Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information Security and Cryptology
Journal Basic Information
Journal DOI :
Korea Institutes of Information Security and Cryptology
Editor in Chief :
Volume & Issues
Volume 11, Issue 6 - Dec 2001
Volume 11, Issue 5 - Oct 2001
Volume 11, Issue 4 - Aug 2001
Volume 11, Issue 3 - Jun 2001
Volume 11, Issue 2 - Apr 2001
Volume 11, Issue 1 - Feb 2001
Selecting the target year
Protecting Mobile Agent with VPN
Journal of the Korea Institute of Information Security and Cryptology, volume 11, issue 3, 2001, Pages 3~12
In this course of Internet proliferation, many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies is private networks has further fuelled the demand for network-based applications. The most promising among the new paradigms is the use of mobile agents. The mobile agent is capable of migrating autonomously form node to node in the network, to perform some computations on behalf of the user. The mobile agent paradigm is attractive alternative to traditional client-server programming for a significant class of network-centric applications. It does however, suffer. from a major drawback namely, the potential for malicious attacks, abuse of resources, pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper describes the design of a secure mobile agent gateway 7hat can split and merge the agent code with security policy database on the VPN. This mechanism will promote security in the mobile agent systems.
A Provably secure Pseudorandom generator from Braid groups
Journal of the Korea Institute of Information Security and Cryptology, volume 11, issue 3, 2001, Pages 13~22
The notion of pseudorandomness plays an important role in modem cryptography as well as computer science. We show a simple and practical construction of a pseudorandom generator based on the intractability of the problem in braid groups. The generator is proved as secure as a hard instance of a variant of the conjugacy problem.
On a High-Speed Implementation of LILI-128 Stream Cipher Using FPGA/VHDL
Journal of the Korea Institute of Information Security and Cryptology, volume 11, issue 3, 2001, Pages 23~32
Since the LILI-128 cipher is a clock-controlled keystream generator, the speed of the keystream data is degraded in a clock-synchronized hardware logic design. Basically, the clock-controlled
in the LILI-128 cipher requires a system clock that is 1 ~4 times higher. Therefore, if the same clock is selected, the system throughput of the data rate will be lowered. Accordingly, this paper proposes a 4-bit parallel
, where each register bit includes four variable data routines for feed feedback of shifting within the
. Furthermore, the timing of the propose design is simulated using a
plus II from the ALTERA Co., the logic circuit is implemented for an FPGA device (EPF10K20RC240-3), and the throughput stability is analyzed up to a late of 50 Mbps with a 50MHz system clock. (That is higher than the 73 late at 45 Mbps, plus the maximum delay routine in the proposed design was below 20ns.) Finally, we translate/simulate our FPGA/VHDL design to the Lucent ASIC device( LV160C, 0.13
CMOS & 1.5v technology), and it could achieve a throughput of about 500 Mbps with a 0.13
semiconductor for the maximum path delay below 1.8ns.
Design of traceable Electronic Cash System based on Feige-Fiat-Shamir blind digital signature
Journal of the Korea Institute of Information Security and Cryptology, volume 11, issue 3, 2001, Pages 33~44
E-commerce has various advantages such as saving the cost and no constraint on time and space, unlike real-world commerce. On the other hand, e-commerce has some important issues to solve since the commerce is conducted on the cyberspace. The issues are a mutual confidence of parties participating in the commerce as well as a method of payments. On early days, electronic cash was designed using blind digital signature to protect the personal information from being exposed and to provide the perfect anonymity for user. In this paper, a new blind signature scheme based on Feige-Fiat-Shamir digital signature is proposed, which is very efficient compared with the other schemes in terms of the computational complexity. Also, a traceable Electronic Cash System which is based on the proposed blind digital signature is designed, which has a nice feature of identifying the spender in case of using the money illegally.
A Fast Algorithm for evaluating the Security of Substitution and Permutation Networks against Differential attack and Linear attack
Journal of the Korea Institute of Information Security and Cryptology, volume 11, issue 3, 2001, Pages 45~52
In this paper, we examine the method for evaluating the security of SPN structures against differential cryptanalysis and linear cryptanalysis. We present an example of SPN structures in which there is a considerable difference between the differential probabilities and the characteristic probabilities. Then we 7pose an algorithm for estimating the maximum differential probabilities and the maximum linear hull probabilities of SPN structures and an useful method for accelerating the proposed algorithm. By using this method, we obain the maximum differential probabilities and the maximum linear probabilities of round function F of block cipher E2.
On the Security of Key Recovery enhanced Key Exchange Protocol
Journal of the Korea Institute of Information Security and Cryptology, volume 11, issue 3, 2001, Pages 53~62
In this paper, we study the security of key recovery enhanced key exchange protocol. We present a subliminal channel of self-escrowed Diffie-Hellman key exchange protocol proposed by P. Paillier and M. Yung in ICISC\`99, and also we present a method to prevent such a subliminal channel. In addition, we review and analyze the weakness of the modified key recovery enhanced key exchange Protocol proposed by C. Kim and p. Lee in PKC 2001.
A Study on the Prevention of Smartcard Forgery and Alteration Using Angular Multiplexing and Private Key Multiplexing based on Optical Encryption
Journal of the Korea Institute of Information Security and Cryptology, volume 11, issue 3, 2001, Pages 63~69
Smartcard is highlighted as infrastructure that has an excellent security for executing functions such as user authentication, access control, information storage and control, and its market is expanding rapidly. But possibilities of forgery and alteration by hacking are increasing as well. This paper proposes a method to prevent card forgery and alteration using angular multiplexing and private key multiplexing method on optical encryption, and proposed a Public Key Infrastructure(PKI)-based authentication system combined with One-Time Password (OTP) for verification of forgery and alteration .
Cryptographic Traces for the Protection of Mobile Agent Execution
Journal of the Korea Institute of Information Security and Cryptology, volume 11, issue 3, 2001, Pages 71~78
In this paper, we describe the vulnerabilities against mobile agent and analyze existing schemes to cope with them. Also we propose a new scheme which protects the executed information by mobile agent and simultaneously traces the executions of mobile agent. The proposed scheme provides non-repudiation between participations for the executions of mobile agent, forward integrity against modification and protection against code insertion or deletion attack.