Abstract:
An apparatus for acquiring memory data of a mobile terminal and a method thereof are provided to use the data stored at a memory of a terminal in an investigation agency efficiently. A format converting unit(110) converts binary data into the format having legal meaning, and generates an original case file. A file copying unit(120) generates a duplicate case file by copying the case file, and an integrity verifying unit(140) verifies the integrity of the copied case file. An effective data extracting unit(150) extracts effective data from the copied case file.
Abstract:
A digital forensic server and a method thereof for evidence numeration providing the analysis work environment of a digital proof safe are provided to identify the identity of the person connecting to system and the analysis process and supply an environment capable of analyzing the collected digital proof data on the system. A communications unit(140) performs one or more terminal device for the evidence analysis and communication. An authentication unit(110) performs the authorization task about each connector from the terminal devices for the evidence analysis. An analysis working unit(120) provides the analysis work environment concerning the connector in which connection is tolerated by the authenticator. An analysis job recording unit(130) records the analysis work process where connector performs in the analysis work unit.
Abstract:
A forgery-proof digital sound recorder is provided to protect the digital sound recording from the forgery by having prevention device for preventing writing control. A forgery-proof digital recorder device comprises: a voice input device for inputting the sound; a memory device(212) for storaging the input sounds from a digital sound date; a processor(208) for controlling to receive or send the digital sound data through a data; and a writhe protecting device(213) which is formed between the memory device. The write protecting device is to prevent the perform the writing control in the memory device.
Abstract:
본 발명은 이동통신 시스템에서 사용자 비밀키 생성방법 및 그 장치에 관한 것으로, 자세히는 3GPP(3rd Generation Partnership Project) 방식의 이동통신 시스템에서 마스터 키인 사용자 비밀키를 검증된 암호 알고리즘과 안전한 메커니즘으로 생성하는 방법 및 그 장치에 관한 것이다. 본 발명은 사용자 비밀키를 생성하기 위해 운영자 비밀키, 랜덤정보, 사용자 정보를 그 입력으로 하며, 기본 구성 요소 함수로 해쉬 함수와 keyed 해쉬 함수 외에 비선형 압축함수, 선형변환, 확장함수, OFB 모드 블록암호 알고리즘을 사용한다. 본 발명에서의 사용자 비밀키 생성 알고리즘은 출력의 난수성, 일방향성 성질을 만족하며 또한 기반이 되는 암호 프리미티브에 따른 안전성을 만족한다. 또한 본 발명의 사용자 비밀키 생성 방법에 의할 때 상기 이동 통신 운영자는 자신의 운영자 비밀키와 사용자 정보만 바꾸어 운영함으로써 간단하게 안정성이 보장된 사용자 비밀키를 생성할 수 있게 된다. 사용자 비밀키, 블록 암호(block cipher), 해쉬 함수, keyed 해쉬 함수, 이동 통신 시스템
Abstract:
본 발명에 의한 해쉬 알고리즘을 이용한 데이터생성방법은 단말기 고유번호값(ESN) 및 단말기 전화번호(MIN) 중 적어도 어느 하나를 기초로 생성된 복수개의 입력값을 해쉬함수에 입력하여 소정의 비트수를 가지는 해쉬값을 출력하는 해쉬알고리즘수행단계, 출력된 해쉬값의 비트수와 동일한 차수를 가지는 다항식을 이용하여 출력된 해쉬값과 동일한 비트수의 치환된 치환값을 얻는 치환단계, 치환값의 전부 또는 일부를 복수개의 입력값 중 적어도 어느 하나의 입력값으로 입력하여 다시 치환값을 얻거나 치환값의 일부 또는 전부를 데이터로 출력하는 출력단계를 포함한다. 본 발명에 의하면 다양한 종류의 해쉬함수를 이용하여 수많은 경우의 수를 가지는 데이터(공유비밀데이터, 인증값, 음성비화코드 및 시그널링 메시지 암호화키)를 얻을 수 있다.
Abstract:
A method and an apparatus for creating an user secret key in a mobile communication system are provided to create an user secret key which is a master key through a verified password algorithm and a secure mechanism in a mobile communication system of a third generation partnership project manner. A method and an apparatus for creating an user secret key in a mobile communication system includes a step of creating a key factor by inputting an operator secret key and a seed to a Hash function based on a block password(101). The created key factor is a key of algorithm of the block password. An input factor is created by operating the algorithm with an Output FeedBack mode by inputting user information for creating a user secret key into the algorithm of the block password(102). The created input factor is an input value of a keyed Hash function. The user secret key is created with the key factor which is the keyed Hash function(103).
Abstract:
A role-based certification method applying transitivity is provided to achieve an efficient authentication process by applying a transitive signature to a role-based authentication system, improve accuracy of authentication by minimizing strings of a delegation chain, and protect privacy by exposing contents of the delegation chain at the minimum. Credential between a user or agency V(i) and V(j) is expressed as E(i,j). A user or agency V(i) has a secret key sk(i) and an open key V(i). An agency V(i) issues delegation credential E(i,j) to an agency V(j), wherein the E(i,j) is regarded as an edge of a graph. The agency V(i) combines the secret key sk(i) with secret key sk(j) of the agency V(j) for making the delegation credential E(i,j). The agency V(i) receives the secret key sk(j) of the agency V(j) through a trusted communication path for generating E(i,j) and transmitting the E(i,j) to the agency V(j). When a user A receives role credential R(k) from an agency V(k), a condition capable of accessing the agency V(i) is that the user A demonstrates that the user A has the delegation credential E(i,j), the credential E(j,k), and the role credential R(k) to an agency V(i). For the condition, the user A combines the credential E(i,j) and the credential E(j,k) for constituting E(i,k) by calculating E(i,k)=E(i,j)xE(j,k) and concatenating the result with the R(k).
Abstract:
A method for converting a key exchange protocol in a duplex channel into a key exchange protocol in a half-duplex channel is provided to facilitate conversion without increase of a network load by generating a new session key for a half-duplex channel without the change of contents of a transmission message of the key exchange protocol in the duplex channel. A method for converting a key exchange protocol in a duplex channel into a key exchange protocol in a half-duplex channel includes the steps of: converting a round message in the duplex channel into a round message in the half-duplex channel(S21); and applying a Pseudo random function to a session key of the round message in the duplex channel and a session identifier of the round message in the half-duplex channel and generating a session key for the round message in the half-duplex channel for a session corresponding to the identifier(S23).
Abstract:
A device and a method for authenticating a tag in an RFID system are provided to reduce quantity of calculations for finding a tag ID in a backend database while protecting privacy of the tag and keeping conventional security functions. A database(431) stores grouped RFID tag information including secret group information and secret tag information. A secret group information searcher(433) finds a group of the tag requesting authentication by repeatedly calculating the secret group information stored in the database through a hash chain based on the hash algorithm and comparing the calculated value with a secret group information conversion value. A secret tag information searcher(435) searches whether the secret tag information of the tag requesting the authentication is found in the database by repeatedly calculating the secret tag information of the found group through the hash chain and comparing the calculated values with the secret tag information conversion value.
Abstract:
PURPOSE: An encrypting and decrypting method using cellular automata and an apparatus for the same are provided to encrypt and decrypt input data by using structural merits of multi-dimensional cellular automata. CONSTITUTION: A multi-dimensional space is formed by using a plurality of triangular cells(201). Binary digits having predetermined bits are assigned to the triangular cells, respectively(202). Each value of the triangular cells is updated according to the flow of discrete time and a binary random progression is formed by using each value of the triangular cells(207). An encryption process is performed by executing a logical operation for the binary random progression and a plain text binary progression(208).