학술저널
정보보안 프로토콜 및 암호화 설계
Information-Security Protocol and Encryption Design
- 한국IT마케팅학회
- The Journal of Information Technology and Management
- Vol.2 No.4
-
2014.1217 - 24 (7 pages)
- 52
In these paper, we proposed a new key protection method based on secret splitting protocol, in which a secret encryption key is generated using both user's hardware-dependent unique information and cryptographic secure random bit strings provided by the data owner. It is not necessary to send the decode key. It means that the coped information is not used again in the unauthorized system. And also it is not to adopt in the other system even though the decode key is founded because encryption system is different every each message. So it is possible to secure against obstacles..
Abstract
1. 서론
2. 관련연구
3. 결론
References
(0)
(0)