Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information Security and Cryptology
Journal Basic Information
Journal DOI :
Korea Institutes of Information Security and Cryptology
Editor in Chief :
Volume & Issues
Volume 17, Issue 6 - Dec 2007
Volume 17, Issue 5 - Oct 2007
Volume 17, Issue 4 - Aug 2007
Volume 17, Issue 3 - Jun 2007
Volume 17, Issue 2 - Apr 2007
Volume 17, Issue 1 - Feb 2007
Selecting the target year
Pseudorandom Permutation and Function Families Secure against Related-Key Attacks
Kim, Jong-Sung ; Sung, Jae-Chul ; Eun, Hi-Chun ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 5, 2007, Pages 3~14
In this paper, we observe that secure tweakable permutation families in the sense of strong pseudorandom permutation (SPRP) can be transformed to secure permutation families in the sense of SPRP against related-key attacks (SPRP-RKA). This fact allows us to construct a secure SPRP-RKA which is the most efficient to date. We also observe that secure function families of a certain form in the sense of a pseudorandom function (PRF) can be transformed to secure permutation families in the sense of PRP-RKA. We can exploit it to get various secure constructions against related-key attacks from known MAC algorithms. Furthermore, we define other security notions for related-key attacks, namely indistinguishability and non-malleability, and look into the relations between the security notions fur related-key attacks. We show that secure tweakable permutation families in the sense of indistinguishability (resp. non-malleability) can be transformed to secure permutation families in the sense of indistinguishability (resp. non-malleability) against related-key attacks.
Anonymous Ad Hoc Routing Protocol based on Group Signature
Paik, Jung-Ha ; Kim, Bum-Han ; Lee, Dong-Hoon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 5, 2007, Pages 15~25
According to augmentation about interesting and demanding of privacy over the rest few years, researches that provide anonymity have been conducted in a number of applications. The ad hoc routing with providing anonymity protects privacy of nodes and also restricts collecting network information to malicious one. Until recently, quite a number of anonymous routing protocols have been proposed, many of them, however, do not make allowance for authentication. Thus, they should be able to have vulnerabilities which are not only modifying packet data illegally but also DoS(denial of service) attack. In this paper, we propose routing protocol with providing both anonymity and authentication in the mobile ad hoc network such as MANET, VANET, and more. This scheme supports all of the anonymity properties which should be provided in Ad Hoc network. In addition, based on the group signature, authentication is also provided for nodes and packets during route discovery phase. Finally, route discovery includes key-agreement between source and destination in order to transfer data securely.
Practical Secure E-mail Protocols Providing Perfect Forward Secrecy
Lee, Chang-Yong ; Kim, Dae-Young ; Shim, Dong-Ho ; Kim, Sang-Jin ; Oh, Hee-Kuck ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 5, 2007, Pages 27~38
One of the most important security issues of e-mail service is user privacy. Currently, various security protocols, like PGP(pretty Good Privacy), S/MIME(Secure/Multipurpose Internet Mail Extension), have been proposed. These protocols, however, do not provide forward secrecy. Recently, some security protocols that provide forward secrecy were proposed. But all of them require changes to the current e-mail infrastructure. Moreover, contrary to authors' intention, some of them do not actually provide perfect forward secrecy. In this paper, we propose a new practical e-mail security protocol. The proposed protocol provides perfect forward secrecy and uses a practical e-mail model that dose not require any changes to existing e-mail servers. It encrypts and authenticates messages efficiently using elliptic curve based signcryption scheme. In addition, we provide a way to send secure group e-mails.
Development of Minutiae-level Compensation Algorithms for Interoperable Fingerprint Recognition
Jang, Ji-Hyeon ; Kim, Hak-Il ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 5, 2007, Pages 39~53
The purpose of this paper is the development of a compensation algorithm by which the interoperability of fingerprint recognition can be improved among various different fingerprint sensor. In order to compensate for the different characteristics of fingerprint sensor, an initial evaluation of the sensors using both the ink-stamped method and the flat artificial finger pattern method was undertaken. This paper proposes Common resolution method and Relative resolution method for compensating different resolution of fingerprint images captured by disparate sensors. Both methods can be applied to image-level and minutia-level. In order to compensate the direction of minutiae in minutia-level, Unit vector method is proposed. The EER of the proposed method was improved by average 64.8% better than before compensation. This paper will make a significant contribution to interoperability in the system integration using different sensors.
Differential Side Channel Analysis Attacks on FPGA Implementations of ARIA
Kim, Chang-Kyun ; Yoo, Hyung-So ; Park, Il-Hwan ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 5, 2007, Pages 55~63
This paper has investigated the susceptibility of an FPGA implementation of a block cipher against side channel analysis attacks. We have performed DPA attacks and DEMA attacks (in the nea. and far field) on an FPGA implementation of ARIA which has been implemented into two architectures of S-box. Although the number of needed traces for a successful attack is increased when compared with existing results on smart cards, we have shown that ARIA without countermeasures is indeed very susceptible to side channel analysis attacks regardless of an architecture of S-box.
High-Order Differential Side Channel Analysis Attacks on Masked Hardware Implementations
Kim, Chang-Kyun ; Park, Il-Hwan ; Yoo, Hyung-So ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 5, 2007, Pages 65~72
In this paper, we investigate the several different types of higher-order differential side channel analysis (DSCA) attacks. We present that some of exiting higher-order DSCA attacks have some practical problem applying to two masked intermediate values being parallel processed. In order to solve this problem we propose a new higher-order DSCA attack using an efficient and simple preprocessing function. Using the proposed preprocessing function we clearly show that 2nd-order DSCA attacks are still a practical threat fur masked hardware implementations.
A Study of Worm Propagation Modeling extended AAWP, LAAWP Modeling
Jun, Young-Tae ; Seo, Jung-Taek ; Moon, Jong-Sub ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 5, 2007, Pages 73~86
Numerous types of models have been developed in recent years in response to the cyber threat posed by worms in order to analyze their propagation and predict their spread. Some of the most important ones involve mathematical modeling techniques such as Epidemic, AAWP (Analytical Active Worm Propagation Modeling) and LAAWP (Local AAWP). However, most models have several inherent limitations. For instance, they target worms that employ random scanning in the entire nv4 network and fail to consider the effects of countermeasures, making it difficult to analyze the extent of damage done by them and the effects of countermeasures in a specific network. This paper extends the equations and parameters of AAWP and LAAWP and suggests ALAAWP (Advanced LAAWP), a new worm simulation technique that rectifies the drawbacks of existing models.
An AAA Mechanism using ID-based Ticket offer Anonymity
Moon, Jong-Sik ; Paek, Chang-Hyun ; Lee, Im-Yeong ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 5, 2007, Pages 87~98
AAA protocol is an information protection technology which systematically provides authentication, authorization and accounting function not only in the existing wire network but also in the rapidly developing wireless network, various services and protocol. Nowadays, standardization of the various application services is in progress with the purpose of AAA standardization fer the mobile user in the wireless network. And various researches are being conducted fur using AAA in the roaming service and mobile IPv6 network between heterogeneous networks. In this paper uses OTP and ID-based ticket for user authentication in the mobile device under the ubiquitous environment, and service is seamlessly provided even though the mobile device moves from the home network to the foreign network. In addition, with the ticket renewed from the foreign network, the overhead of the home authentication server can be reduced, and provides anonymity of service through the anonymity ID.
A Strong RFID Authentication Protocol Based on Synchronized Secret Information
Ha, Jae-Cheol ; Ha, Jung-Hoon ; Park, Jea-Hoon ; Moon, Sang-Jae ; Kim, Hwan-Koo ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 5, 2007, Pages 99~109
Lee et al. recently proposed an RFID mutual authentication scheme based on synchronized secret information. However, we found that their protocol is vulnerable to a spoofing attack in which an adversary can impersonate a legal tag to the reader by sending a malicious random number. To remedy this vulnerability, we propose two RFID authentication protocols which are secure against all possible threats including backward and forward traceability. Furthermore, one of the two proposed protocols requires only three hash operations(but,
operations in resynchronization state, m is the number of tags) in the database to authenticate a tag, hence it is well suitable fur large scale RFID systems.
A Security Model for Duplication Resistant eSeal
Kim, Joo-Hae ; Choi, Eun-Young ; Lee, Dong-Hoon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 5, 2007, Pages 111~116
An eSeal(Electrical Seal) is an active RFID device which installed on the door of a container. The main role of the tag is to make sure the seal is not breaking by unauthorized people. Because an eSeal uses RFID system, we need to prevent eavesdrop and impersonate. Moreover, an eSeal which uses a secure protocol must not be able to duplicate. If duplication resistant property is not provide to a eSeal, an attacker may replace a object in the sealed container and reseal the container with duplicated eseal to hide breaking of the eSeal. In this paper, we provide a protocol which resist duplicate an eSeal during prevent eavesdrop and impersonation.
Design and Implementation of an Agent-Based System for Luring Hackers
Kim, Ik-Su ; Kim, Myung-Ho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 5, 2007, Pages 117~130
A honeypot is a security resource whose value lies in being attack. It collects data regarding the attack strategies and tools of hackers. However, the honeypot is normally located at a single point, and the possibility is small that a hacker will attack it. Unused ports-based decoy systems which gather data about hackers activities have been developed to complement honeypots. However, the systems have some problems to be deployed in actual environment. In this paper, we propose an agent-based system which enhances shortcomings of the unused ports-based decoy systems. It makes honeypot gather more information regarding hacker activities and protects clients from attacks. Moreover, the proposed system can increase the chance of tracking hackers activities without wasting additional IP addresses and computer hardwares.
A development of weakness calculation method for information system
Park, Joong-Gil ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 5, 2007, Pages 131~139
Vulnerability analysis helps to remove discriminating vulnerabilities that exist in various equipment that composes operating information system. It is possible to explain representation and exclusion method about vulnerabilities of each equipment by vulnerability analysis. But it is difficult to display the weakness of whole information system. To do this, analyst synthesizes several information that achieved by vulnerability analysis. But the existing method does not provide fair evaluation because operators' personal opinion. In this paper, we explain about method that unites discriminatively vulnerable point and expresses whole weakness degree in numerical value by equipment, by system class, or by overall system.
Secure RFID-based Payment System against Various Threats
Kim, In-Seok ; Choi, Eun-Young ; Lee, Dong-Hoon ; Lim, Jong-In ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 5, 2007, Pages 141~146
Barcodes have been widely used to implement automatic identification systems but there are various problems such as security weakness or distance restriction in scanning barcode signals in a barcode-based automatic identifcation systems. Recently researchers are gradually interested in radio frequency identification (RFID) and RFID systems have been applied to various fields than before. Especially one of RFID application fields, a bank system uses RFID tagged bankontes to prevent illegal transactions such as counterfeiting banknotes and money laundering. In this paper, we propose a RFID system for protecting location provacy of a banknote holder. In addition, our paper describes that a trust party can trace a counterfeit banknote holder to provide against emergencies.