• Title/Summary/Keyword: short signature

Search Result 53, Processing Time 0.032 seconds

A Secure Electronic Payment System in Intelligent Transportation Systems Using the Dedicated Short Range Communications (단거리 전용통신을 이용한 지능형 교통시스템에서의 안전한 전자 지불 시스템)

  • Jang Chung-Ryong;Lee Yong-Kwon
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.4
    • /
    • pp.71-78
    • /
    • 2004
  • Dedicated Short Range Communications(DSRC) as a prominent communications candidate for Intelligent Transportation Systems(ITS) have been developed to support ITS applications such as value-added information service, e-commerce, electronic toll payment, etc. These various applications associated with electronic payment through unsecure communication channel of DSRC suffer from security threats. To ensure secure payment, we have adopted appropriate cryptographic mechanisms including encipherment, authentication exchange and digital signature. The cryptographic mechanisms require to use cryptographic keys established between two communication entities. In this paper, we propose a secure electronic payment system which is designed to have some functions for strong authentication, encryption, key agreement, etc. Especially, we adopt domestic developed cryptographic algorithms such as EC-KCDSA and SEED for digital signature and block cipher, respectively. We can show those mechanisms are appropriate for the secure electronic payment system for ITS services under the DSRC wireless environment in aspects of constrained computational resource use and processing speed.

  • PDF

Observation of a 2016 Ganymede stellar occultation event with the SOAO 0.6m telescope

  • Hinse, Tobias Cornelius;D'Aversa, Emiliano;Oliva, Fabrizio;Sindoni, Giuseppe
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.42 no.2
    • /
    • pp.83.3-84
    • /
    • 2017
  • On 2016 April $13^{th}$ the Jovian satellite Ganymede occulted a $7^{th}$ magnitude star. The predicted occultation track (occultation shadow) crossed the Northern Pacific Ocean, Japan, and South Korea. Hence, it was a very favorable event due to the star brightness in order to be accessible for small-aperture telescopes as well. While no other similar event is expected for the next 10 years, only two occultation events are reported in the literature in the past, from Earth in 1972 and from Voyager, in large disagreement in respect to the atmospheric detection. However, evidence of an exosphere around Ganymede was inferred through H Lyman alpha emission detected by Galileo UVS, through HST/GHRS detection of far-UV atomic O airglow emissions, signature of dissociated molecular oxygen. We organized a short-notice international coordinated occultation monitoring network with the aim to search for a signature of Ganymede's exosphere in the occultation light-curve by using facilities on Mauna Kea (NASA-IRTF) and Sobaeksan Optical Astronomy Observatory (SOAO) in South Korea.

  • PDF

A Study on the Test Strategy Based on SSA Technique for the Digital Circuit Boards in Production Line (SSA 기법에 기반한 생산조립라인의 디지털 부품 실장 PCB의 검사전략에 대한 연구)

  • Jung Yong-Chae;Ko Yun-Seok
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.54 no.4
    • /
    • pp.243-250
    • /
    • 2005
  • Test methodology is diversity by devices and the number of test pattern is tremendous because the digital circuit includes TTL and CMOS family ICs as well as high density devices such as ROM and RAM. Accordingly, the quick and effective test strategy is required to enhance the test productivity. This paper proposes the test strategy which is able to be applied efficiently to the diversity devices on the digital circuit board by analyzing the structure and characteristic of the digital device. Especially, this test strategy detects the faulted digital device or the faulted digital circuit on the digital board using SSA(Serial Signature Analysis) technique based on the polynomial division theory The SSA technique identifies the faults by comparing the reminder from good device with reminder from the tested device. At this time, the reminder is obtained by enforcing the data stream obtained from output pins of the tested device on the LFSR(Linear Feedback Shift Register) representing the characteristic equation. Also, the method to obtain the optimal signature analysis circuit is explained by furnishing the short bit input streams to the long bit input streams to the LFSR having 8, 12, 16, 20bit input/output pins and by analyzing the occurring probability of error which is impossible to detect. Finally, the effectiveness of the proposed test strategy is verified by simulating the stuck at 1 errors or stuck at 0 errors for several devices on typical 8051 digital board.

A Study on NTRUSign security to prevent script attacks (스크립트 공격을 막기 위한 NTRUSign 보안 연구)

  • Bae, Sung-Hyun;Jeong, Jong-hyeog
    • Journal of IKEEE
    • /
    • v.23 no.1
    • /
    • pp.200-206
    • /
    • 2019
  • Recently, there is a growing preference for a fast and secure cryptographic protocol that is applicable to Internet of things environments. Among the lattice-based cryptographic algorithms, the NTRU cryptosystem is secure by virtue of the shortest vector problem (SVP) and the closest problem(CVP), which is a problem of finding very short vectors and closest vector. NTRUSign, an electronic signature based on this cryptographic algorithm, has been proposed and proved unsafe for script attacks. In this paper, we propose a security protocol using a symmetric key algorithm by securing a shared key using key exchange. Therefore, the attacker can not compute the key value and intends to propose a more secure digital signature.

Separator Effect on the Cell Failure of Lithium Secondary Battery using Lithium Metal Electrode (리튬금속 전극을 이용한 리튬이차전지의 내부단락에 대한 분리막의 영향)

  • Kim, Ju-Seok;Bae, Sang-Ho;Hwang, Min-Ji;Heo, Min-Yeong;Doh, Chil-Hoon
    • Journal of the Korean Electrochemical Society
    • /
    • v.14 no.3
    • /
    • pp.171-175
    • /
    • 2011
  • Lithium secondary batteries using lithium metal count electrode are easy to use and to analyze the specific characteristics of working electrode. Nevertheless, during the charge operation internal electrical short circuit could be caused by the dendritic growth of lithium. The cell failure by the short circuit depends on the condition of separator such as constitutive material and thickness. To prevent the cell failure caused by the dendritic growth of lithium, the electrochemical properties of the cell of lithium metal count electrode were evaluated for four different kinds of separator. Among the tested separators, GMF (glass micro-fiber filter, $300{\mu}m$) was the most promising one because it could effectively prevent the cell failure during the charge. The cell using GMF separator had relatively low impedance. Generally the cell using thicker separator than $50{\mu}m$ could effectively avoid the cell failure by internal short circuit and had the good cycleability. The highest rate capability by the signature method was acquired in the case of GMF separator.

A Secure Bluetooth Piconet using Non-Anonymous Group Keys (비익명성 그룹키를 이용한 안전한 블루투스 피코넷)

  • 서대희;이임영
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.222-232
    • /
    • 2003
  • In accordance with the changes in the wireless communication environment, there has been a great need to satisfy the demand for diverse modes of information exchange. Various types of short-distance wireless communication technology have been developed and studied to meet this demand. Among them, Bluetooth which has recently been acclaimed as the standard for short-distance wireless communication, has been the focus of many such studies. However, Bluetooth has weaknesses in its suuity features when its in security services are applied to Home networks. The purpose of this study is to propose a safe Bluetooth scenario with an upgraded suity feature. This paper first reviews the general characteristics and security features of Bluetooth together with an analysis of its weaknesses, and presents the formation and maintenance process of Bluetooth piconet what is created by using ECDSA and group key in the ACL(Asynchronous Connection-less Link) connection through a safe Bluetooth inquiry process.

Impact Damage Detection in a Composite Stiffened Panel Using Built-in Piezoelectric Active Sensor Arrays (배열 압전 능동 센서를 이용한 복합재 보강판의 충격 손상 탐지)

  • Park, Chan-Yik;Cho, Chang-Min
    • Composites Research
    • /
    • v.20 no.6
    • /
    • pp.21-27
    • /
    • 2007
  • Low-velocity impact damage in a composite stiffened panel was detected using built-in piezoelectric active sensor arrays. Using these piezoelectric active sensors, various diagnostic signals were generated to propagate Lamb waves through the structure and the responses were picked up to detect changes in the structure's vibration signature due to the damage. Three algorithms - ADI(Active Damage Interrogation), TD RMS (Time Domain Root Mean Square) and STFT (Short Time Fourier Transform) - were examined to express the features of the signal changes as one damage index. From damage detecting tests, two impact induced delaminations were detected and the location was estimated with the algorithms and diagnostic signals.

Study on Distortion Ratio Calculation of Park's Vector Pattern for Diagnosis of Stator Winding Fault of Induction Motor (유도전동기의 고정자 권선고장 진단을 위한 팍스벡터 패턴의 왜곡률 연산에 대한 연구)

  • Yang, Chul-Oh;Park, Kyu-Nam;Song, Myung-Hyun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.4
    • /
    • pp.643-649
    • /
    • 2012
  • The diagnosis technique of stator winding faults based on Motor Current Signature Analysis(MCSA) was suggested. Park's vector pattern, the circle that is drawn by d-q transformed currents($i_d$, $i_q$), is widely used for stator winding faults detection. The current Distortion Ratio(DR), defined by the ratio of max axis and min axis of ellipse of Park's vector's pattern, was more simple and powerful method than the Park's vector pattern. In this study, a calculation method of distortion ratio of Park's vector pattern was suggested for auto diagnosis of stator winding short fault and usefulness of suggested calculation method of distortion ratio was verified through simulation using LabVIEW program.

The Genealogical Study on Electronic Bill of Lading

  • LEE, Bong-Soo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.69
    • /
    • pp.349-370
    • /
    • 2016
  • This thesis examines the problems faced in the electronic bill of lading for which improvements are necessary, and suggests various ways of overcoming those problems. First, to build a negotiation system for electronic B/Ls, active participation from related parties in addition to the government support is essential. Second, electronic B/Ls cannot be utilized within a short period of time in current commercial practices. Third, there should be infrastructure which connects all parties of international commerce through an electronic system. Fourth, instead of promoting mutual recognition through international treaty, there should be a plan which legally specifying mutual recognition between certification authorities. Fifth, it is needed to ease the strictness of electronic signature to promote the global negotiation of electronic B/Ls. Lastly, in prima facie weight of evidence, there was a significant difference with the Rotterdam Rules even in comparison with the Commercial Act which was amended with the significantly advanced rules on electronic B/L. He believed there should be a discreet consideration on these matters at the revision of the Commercial Act. For this, the government has to provide support more aggressively with more interest and commitments.

  • PDF

Performance Study of genus 3 Hyperelliptic Curve Cryptosystem

  • Gupta, Daya;De, Asok;Chatterjee, Kakali
    • Journal of Information Processing Systems
    • /
    • v.8 no.1
    • /
    • pp.145-158
    • /
    • 2012
  • Hyperelliptic Curve Cryptosystem (HECC) is well suited for all kinds of embedded processor architectures, where resources such as storage, time, or power are constrained due to short operand sizes. We can construct genus 3 HECC on 54-bit finite fields in order to achieve the same security level as 160-bit ECC or 1024-bit RSA due to the algebraic structure of Hyperelliptic Curve. This paper explores various possible attacks to the discrete logarithm in the Jacobian of a Hyperelliptic Curve (HEC) and addition and doubling of the divisor using explicit formula to speed up the scalar multiplication. Our aim is to develop a cryptosystem that can sign and authenticate documents and encrypt / decrypt messages efficiently for constrained devices in wireless networks. The performance of our proposed cryptosystem is comparable with that of ECC and the security analysis shows that it can resist the major attacks in wireless networks.