprint matching. Information protection and security of smart card excel and use is convenient. And fingerprint becomes the focus of public attention in biometric field. Implemented system in this paper is based on PC. This system stores minutia that is fingerprint information into smart card and compare it with personal minutia. Therefore this system is sure to be on personal identification. If this system is applied to various services, safety degree of services will be enhanced.

  • PDF

Design of Encryption/Decryption Core for Block Cipher Camellia (Camellia 블록 암호의 암·복호화기 코어 설계)

  • Sonh, Seungil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.4
    • /
    • pp.786-792
    • /
    • 2016
  • Camellia was jointly developed by Nippon Telegraph and Telephone Corporation and Mitsubishi Electric Corporation in 2000. Camellia specifies the 128-bit message block size and 128-, 192-, and 256-bit key sizes. In this paper, a modified round operation block which unifies a register setting for key schedule and a conventional round operation block is proposed. 16 ROMs needed for key generation and round operation are implemented using only 4 dual-port ROMs. Due to the use of a message buffer, encryption/decryption can be executed without a waiting time immediately after KA and KB are calculated. The suggested block cipher Camellia algorithm is designed using Verilog-HDL, implemented on Virtex4 device and operates at 184.898MHz. The designed cryptographic core has a maximum throughput of 1.183Gbps in 128-bit key mode and that of 876.5Mbps in 192 and 256-bit key modes. The cryptographic core of this paper is applicable to security module of the areas such as smart card, internet banking, e-commerce and satellite broadcasting.

Finding Smartphone's Factors which Affect Satisfaction or Dissatisfaction based on KANO Model (KANO 모델을 활용한 스마트폰의 만족 및 불만족 요인 분석)

  • Lee, Sang-Gun;Lee, Sin-Seok;Kang, Ju-Young
    • The Journal of Information Systems
    • /
    • v.20 no.3
    • /
    • pp.257-277
    • /
    • 2011
  • The current study categorizes factors of smartphone into three, using KANO model: attractive factors which cause only product satisfaction, must-be factors for dissatisfaction, and one-dimensional factors for both. Based on it, it presents a new model for the effects that smartphone factors have on satisfaction or dissatisfaction. The purpose is to theoretically explain that smartphone factors on which companies and users place a high value can actually affect satisfaction or dissatisfaction. After choosing 15 factors out of 25 which had been selected through literature study, these were divided into attractive, must-be, and one-dimensional ones. 93 out of 109 questionnaires returned were used for analysis. After frequency analysis using SPSS were conducted on the surveys, the factors were grouped, based on KANO table. The grouping results are as follows. Attractive factors include 'expansion slots for external memory, battery desorption, brand awareness, mobile banking and internet telephony'. Must-be ones include 'multi-touch, information security, entertainment, information retrieval, location based service and SNS. Finally, 'screen visibility, size of internal memory, the amount of internal memory, battery life, and response to after-sales service' are classified as one-dimensional factors. A critical finding of this paper is that since the results are different depending on the operating system of smartphones, it must be taken into consideration in studies on smartphones. The wide and rapid spread of smartphones has changed people's lifestyle as well as business environment, which forces companies to compete with each other to adapt to the changed circumstances. In this competitive system, studies on smartphone factors of satisfaction and dissatisfaction are essential for firms to establish a new strategy. From this point of view, the present paper is expected to be a basic material for enterprises not only to develop goods and services that maximize customer satisfaction and minimize dissatisfaction, but also to establish the future business strategy.

A study on Iris Recognition using Wavelet Transformation and Nonlinear Function

  • Hur, Jung-Youn;Truong, Le Xuan
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2004.10a
    • /
    • pp.553-559
    • /
    • 2004
  • In todays security industry, personal identification is also based on biometric. Biometric identification is performed basing on the measurement and comparison of physiological and behavioral characteristics, Biometric for recognition includes voice dynamics, signature dynamics, hand geometry, fingerprint, iris, etc. Iris can serve as a kind of living passport or living password. Iris recognition system is the one of the most reliable biometrics recognition system. This is applied to client/server system such as the electronic commerce and electronic banking from stand-alone system or networks, ATMs, etc. A new algorithm using nonlinear function in recognition process is proposed in this paper. An algorithm is proposed to determine the localized iris from the iris image received from iris input camera in client. For the first step, the algorithm determines the center of pupil. For the second step, the algorithm determines the outer boundary of the iris and the pupillary boundary. The localized iris area is transform into polar coordinates. After performing three times Wavelet transformation, normalization was done using sigmoid function. The converting binary process performs normalized value of pixel from 0 to 255 to be binary value, and then the converting binary process is compare pairs of two adjacent pixels. The binary code of the iris is transmitted to the by server. the network. In the server, the comparing process compares the binary value of presented iris to the reference value in the University database. Process of recognition or rejection is dependent on the value of Hamming Distance. After matching the binary value of presented iris with the database stored in the server, the result is transmitted to the client.

  • PDF

Network Hacking and Implementation Techniques using Faked ARP Reply Unicast Spoofing according to various Server Types (위조 ARP 응답 유니캐스트 스푸핑을 이용한 서버 유형별 네트워크 해킹 및 구현기술 연구)

  • Choi, Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.61-71
    • /
    • 2017
  • ARP Spoofing is a basic and core hacking technology for almost all sniffing. It makes change the flow of packets by faking the 2nd layer MAC address. In this paper we suggested an efficient hacking technology for sniffing remote servers in the switched network environment. The suggested 'Faked ARP Reply Unicast Spoofing' makes the bidirectional packets sniffing possible between the client and server, and it makes simplify the procedures for ARP sniffing and hacking program. In this paper we researched the network hacking and implementation technologies based on the suggested ARP spoofing. And we researched various types of servers hacking such as Root ID and PW of Telnet/FTP server, Root ID and PW of MySQL DB server, ID and PW of Web Portal Server, and account information and transaction history of Web Banking Server. And also we researched the implementation techniques of core hacking programs for the ARP Spoofing.

Measuring Quality of Experience of Internet Protocol Television (IPTV 체감 품질의 측정)

  • Byun, Dae-Ho;Jeon, Hong-Dae
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.3
    • /
    • pp.63-83
    • /
    • 2010
  • IPTV(Internet Protocol Television) is an innovation technology to lead the new media age. Internet protocol television (IPTV) is a next generation television converged with the Internet which are delivered portal services such as information search, games, movies, home shopping and banking. Generally, service quality affects to adopt or use these technologies. Quality of experience (QoE) is more issue to be considered than service quality because of the technological restriction and limitation that IPTV is accessed by the Internet. The QoE is defined as the cognitive and experienced quality measured with users through an experiment and is conceptually related to service quality. The objective of this paper is to suggest a methodology to measure the QoE of IPTV using a user testing. We find significant factors affecting QoE of IPTV through an exploratory study and measure QoE scores. We found the nine factors of graphics, picture, accuracy, access method, quality of contents, usability, security, and performance important for QoE. The QoE scores of picture, graphics, and quality of contents gained over the average score, but the overall score for IPTV service providers was not high and the QoE needs to be improved.