摘要:
A method of obtaining C=(c0, . . . , cn−1) of a product of two elements A and B of a finite field GF(2n). The method includes permuting the last d coefficients (an−1, . . . , an−d) of a multiplier A with predetermined variables (sn−1, . . . , sn−d); operating C:C=⊕(bi+j●A) for (I+j)th coefficient of a multiplicand B to update coefficients of C, where i and j are integers, and A:=(s, . . . ,αx−2)⊕(0,xn−1−j●f1, . . . ,sx−1−j●fx−d,0, . . . ,0) repeatedly for j=0 to (d−1) to update coefficients of A, where ⊕ represents an XOR operation and ● represents an AND operation; and repeatedly performing the permuting and operating by increasing i from 0 to (n−1) by d.
摘要:
A method of obtaining C=(c0, . . . , cn-1) of a product of two elements A and B of a finite field GF(2n). The method includes permuting the last d coefficients (an-1, . . . , an-d) of a multiplier A with predetermined variables (sn-1, . . . , sn-d); operating C:C=⊕(bi+j●A) for (I+j)th coefficient of a multiplicand B to update coefficients of C, where i and j are integers, and A:=(sn-1-j,α0, . . . ,αn-2)⊕(0,sn-1-j●f1, . . . ,sn-1-j●fn-d,0, . . . ,0) repeatedly for j=0 to (d−1) to update coefficients of A, where ⊕ represents an XOR operation and ● represents an AND operation; and repeatedly performing the permuting and operating by increasing i from 0 to (n-1) by d.
摘要:
A security system using an RSA algorithm that includes a key input section for receiving a secret key and a public key used in one of encryption and decryption of a message, a random coefficient generating section for generating a random coefficient r having a bit of a predetermined size, a first calculation section for dividing the secret key into a first secret key and a second secret key by using the value of r, and performing an exponentiation of RSA algorithm by using the respective secret keys and the public key, and a second calculation section for performing one of the encryption and the decryption by combining results of exponentiation calculated respectively by using the first and the second secret keys.
摘要:
A system and a method for creating an access authority and a remote controller using the system and the method. The system includes: at least one lower remote controller which requests a creation of an access authority; a higher remote controller which receives the request for the creation of the access authority from the at least one lower remote controller, creates an access authority to be granted to the lower remote controller, and requests a registration of the created access authority. Also included is a device which receives the request for the registration of the created access authority from the higher remote controller and registers the access authority of the lower remote controller created by the higher remote controller.
摘要:
A security system using an RSA algorithm that includes a key input section for receiving a secret key and a public key used in one of encryption and decryption of a message, a random coefficient generating section for generating a random coefficient r having a bit of a predetermined size, a first calculation section for dividing the secret key into a first secret key and a second secret key by using the value of r, and performing an exponentiation of RSA algorithm by using the respective secret keys and the public key, and a second calculation section for performing one of the encryption and the decryption by combining results of exponentiation calculated respectively by using the first and the second secret keys.
摘要:
A method and system for authenticating a home network device in a home network. According to the device authentication method, a public key list that includes an ID and public key information corresponding to the ID of home network devices is maintained. When an access of a joining device is received, it is requested to the joining device an ID and information relating to a public key of the joining device. The ID and the public key information are received from the joining device, and the public key list is updated by adding the received ID and public key information. The public key list before updating is transmitted to the joining device. The ID and the public key information of the joining device are transmitted to the home network devices. The joining device is a new device that joins a home network.
摘要:
A security device for a home network and a security configuration method thereof. The security device for the home network includes a user interface to send at least one request signal that includes a device register request signal to register a home appliance to the home network; a public key generator to generate a public key and a password used for security configuration of the home network; a home appliance interface to interface with the home appliance; and a controller to control the home appliance interface to transmit the public key and the password to the home appliance, and the controller to control to register the home appliance to the home network according to a service discovery protocol when the device register request signal is received from the user interface. Accordingly, the security configuration of the home network can be facilitated.
摘要:
Methods and apparatuses for secure communication are provided. The secure communication method includes receiving a first credential of a remote device; receiving first authentication information of the remote device; storing a user record including the first credential and the first authentication information; and evaluating a security level of the received first authentication information.
摘要:
A communication system including a device, an access point (AP) communicating with the device, and a mobile terminal communicating with the device and the AP, and a method in which the device and the AP share a device key that is a private key used in wireless local area network (WLAN) communication, are provided. A one-directional function operation module is provided in each component constituting the communication system, thereby enabling one-directional function operation. Data to be transmitted and received is applied to one-directional function operation in one-directional function operation module, such that the data can be securely transmitted or received.
摘要:
A method for curing a virus of data used in a mobile terminal communicating with a server through a mobile communication network is provided. The method includes forming an antivirus program database on the server and continuously updating the database with antivirus programs; comparing state information of object data requiring virus checking by the updated antivirus programs among existing data stored in the mobile terminal with state information of the updated antivirus programs; and checking and curing the virus of the object data selectively.