• Title/Summary/Keyword: challenge-response

Search Result 507, Processing Time 0.025 seconds

PC User Authentication using Hand Gesture Recognition and Challenge-Response

  • Shin, Sang-Min;Kim, Minsoo
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.8 no.2
    • /
    • pp.79-87
    • /
    • 2018
  • The current PC user authentication uses character password based on user's knowledge. However, this can easily be exploited by password cracking or key-logging programs. In addition, the use of a difficult password and the periodic change of the password make it easy for the user to mistake exposing the password around the PC because it is difficult for the user to remember the password. In order to overcome this, we propose user gesture recognition and challenge-response authentication. We apply user's hand gesture instead of character password. In the challenge-response method, authentication is performed in the form of responding to a quiz, rather than using the same password every time. To apply the hand gesture to challenge-response authentication, the gesture is recognized and symbolized to be used in the quiz response. So we show that this method can be applied to PC user authentication.

RFID Distance Bounding Protocol Using Multiple Bits Challenge and Response (다중 비트 시도와 응답을 이용한 RFID 거리 한정 프로토콜)

  • Jeon, Il-Soo;Yoon, Eun-Jun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.3
    • /
    • pp.19-26
    • /
    • 2012
  • To resist the relay attacks in RFID system, it is commonly used RFID distance bounding protocols using the round trip time measurement for 1 bit challenge and response between a reader and a tag. If the success probability of relay attacks for the 1 bit challenge and response can be reduced in these protocols, it is possible to make an efficient distance bounding protocol. In this paper, we propose an efficient RFID distance bounding protocol based on 2 bit challenge and response which is modified the RFID distance bounding protocol proposed by Hancke and Khun based on 1 bit challenge and response. The success probability of relay attack for the proposed protocol is (7/16)n for the n times of challenge and response, which is much lower than (3/4)n given by Hancke and Khun's protocol.

A practical challenge-response authentication mechanism for a Programmable Logic Controller control system with one-time password in nuclear power plants

  • Son, JunYoung;Noh, Sangkyun;Choi, JongGyun;Yoon, Hyunsoo
    • Nuclear Engineering and Technology
    • /
    • v.51 no.7
    • /
    • pp.1791-1798
    • /
    • 2019
  • Instrumentation and Control (I&C) systems of nuclear power plants (NPPs) have been continuously digitalized. These systems have a critical role in the operation of nuclear facilities by functioning as the brain of NPPs. In recent years, as cyber security threats to NPP systems have increased, regulatory and policy-related organizations around the world, including the International Atomic Energy Agency (IAEA), Nuclear Regulatory Commission (NRC) and Korea Institute of Nuclear Nonproliferation and Control (KINAC), have emphasized the importance of nuclear cyber security by publishing cyber security guidelines and recommending cyber security requirements for NPP facilities. As described in NRC Regulatory Guide (Reg) 5.71 and KINAC RS015, challenge response authentication should be applied to the critical digital I&C system of NPPs to satisfy the cyber security requirements. There have been no cases in which the most robust response authentication technology like challenge response has been developed and applied to nuclear I&C systems. This paper presents a challenge response authentication mechanism for a Programmable Logic Controller (PLC) system used as a control system in the safety system of the Advanced Power Reactor (APR) 1400 NPP.

Challenge-Response Authentication with a Smartphone (스마트폰을 이용한 Challenge-Response 인증)

  • Thiranant, Non;Hui, Yvonne Tan Ying;Kim, TaeYong;Lee, HoonJae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.07a
    • /
    • pp.187-190
    • /
    • 2012
  • This paper proposes an one-time authentication system for web applications by making use of the quick-response code, which is widely used nowadays. The process is not time-consuming. It does not require any browser extensions or specific hardware to complete a task. The system uses QR code which is basically a two-dimensional black and white image encoding a piece of digital information. When a user logs into a site, the web server will generate a challenge encoded to form a QR code. The user captures a picture of QR code with a mobile camera which results in decoding the QR code. The challenge shall be sent back to the server; the web server then logs the PC browser in. The authentication using Challenge-Response is easy to understand and the process is fast. The system proposes the improvement of usability and security of online authentication.

  • PDF

Challenge-Response Based Secure RFID Authentication Protocol for Distributed Database Environment (분산 데이터베이스 환경에 적합한 Challenge-Response 기반의 안전한 RFID 인증 프로토콜)

  • Rhee Keun-Woo;Oh Dong-Kyu;Kwak Jin;Oh Soo-Hyun;Kim Seung-Joo;Won Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.309-316
    • /
    • 2005
  • Recently, RFID system is a main technology to realize ubiquitous computing environments, but the feature of the RFID system may bring about various privacy problem. So, many kinds of protocols To resolve this problem are researched. In this paper, we analyse the privacy problem of the previous methods and propose more secure and effective authentication protocol to protect user's privacy. Then we prove that the proposed protocol is secure and effective as we compare the proposed protocol with previous methods. The proposed protocol is based on Challenge-Response using one-way hash function and random number. The proposed protocol is secure against replay attack, spoofing attack and so on. In addition, the proposed protocol is proper for distributed database environment.

Gut Health of Pigs: Challenge Models and Response Criteria with a Critical Analysis of the Effectiveness of Selected Feed Additives - A Review

  • Adewole, D.I.;Kim, I.H.;Nyachoti, C.M.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.29 no.7
    • /
    • pp.909-924
    • /
    • 2016
  • The gut is the largest organ that helps with the immune function. Gut health, especially in young pigs has a significant benefit to health and performance. In an attempt to maintain and enhance intestinal health in pigs and improve productivity in the absence of in-feed antibiotics, researchers have evaluated a wide range of feed additives. Some of these additives such as zinc oxide, copper sulphate, egg yolk antibodies, mannan-oligosaccharides and spray dried porcine plasma and their effectiveness are discussed in this review. One approach to evaluate the effectiveness of these additives in vivo is to use an appropriate disease challenge model. Over the years, researchers have used a number of challenge models which include the use of specific strains of enterotoxigenic Escherichia coli, bacteria lipopolysaccharide challenge, oral challenge with Salmonella enteric serotype Typhimurium, sanitation challenge, and Lawsonia intercellularis challenge. These challenge models together with the criteria used to evaluate the responses of the animals to them are also discussed in this review.

Response to ACTH Challenge in Female Dairy Calves in Relation to Their Milk Yield

  • Szucs, E.;Febel, H.;Janbaz, J.;Huszenicza, Gy.;Mezes, M.;Tran, A.T.;Abraham, Cs.;Gaspardy, A.;Gyorkos, I.;Seenger, J.;Nasser, J.A.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.16 no.6
    • /
    • pp.806-812
    • /
    • 2003
  • Attempts have been made to establish relationship between the response to ACTH challenge in female calves, growth and first lactation performance. A total of 19 Holstein calves weighing 100 kg i. v. were given 0.50 IU of ACTH/kg $BW^{.75}$ (EXACTHIN inj., Richter G., Budapest) at 60 days of age. Serial blood samples were taken at times 0, 0.5, 1, 2, 3, 4 and 5 hours and analyzed for cortisol, glucose insulin and FFA levels. From challenge series the area under the curve from time of administration and the following 5 h were calculated. Negative, and mostly loose relationship between response to ACTH challenge for cortisol, insulin, or FFA and ADWG during growth have been established (p>0.05) with positive one for glucose. Bivariate coefficients of correlation varied within the range from -0.35 to 0.15. Estimations reveal negative correlation between the length of first lactation and cortisol or insulin (r=-0.80, p<0.001 and r=-0.45, p<0.10, resp.) Close association between cortisol or insulin and actual first lactation milk yield was found (r=-0.48, p<0.10; r=-0.64, p<0.01, resp.). Close relationship between the response to ACTH challenge and milk protein yield was present only for insulin (r=-0.59, p<0.05).

Design and Analysis of an Authentication System based on Distance Estimation using Ultrasonic Sensors (초음파 센서를 이용한 거리 기반 인증 시스템의 설계 및 분석)

  • Park, Jin-O;Lee, Mun-Kyu;Lim, Cheol-Su
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.2
    • /
    • pp.94-101
    • /
    • 2009
  • We introduce a user authentication system using distance estimation and a simple challenge response protocol based on a pre-established key. Using the time difference of arrival between an RF signal and an ultrasonic signal, an authenticator verifies if a user's authentication token is within its threshold distance, and it also verifies if the token's response to its random challenge is valid. We implement our authentication system and we analyze the success rates for authentication according to the variations in the distances and facing angles between the authenticator and the token. Our experimental results show that the token is authenticated with very high probability in reasonable settings.

Design of Improvement Challenge-Response Authentication Protocol for RFID System (RFID 시스템에서 개선된 Challenge-Response 인증프로토콜 설계)

  • Yang Sung-Hoon;Lee Kyung-Hyo;Kim Min-Su;Jung Seok-Won;Oh Byeong-Kyun
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.515-518
    • /
    • 2006
  • RFID(Radio Frequency Identification) 시스템이란 무선 라디오 주파수를 이용하여 사물을 식별 및 추적할 수 있는 기술로서 산업 전반에 걸쳐 그 적용성이 확대되고 있으나 불안전한통신상에서 데이터 송 수신 및 태그의 제한적인 계산능력과 한정된 저장 공간의 자원으로 인한 위치 추적, 스푸핑 공격, 재전송공격, 사용자 프라이버시 침해 등의 취약점이 존재한다. 본 논문에서는 기존의 RFID 시스템에 대한 인증 프로토콜들을 분석하고, Challenge Response(C-R) 인증 프로토콜에서 연산량을 줄임으로서 위치 추적과 스푸핑 공격, 재전송 공격에 효율적으로 개선된 C-R 인증 프로토콜을 제안한다.

  • PDF

Implementation of Authentication System with MPCOS-3DES Smartcard (MPCOS-3DES를 이용한 인증 시스템의 구현)

  • 김경훈;박창섭
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.3-14
    • /
    • 1999
  • In this paper, the Client-Server authentication system is proposed and implemented using the smart card on the internet. Based on the MPCOS-3DES smart card manufactured by GEMPLUS, three phases of authentication using the challenge-response mechanism are performed, which includes user-card authentication, client-server authentication, and card-server authentication.