摘要:
A security system using an RSA algorithm that includes a key input section for receiving a secret key and a public key used in one of encryption and decryption of a message, a random coefficient generating section for generating a random coefficient r having a bit of a predetermined size, a first calculation section for dividing the secret key into a first secret key and a second secret key by using the value of r, and performing an exponentiation of RSA algorithm by using the respective secret keys and the public key, and a second calculation section for performing one of the encryption and the decryption by combining results of exponentiation calculated respectively by using the first and the second secret keys.
摘要:
A security system using an RSA algorithm that includes a key input section for receiving a secret key and a public key used in one of encryption and decryption of a message, a random coefficient generating section for generating a random coefficient r having a bit of a predetermined size, a first calculation section for dividing the secret key into a first secret key and a second secret key by using the value of r, and performing an exponentiation of RSA algorithm by using the respective secret keys and the public key, and a second calculation section for performing one of the encryption and the decryption by combining results of exponentiation calculated respectively by using the first and the second secret keys.
摘要:
A method of obtaining C=(c0, . . . , cn−1) of a product of two elements A and B of a finite field GF(2n). The method includes permuting the last d coefficients (an−1, . . . , an−d) of a multiplier A with predetermined variables (sn−1, . . . , sn−d); operating C:C=⊕(bi+j●A) for (I+j)th coefficient of a multiplicand B to update coefficients of C, where i and j are integers, and A:=(s, . . . ,αx−2)⊕(0,xn−1−j●f1, . . . ,sx−1−j●fx−d,0, . . . ,0) repeatedly for j=0 to (d−1) to update coefficients of A, where ⊕ represents an XOR operation and ● represents an AND operation; and repeatedly performing the permuting and operating by increasing i from 0 to (n−1) by d.
摘要:
A method of obtaining C=(c0, . . . , cn-1) of a product of two elements A and B of a finite field GF(2n). The method includes permuting the last d coefficients (an-1, . . . , an-d) of a multiplier A with predetermined variables (sn-1, . . . , sn-d); operating C:C=⊕(bi+j●A) for (I+j)th coefficient of a multiplicand B to update coefficients of C, where i and j are integers, and A:=(sn-1-j,α0, . . . ,αn-2)⊕(0,sn-1-j●f1, . . . ,sn-1-j●fn-d,0, . . . ,0) repeatedly for j=0 to (d−1) to update coefficients of A, where ⊕ represents an XOR operation and ● represents an AND operation; and repeatedly performing the permuting and operating by increasing i from 0 to (n-1) by d.
摘要:
An ownership sharing method and apparatus using a secret key in a home network remote controller are provided. A user who owns a home device generates an ownership authentication key using the secret key shared with the home device through the user's terminal device, and transmits the ownership authentication key to a terminal device of a particular user who wishes to share the ownership. The particular user can use the home device using the shared ownership authentication key, allowing for ownership of a device in home network environments based on a secret key that can be easily shared, obviating complicated calculation procedures that are no needed to share the ownership between an owner of a device and his family or customers, and achieving high security that is guaranteed based on the secret key.
摘要:
An ownership sharing method and apparatus using a secret key in a home network remote controller are provided. A user who owns a home device generates an ownership authentication key using the secret key shared with the home device through the user's terminal device, and transmits the ownership authentication key to a terminal device of a particular user who wishes to share the ownership. The particular user can use the home device using the shared ownership authentication key, allowing for ownership of a device in home network environments based on a secret key that can be easily shared, obviating complicated calculation procedures that are no needed to share the ownership between an owner of a device and his family or customers, and achieving high security that is guaranteed based on the secret key.
摘要:
A method and system for authenticating a home network device in a home network. According to the device authentication method, a public key list that includes an ID and public key information corresponding to the ID of home network devices is maintained. When an access of a joining device is received, it is requested to the joining device an ID and information relating to a public key of the joining device. The ID and the public key information are received from the joining device, and the public key list is updated by adding the received ID and public key information. The public key list before updating is transmitted to the joining device. The ID and the public key information of the joining device are transmitted to the home network devices. The joining device is a new device that joins a home network.
摘要:
A security device for a home network and a security configuration method thereof. The security device for the home network includes a user interface to send at least one request signal that includes a device register request signal to register a home appliance to the home network; a public key generator to generate a public key and a password used for security configuration of the home network; a home appliance interface to interface with the home appliance; and a controller to control the home appliance interface to transmit the public key and the password to the home appliance, and the controller to control to register the home appliance to the home network according to a service discovery protocol when the device register request signal is received from the user interface. Accordingly, the security configuration of the home network can be facilitated.
摘要:
An apparatus for providing a rights resale function and a method thereof are provided, in which a rights object to execute content can be freely transferred and shared among users on the intervention of a rights issuer. The apparatus for providing a rights resale function applied to a system which includes a rights acquisition agent and a rights issuer, includes a storage unit for storing a content related rights object, a token generation unit for generating a token for rights resale such as a token for reselling rights to obtain an issuance of the content related rights object from the rights issuer, with reference to the rights object from the storage unit, and a transmission/reception unit for transmitting the token for rights resale from the token generation unit to the rights acquisition agent.
摘要:
A system and a method for creating an access authority and a remote controller using the system and the method. The system includes: at least one lower remote controller which requests a creation of an access authority; a higher remote controller which receives the request for the creation of the access authority from the at least one lower remote controller, creates an access authority to be granted to the lower remote controller, and requests a registration of the created access authority. Also included is a device which receives the request for the registration of the created access authority from the higher remote controller and registers the access authority of the lower remote controller created by the higher remote controller.