• 제목/요약/키워드: cryptography

검색결과 971건 처리시간 0.046초

케이오스 변조기법을 이용한 광학적 암호시스템의 분석 (Analyses of Quantum Cryptography with Chaos Modulation)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2007년도 춘계종합학술대회
    • /
    • pp.769-772
    • /
    • 2007
  • Quantum cryptography is considered as a promising solution towards absolute security in long term cryptosystems. While the application of quantum cryptography in fiber networks has significant advances, research on the application of quantum cryptography in mobile networks is still prematures. In this paper, we analyses the interests of using quantum technique.

  • PDF

광상관기를 이용한 광 시각 암호의 암복호 평가 (Evauation for Optical Visual Cryptography Encryption by using Optical Correlator)

  • 이상이;류충상;류대현;이승현;김은수
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2001년도 하계종합학술대회 논문집(2)
    • /
    • pp.71-74
    • /
    • 2001
  • Optical visual cryptography was proposed by conjunction of the optical theory with the cryptography. However, it had some difficulties. The problems occurred in the process of transferring data processing system from visual to optics. Therefore, it is appropriate to approach these problems in terms of optics. The results show that the optical visual cryptography system has both the effectiveness and reliability as well as real-time implementation property.

  • PDF

국가 암호정책에 대한 연구 : 암호접근권한을 중심으로 (A Study on the National Cryptographic Policy : About the Right to Access the Cryptographic)

  • 김동훈;권헌영;홍석희
    • 정보보호학회논문지
    • /
    • 제31권1호
    • /
    • pp.99-109
    • /
    • 2021
  • 최근 정보통신기술의 발전으로 통신망을 통하여 소통하는 정보가 증가하고 있으며, 이를 보호하기 위한 기반기술로 암호가 널리 활용되고 있다. 한편, 초창기 암호기술은 군사적 활용을 목적으로 개발되어 국가가 조정·통제하였으나, 정보통신기술의 향상에 따라 민간으로 상당 부분 이전되어 발전되고 있다. 이로 인해, 세계 각 국에서는 민간영역의 암호이용 자유화에 대한 요구와 국가차원의 암호 활용 권한 우위를 두고 마찰이 발생하여 왔다. 본 논문에서는 각 국의 암호 정책 수립과정에서 나타난 국가와 민간의 갈등을 살펴보고 국내의 암호정책 현실을 알아보았다. 이를 바탕으로 균형 있는 암호정책의 적용과 암호산업 발전을 도모하며, 국가의 암호접근 권한을 확보하기 위하여 국가 암호해독 전문기관 설립 필요성과 암호 부정사용에 대한 법적 제재 방안의 입법 필요성을 제시한다.

Binary Computer Generated Hologram의 암호화 (Encryption of Binary Computer Generated Hologram)

  • 이상이;이승현;정교일;김은수
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 1999년도 하계종합학술대회 논문집
    • /
    • pp.297-300
    • /
    • 1999
  • 중요한 정보 암호화하여 복수 회원에게 분산시킨 후 회원의 합의에 의하여 해독이 가능하게 하는 thresholding scheme은 visual cryptography에 의하여 시각적인 표현이 가능하게 되었다. 그러나 visual cryptography는 표현의 한계로 응용범위가 극히 제한되었다. 이 논문에서는 visual cryptography의 응용범위를 수학에서 광학으로 확장하기 위하여 binary computer generated hologram을 encryption하는 방법을 제시하고 security 특성을 분석한다.

  • PDF

PCA-CIA Ensemble-based Feature Extraction for Bio-Key Generation

  • Kim, Aeyoung;Wang, Changda;Seo, Seung-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권7호
    • /
    • pp.2919-2937
    • /
    • 2020
  • Post-Quantum Cryptography (PQC) is rapidly developing as a stable and reliable quantum-resistant form of cryptography, throughout the industry. Similarly to existing cryptography, however, it does not prevent a third-party from using the secret key when third party obtains the secret key by deception, unauthorized sharing, or unauthorized proxying. The most effective alternative to preventing such illegal use is the utilization of biometrics during the generation of the secret key. In this paper, we propose a biometric-based secret key generation scheme for multivariate quadratic signature schemes, such as Rainbow. This prevents the secret key from being used by an unauthorized third party through biometric recognition. It also generates a shorter secret key by applying Principal Component Analysis (PCA)-based Confidence Interval Analysis (CIA) as a feature extraction method. This scheme's optimized implementation performed well at high speeds.

컴퓨터 네트워크의 데이터 보호방식 (A Method for Data Security in Computer Network)

  • 류수항;최병욱
    • 대한전자공학회논문지
    • /
    • 제22권3호
    • /
    • pp.6-10
    • /
    • 1985
  • 본 논문에서는 컴퓨터 네트워크 상에서 전송되는 데이타 또는 다수이용자 시스템 (multi-user system)에서 file을 보호하기 위해 이용되고 있는 cryptography에 대하여 논한다. 본 system은 conventional cry-ptography의 키를 Public key cryptography로 관리함으로서 처리속도가 빠르고 키의 관리가 용이하며 새로운 인증자 함수에 의해 확실한 서명문을 얻을 수 있다.

  • PDF

CLB-ECC: Certificateless Blind Signature Using ECC

  • Nayak, Sanjeet Kumar;Mohanty, Sujata;Majhi, Banshidhar
    • Journal of Information Processing Systems
    • /
    • 제13권4호
    • /
    • pp.970-986
    • /
    • 2017
  • Certificateless public key cryptography (CL-PKC) is a new benchmark in modern cryptography. It not only simplifies the certificate management problem of PKC, but also avoids the key escrow problem of the identity based cryptosystem (ID-PKC). In this article, we propose a certificateless blind signature protocol which is based on elliptic curve cryptography (CLB-ECC). The scheme is suitable for the wireless communication environment because of smaller parameter size. The proposed scheme is proven to be secure against attacks by two different kinds of adversaries. CLB-ECC is efficient in terms of computation compared to the other existing conventional schemes. CLB-ECC can withstand forgery attack, key only attack, and known message attack. An e-cash framework, which is based on CLB-ECC, has also been proposed. As a result, the proposed CLB-ECC scheme seems to be more effective for applying to real life applications like e-shopping, e-voting, etc., in handheld devices.

Biometric Identification: Iris Recognition, Biometric Cryptography

  • Rawan Alrasheddi;Zainab Alawami;Maryam Hazazi;Reema Abu Alsaud;Ruba Alobaidi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.41-46
    • /
    • 2023
  • Biometrics is an application of biometric authentication and identification techniques that are used for security. Where people can be identified by physical or behavioral features such as iris, fingerprints, or even voice. Biometrics with cryptography can be used in a variety of applications such as issuing, generating, or associating biometric keys. Biometric identification and cryptography are used in many institutions and high-security systems due to the difficulty of tampering or forgery by hackers. In this paper, literature reviews on biometric identification and cryptography are presented and discussed. In addition to a comparison of techniques in the literature reviews, identifying its strengths and weaknesses, and providing an initial proposal for biometrics and cryptography.

New Construction of Short Certificate-Based Signature against Existential Forgery Attacks

  • Lu, Yang;Wang, Gang;Li, Jiguo;Shen, Jian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권7호
    • /
    • pp.3629-3647
    • /
    • 2017
  • Certificate-based cryptography is a useful public key cryptographic primitive that combines the merits of traditional public key cryptography and identity-based cryptography. It not only solves the key escrow problem inherent in identity-based cryptography, but also simplifies the cumbersome certificate management problem in traditional public key cryptography. So far, four short certificate-based signature schemes have been proposed. However, three of them fail in achieving the existential unforgeability under adaptive chosen-message attacks and the remaining one was not constructed in the normal framework of certificate-based signature. In this paper, we put forward a new short certificate-based signature scheme. The proposed scheme is devised in the normal framework of certificate-based signature and overcomes the security weaknesses in the previous short certificate-based signature schemes. In the random oracle model, we formally prove that it achieves the existential unforgeability against adaptive chosen-message attacks. Performance comparison shows that it is efficient and practical.

Linux 운영체제 동적 모듈 개념을 이용한 보안 파일 시스템 모듈 설계 (Design of the Security Cryptography File System Based on the Dynamic Linking Module on the Linux O.S)

  • 장승주;이정배
    • 정보처리학회논문지C
    • /
    • 제10C권7호
    • /
    • pp.929-936
    • /
    • 2003
  • 본 논문은 Linux 운영체제에서 동적 모듈 개념을 이용하여 보안 파일 시스템을 설계하였다. Linux 운영체제에서 동적 모듈 개념을 이용할 경우 커널 소스를 수정하지 않고 사용자가 원할 경우 커널 모듈은 언제든지 추가할 수 있는 장점을 가진다. 보안 파일 시스템은 사용자 데이터를 암호화함으로서 접근이 허용되지 않은 사용자에게 중요한 자료가 노출되지 않도록 해준다. 보안 파일 시스템은 blowfish 알고리즘을 사용하여 암호 및 복호화를 수행한다. 키 생성을 위하여 키 서버를 통하지 않고 자체 키 생성 알고리즘에 의하여 키를 만든 후 이 키 값을 이용한다.