• Title/Summary/Keyword: session key

Search Result 326, Processing Time 0.023 seconds

Remote Login Authentication Scheme based on Bilinear Pairing and Fingerprint

  • Kumari, Shipra;Om, Hari
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4987-5014
    • /
    • 2015
  • The bilinear pairing, also known as Weil pairing or Tate pairing, is widely used in cryptography and its properties help to construct cryptographic schemes for different applications in which the security of the transmitted data is a major concern. In remote login authentication schemes, there are two major requirements: i) proving the identity of a user and the server for legitimacy without exposing their private keys and ii) freedom for a user to choose and change his password (private key) efficiently. Most of the existing methods based on the bilinear property have some security breaches due to the lack of features and the design issues. In this paper, we develop a new scheme using the bilinear property of an elliptic point and the biometric characteristics. Our method provides many features along with three major goals. a) Checking the correctness of the password before sending the authentication message, which prevents the wastage of communication cost; b) Efficient password change phase in which the user is asked to give a new password after checking the correctness of the current password without involving the server; c) User anonymity - enforcing the suitability of our scheme for applications in which a user does not want to disclose his identity. We use BAN logic to ensure the mutual authentication and session key agreement properties. The paper provides informal security analysis to illustrate that our scheme resists all the security attacks. Furthermore, we use the AVISPA tool for formal security verification of our scheme.

Electronic Payment Protocol using GDHP Blind Signature Scheme (GDHP 은닉서명기법을 이용한 전자지불 프로토콜)

  • Lee, Hyun-Ju;Rhee, Chung-Sei
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.12-20
    • /
    • 2006
  • In this paper, we propose electronic payment protocol using GDHP blind signature scheme to activate e-business in the wire/wireless integrated environment. The protocol applied elliptic curve algorithm on the GDHP base and improved the efficiency of the existing blind signature technique on the basis of communication frequency and calculation number. And the protocol accelerated speed and strengthened safety against man-in-the-middle attacks and forward secrecy because the certification between individuals is performed by the session key created by Weil paring using elliptic curve cryptosystem in the limited entity $F_q$ instead of the certification used in the existing PayWord protocol.

  • PDF

Implementation of Secure VoIP System based on H.235 (H.235 기반 VoIP 보안 시스템 구현)

  • 임범진;홍기훈;정수환;유현경;김도영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1238-1244
    • /
    • 2002
  • In this paper, H.235-based security mechanism for H.323 multimedia applications was implemented. H.235 covers authentication using HMAC, Diffie-Hellman key exchange, session key management for voice channel, and encryption functions such as DES, 3DES, RC2. Extra encryption algorithms such as SEED, and AES were also included for possible use in the future. And, we also analyzed the quality of service (QoS), the requirement of implementation, and interoperability to the result in this study. The results could be applied to secure simple IP phone terminals, gateways, or gatekeepers.

Chaotic Block Encryption Scheme using a PLCM (PLCM을 이용한 카오스 블록 암호화 기법)

  • Lee, Min-Goo;Lee, Sung-Woo;Shin, Jae-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2005.08a
    • /
    • pp.406-414
    • /
    • 2005
  • In this paper, we propose 128bits chaotic block encryption scheme using a PLCM(Piece-wise Linear Chaotic Map) having a good dynamical property. The proposed scheme has a block size of 128 bits and a key size of 128 bits. In proposed scheme we use four 32bi1s sub-keys of session key and four 32bit sub-blocks of block to decide the initial value and the number of iteration of PLCM. The encrypted code is generated from the output of PLCM. With results of test and analyses of security we show the proposed scheme is very secure against statistical attacks and have very good Avalanche Effect and Randomness properties.

  • PDF

Mobile Security for Academic Information Service (학술정보 콘텐츠 제공을 위한 모바일 보안 서비스에 관한 연구)

  • Kim, sang-kuk;Choi, byeong-seon;Kang, mu-yeong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.473-476
    • /
    • 2008
  • Mobile network environments are the environments where mobile devices are distributed invisible in our daily lives so that we can conventionally use mobile services at any time and any place. But, Mobile devices has a many security vulnerabilities caused by lower computing of devices and security problem of wireless network. So in this paper, PKI structure is proposed to minimize encrypting and decrypting operation by compounding session key and public key on WIPI environment. Proposed secure authentication system based on korean standard cryptography algorithm will give a more firmness in mobile network and support a more secure service for mobile academic information service that KISTI future plan.

  • PDF

An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography

  • Qiu, Shuming;Xu, Guosheng;Ahmad, Haseeb;Xu, Guoai;Qiu, Xinping;Xu, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.978-1002
    • /
    • 2019
  • With the rapid development of the Internet of Things, the problem of privacy protection has been paid great attention. Recently, Nikooghadam et al. pointed out that Kumari et al.'s protocol can neither resist off-line guessing attack nor preserve user anonymity. Moreover, the authors also proposed an authentication supportive session initial protocol, claiming to resist various vulnerability attacks. Unfortunately, this paper proves that the authentication protocols of Kumari et al. and Nikooghadam et al. have neither the ability to preserve perfect forward secrecy nor the ability to resist key-compromise impersonation attack. In order to remedy such flaws in their protocols, we design a lightweight authentication protocol using elliptic curve cryptography. By way of informal security analysis, it is shown that the proposed protocol can both resist a variety of attacks and provide more security. Afterward, it is also proved that the protocol is resistant against active and passive attacks under Dolev-Yao model by means of Burrows-Abadi-Needham logic (BAN-Logic), and fulfills mutual authentication using Automated Validation of Internet Security Protocols and Applications (AVISPA) software. Subsequently, we compare the protocol with the related scheme in terms of computational complexity and security. The comparative analytics witness that the proposed protocol is more suitable for practical application scenarios.

The Effect of the Types of Learning Material and Epistemological Beliefs in an Ill-structured Problem Solving

  • OH, Suna;KIM, Yeonsoon;KANG, Sungkwan
    • Educational Technology International
    • /
    • v.16 no.2
    • /
    • pp.183-200
    • /
    • 2015
  • This study investigated the effect of learning achievements and cognitive load according to different types of presenting learning materials and epistemological beliefs (EB). Learning achievements in this study were composed by retention and transfer of ill-structured problem. A total of 80 college students participated in the study. Prior to the learning, students were guided to fill out a questionnaire regarding epistemological beliefs and a prior knowledge test. The students of each group studied with a different type of reading material: full text (FT), full text including key questions (KeyFT) and full text including a concept map (CmFT). After a session of study was finished, they were asked to complete the posttest: retention and transfer. The results showed that there was a significant difference in transfer achievements. CmFT outperformed higher scores than the other types. There was no significant difference in retention among the groups. It is strongly believed that the types of presenting learning materials may have affected the understanding of ill-structured problem solving skills. Students with sophisticated EB showed higher achievements on retention and transfer than naive-EB and mixed-EB. Even though the data showed decrease of the cognitive load on the type of materials and EB, there were no significant differences on the cognitive load. We should consider a positive effect of types of presenting learning materials and EB enhancing capabilities of solving ill-structured problems in real life.

Interactive Technology: Soft Engineering

  • Yoon, Joong-Sun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2682-2686
    • /
    • 2003
  • Recent paradigm in technology shifts from object-based technology to environment-based technology. Issue here is interaction among human, machines, and environment. This requires new interpretations for the space among them. Holistic interactions based on “Mom (embodiment)” suggest a good starting point for this endeavor. The past, present, future of technology are presented in terms of technology’s fundamental virtue: “humanizing technology” or “technology serving human.” Interactive technology initiative (ITI) is an interdisciplinary research group to search for the proper technology and the proper way of implementing technology: “interactive technology” or “soft engineering.” Some experimental activities conducted by ITI are presented in this organized session, “Interactive Technology.” Metatechnology, soft engineering, “Mom (embodiment),” holistic interactions, tangible space, and ubiquitous computing are key concepts in interactive technology.

  • PDF

Tangible Media based on Interactive Technology;iT_Media

  • Yoon, Joong-Sun;Yoh, Myeung-Sook;Lee, Hye-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.794-799
    • /
    • 2004
  • Recent paradigm in technology shifts from object-based technology to environment-based technology. Issue here is interaction among humans and the world around humans, which is natural and artificial "space." Holistic interactions based on "Mom (embodiment)" suggest a good starting point for exploring this issue. Soft engineering, "Mom," holistic interactions, tangible space, ubiquitous computing, science of emotion, and interactive media are key concepts in interactive technology. Interactive tangible media "iT_Media" is proposed to explore and synthesize these ideas. Interactive technology initiative (ITI) is an interdisciplinary research group to search for the proper technology and the proper way of implementing technology: "interactive technology" or "soft engineering." Some experimental activities conducted by ITI are presented in this session, "Interactive Technology."

  • PDF

Architecture and Call Setup Latency of a Softswitch for VoIP Service (소프트스위치 시스템의 호처리 성능 향상)

  • Kim, Sung-Chul;Yoo, Byun-Hoon;Lee, Byung-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.113-118
    • /
    • 2005
  • Softswitch is the core BcN equipment which voice and multimedia switching based on the IP Technologies. It is designed to replace the Class 5(local Exchange) and Class 4(Toll Exchange) switch based on the circuit wired and wireless switching network technologies. Softswitch gets its name because typically it is a software based solution implemented on general purpose computers/servers. While the traditional PSTN switches are rely on dedicated facilities for T and S inter-connection and are designed primarily for voice communications. Packet based Softswitch is divided the control of call and bearer, very different from Public telephone network. Sometimes Call Agent or Media Gateway Controller, a key component in the VoIP solution, is also called Softswitch. This paper will suggest the software architecture of softswitch for performance in call processing part, also suggest the session management model to cover call setup latency.

  • PDF