Advanced SearchSearch Tips
Digital Legal Seal for Message Authentication Code
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Digital Legal Seal for Message Authentication Code
Jung, ChangHun; Shin, DongOh; Jang, RhongHo; Nyang, DaeHun; Lee, KyungHee; Youm, Heung-Youl;
  PDF(new window)
In this paper, we present a security tool which called Digital Legal Seal. The Digital Legal Seal scans a barcode on a paper and print it with the tag generated by Hash-based Message Authentication Code(HMAC) in text format on a display device. The result of HMAC can be used for user authentication or secure message transmission on both online and offline. We examine not only how the Digital Legal Seal can make up the weak points of security card and OTP (One Time Password), but also the possibility of reducing the forgery of promissory note on offline.
Authentication Protocol;Hash-based Message Authentication Code;Digital Legal Seal;Online Banking;Promissory Note;
 Cited by
Payment & Settlement Systems Departm ent, "Payment & Settlement Newsletter,", The Bank of Korea, Vol. 2015, No. 8, Aug. 2015.

H. Seo and H. Kim, "Design and Implementation of Physical Secure Card for Financial Security," Journal of the Korea Institute of Information and Communication Engineering, Vol. 19, No. 4, pp. 855-863, Apr. 2015. crossref(new window)

H. Lee, "Press Releases,", Republic of Korea Nat ional Assembly, Sep. 2015.

M. Wu, S. Garfinkel and R. Miller, "Secure Web Authentication with Mobile Phones," DIMACS Workshop on Usable Privacy and Security Software, 2014.

Y. Maeng, D. Shin, S. Kim, D. Nyang and M. Lee, "A Vulnerability Analysis of MITB in Online Banking Transactions in Korea," Internet and Information Security, Vol. 1, No. 2, pp. 101-118, Nov. 2010.

Electronic Finance Division, "Press Releases,", Financial Services Commission, Jan. 2014.

M. Bellare, J. Kilian and P. Rogaway, "The Security of the Cipher Block Chaining Message Authentication Code," Journal of Computer and System Sciences, Vol. 61, Issue 3, pp. 362-399, Dec. 2000. crossref(new window)

M. Bellare, R. Canetti and H. Krawczyk, "Keying Hash Functions for Message Authentication," Lecture Notes in Computer Science, Vol. 1109, pp. 1-15, July. 2001.

Arduino UNO,


T. Kim, J. Lee and D. Lee, "Study on Mobile OTP(One Time Password) Mechanism based PKI for Preventing Phishing Attacks and Improving Availability," Korea Institute of Information Security and Cryptology, Vol. 21, No. 1, pp. 15-26, Feb. 2011.

B. Kang and H. Kim, "A study on the vulnerability of OTP implementation by using MITM attack and reverse engineering," Korea Institute of Information Security and Cryptology, Vol. 21. No. 6, pp. 83-99, Dec. 2011.