The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TLS(12hit)

1-12hit
  • A Weighted Forward-Backward Spatial Smoothing DOA Estimation Algorithm Based on TLS-ESPRIT

    Manlin XIAO  Zhibo DUAN  Zhenglong YANG  

     
    LETTER-Fundamentals of Information Systems

      Pubricized:
    2021/03/16
      Vol:
    E104-D No:6
      Page(s):
    881-884

    Based on TLS-ESPRIT algorithm, this paper proposes a weighted spatial smoothing DOA estimation algorithm to address the problem that the conventional TLS-ESPRIT algorithm will be disabled to estimate the direction of arrival (DOA) in the scenario of coherent sources. The proposed method divides the received signal array into several subarrays with special structural feature. Then, utilizing these subarrays, this paper constructs the new weighted covariance matrix to estimate the DOA based on TLS-ESPRIT. The auto-correlation and cross-correlation information of subarrays in the proposed algorithm is extracted sufficiently, improving the orthogonality between the signal subspace and the noise subspace so that the DOA of coherent sources could be estimated accurately. The simulations show that the proposed algorithm is superior to the conventional spatial smoothing algorithms under different signal to noise ratio (SNR) and snapshot numbers with coherent sources.

  • Easy-to-Deploy Wireless Mesh Network System with User Authentication and WLAN Roaming Features

    Tomo NIIZUMA  Hideaki GOTO  

     
    PAPER-Information Network

      Pubricized:
    2016/12/05
      Vol:
    E100-D No:3
      Page(s):
    511-519

    Wireless LAN (WLAN) roaming systems, such as eduroam, enable the mutual use of WLAN facilities among multiple organizations. As a consequence of the strong demand for WLAN roaming, it is utilized not only at universities and schools but also at the venues of large events such as concerts, conferences, and sports events. Moreover, it has also been reported that WLAN roaming is useful in areas afflicted by natural disasters. This paper presents a novel WLAN roaming system over Wireless Mesh Networks (WMNs) that is useful for the use cases shown above. The proposed system is based on two methods as follows: 1) Automatic authentication path generation method decreases the WLAN roaming system deployment costs including the wiring cost and configuration cost. Although the wiring cost can be reduced by using WMN technologies, some additional configurations are still required if we want to deploy a secure user authentication mechanism (e.g. IEEE 802.1X) on WLAN systems. In the proposed system, the Access Points (APs) can act as authenticators automatically using RadSec instead of RADIUS. Therefore, the network administrators can deploy 802.1X-based authentication systems over WMNs without additional configurations on-site. 2) Local authentication method makes the system deployable in times of natural disasters, in particular when the upper network is unavailable or some authentication servers or proxies are down. In the local authentication method, users and APs can be authenticated at the WMN by locally verifying the digital certificates as the authentication credentials.

  • How to Efficiently Exploit Different Types of Biases for Plaintext Recovery of RC4

    Yuhei WATANABE  Takanori ISOBE  Toshihiro OHIGASHI  Masakatu MORII  

     
    PAPER-Cryptography and Information Security

      Vol:
    E100-A No:3
      Page(s):
    803-810

    RC4 is a well-known stream cipher designed by Rivest. Due to considerable cryptanalysis efforts over past 20 years, several kinds of statistic biases in a key stream of RC4 have been observed so far. Finally, practical full plaintext recovery attacks on RC4 in SSL/TLS were independently proposed by AlFardan et al. and Isobe et al. in 2013. Responded to these attacks, usage of RC4 has drastically decreased in SSL/TLS. However, according to the research by Trustworthy Internet Movement, RC4 is still used by some websites for the encryption on SSL/TLS. In this paper, we shows a new plaintext recovery attack for RC4 under the assumption of HTTPS. We develop a method for exploiting single-byte and double-byte biases together to efficiently guess the target bytes, while previous attacks use either single-byte biases or double-byte biases. As a result, target plaintext bytes can be extracted with higher probability than previous best attacks given 229 ciphertexts encrypted by randomly-chosen keys. In the most efficient case, the success probability of our attack are more than twice compared to previous best attacks.

  • Practical Effect of the Predictability of Android OpenSSL PRNG

    Soo Hyeon KIM  Daewan HAN  Dong Hoon LEE  

     
    PAPER-Cryptography and Information Security

      Vol:
    E98-A No:8
      Page(s):
    1806-1813

    The built-in Pseudo Random Number Generator (PRNG) of OpenSSL on Android platform is important for producing the encryption keys and nonce needed for SSL/TLS communication. In addition, it is also widely used in generating random numbers for many applications irrelevant to SSL. We demonstrated that the initial OpenSSL PRNG state of Android apps can be restored practically, and claimed that a PreMasterSecret (PMS) can be recovered in certain apps using the RSA key agreement scheme at CCS2013. In this paper, we investigate more deeply the practical effect of the predictability of OpenSSL PRNG. First, we precisely analyze, and reduce the complexity of a PMS recovery attack on SSL with the RSA key exchange by analyzing the ASLR mechanism of Android. As a result, we show that the PMS can be recovered in O(246) computations with a probability of 25%. Next, we show that the attack is also applicable to the PMS of the ECDH key exchange by analyzing the heap memory pattern. We confirmed experimentally that the PMS can be recovered in real-time with a probability of 20%. Finally, we show the relation between the predictability of OpenSSL PRNG and the vulnerability of Android SecureRandom java class.

  • Authentication Binding between SSL/TLS and HTTP

    Takamichi SAITO  Kiyomi SEKIGUCHI  Ryosuke HATSUGAI  

     
    PAPER-Information Network

      Vol:
    E95-D No:3
      Page(s):
    797-803

    While the Secure Socket Layer or Transport Layer Security (SSL/TLS) is assumed to provide secure communications over the Internet, many web applications utilize basic or digest authentication of Hyper Text Transport Protocol (HTTP) over SSL/TLS. Namely, in the scheme, there are two different authentication schemes in a session. Since they are separated by a layer, these are not convenient for a web application. Moreover, the scheme may also cause problems in establishing secure communication. Then we provide a scheme of authentication binding between SSL/TLS and HTTP without modifying SSL/TLS protocols and its implementation, and we show the effectiveness of our proposed scheme.

  • ToA Coordinate Calculation Method Using a PID Algorithm

    Jae Ho HWANG  Jae Moung KIM  

     
    LETTER-Terrestrial Radio Communications

      Vol:
    E93-B No:4
      Page(s):
    1057-1060

    This paper introduces a coordinate calculation method for a real-time locating system. A ToA algorithm is used to obtain the target node coordinates, but a conventional DC method, which incurs heavy calculation time, is not suitable for embedded systems. This paper proposes the use of a P-control in the PID control algorithm to resolve real-time locating system issues. Performance measures of the accumulated operator number and position error are evaluated. It is shown that the PID method has less calculation and more robust performance than the DC method.

  • Extensible Authentication Protocol Overview and Its Applications

    Heung Youl YOUM  

     
    INVITED PAPER

      Vol:
    E92-D No:5
      Page(s):
    766-776

    The Extensible Authentication Protocol (EAP) is an authentication framework that supports multiple authentication mechanisms [38] between a peer and an authentication server in a data communication network. EAP is used as a useful tool for enabling user authentication and distribution of session keys. There are numerous EAP methods that have been developed by global SDOs such as IETF, IEEE, ITU-T, and 3GPP. In this paper, we analyze the most widely deployed EAP methods ranging from the EAP-TLS [27] to the EAP-PSK [25]. In addition, we derive the security requirements of EAP methods meet, evaluate the typical EAP methods in terms of the security requirements, and discuss the features of the existing widely-deployed EAP methods. In addition, we identify two typical use cases for the EAP methods. Finally, recent global standardization activities in this area are reviewed.

  • Performance Evaluation of RTLS Based on Active RFID Power Measurement for Dense Moving Objects

    Taekyu KIM  Jin LEE  Seungbeom LEE  Sin-Chong PARK  

     
    LETTER-Sensing

      Vol:
    E92-B No:4
      Page(s):
    1422-1425

    Tracking a large quantity of moving target tags simultaneously is essential for the localization and guidance of people in welfare facilities like hospitals and sanatoriums for the aged. The locating system using active RFID technology consists of a number of fixed RFID readers and tags carried by the target objects, or senior people. We compare the performances of several determination algorithms which use the power measurement of received signals emitted by the moving active RFID tags. This letter presents a study on the effect of collision in tracking large quantities of objects based on active RFID real time location system (RTLS). Traditional trilateration, fingerprinting, and well-known LANDMARC algorithm are evaluated and compared with varying number of moving tags through the SystemC-based computer simulation. From the simulation, we show the tradeoff relationship between the number of moving tags and estimation accuracy.

  • A Proposal of TLS Implementation for Cross Certification Model

    Tadashi KAJI  Takahiro FUJISHIRO  Satoru TEZUKA  

     
    PAPER-Implementation

      Vol:
    E91-D No:5
      Page(s):
    1311-1318

    Today, TLS is widely used for achieving a secure communication system. And TLS is used PKI for server authentication and/or client authentication. However, its PKI environment, which is called as "multiple trust anchors environment," causes the problem that the verifier has to maintain huge number of CA certificates in the ubiquitous network because the increase of terminals connected to the network brings the increase of CAs. However, most of terminals in the ubiquitous network will not have enough memory to hold such huge number of CA certificates. Therefore, another PKI environment, "cross certification environment", is useful for the ubiquitous network. But, because current TLS is designed for the multiple trust anchors model, TLS cannot work efficiently on the cross-certification model. This paper proposes a TLS implementation method to support the cross certification model efficiently. Our proposal reduces the size of exchanged messages between the TLS client and the TLS server during the handshake process. Therefore, our proposal is suitable for implementing TLS in the terminals that do not have enough computing power and memory in ubiquitous network.

  • Relaxing Constraints due to Data and Control Dependences

    Katsuhiko METSUGI  Kazuaki MURAKAMI  

     
    PAPER-Computer Systems

      Vol:
    E86-D No:5
      Page(s):
    920-928

    TLSP (Thread-Level Speculative Parallel processing) architecture is a growing processor architecture. Parallelism of a program executed on this architecture is ruled by the combination of techniques which relax data dependences. In this paper, we evaluate the limits of parallelism of the TLSP architecture by using abstract machine models. We have three major results. First, if we use solely each technique which relaxes data dependences, "renaming" has a large effect on the TLSP architecture. Second, combinatorial use of "memory disambiguation" and "renaming" leads to huge parallelism. Third, constant effects are obtained by concurrent use of "value prediction" and other techniques.

  • Influence of the Model Order Estimation Error in the ESPRIT Based High Resolution Techniques

    Kei SAKAGUCHI  Jun-ichi TAKADA  Kiyomichi ARAKI  

     
    LETTER-Antennas and Propagation

      Vol:
    E82-B No:3
      Page(s):
    561-563

    Effects of the model order estimation error in the TLS-ESPRIT algorithm were investigated. It was found that if the model order is overestimated true signal parameters are preserved even though spurious signals of which power values are negligibly small appear, whereas if the model order is underestimated some signals degenerate to each others, resulting in the erroneous estimates.

  • A Robust Algorithm of Total Least Squares Method

    Yong-Jin CHOI  Jin-Young KIM  K.M. SUNG  

     
    LETTER-Digital Signal Processing

      Vol:
    E80-A No:7
      Page(s):
    1336-1339

    The TLS method is an unbiased estimator for solving the overdetermined set of linear equations when errors occur in all data. However it doesn't show robustness while the errors have a heavy tailed pdf. In this letter we derive a robust method of TLS (ROTLS) based on the characteristics of TLS solution, where the performance of ROTLS is verified by applying it to the system identification problem.