Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information Security and Cryptology
Journal Basic Information
Journal DOI :
Korea Institutes of Information Security and Cryptology
Editor in Chief :
Volume & Issues
Volume 17, Issue 6 - Dec 2007
Volume 17, Issue 5 - Oct 2007
Volume 17, Issue 4 - Aug 2007
Volume 17, Issue 3 - Jun 2007
Volume 17, Issue 2 - Apr 2007
Volume 17, Issue 1 - Feb 2007
Selecting the target year
Related-Key Differential Attacks on the Block-wise Stream Cipher TWOPRIME
Kim, Gu-Il ; Sung, Jae-Chul ; Hong, Seok-Hie ; Lim, Jong-In ; Kim, Jong-Sung ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 6, 2007, Pages 3~10
In this paper we present related-key differential attacks on the block-wise stream cipher TWOPRIME. We construct various related-key differentials of TWOPRIME and use them to show that recovering related keys of TWOPRIME can be performed with a data complexity of
known plaintext blocks and a time complexity of
8-bit table lookups.
New Multiple Linear Cryptanalysis of Block Ciphers
Hong, Deuk-Jo ; Sung, Jae-Chul ; Lee, Sang-Jin ; Hong, Seok-Hie ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 6, 2007, Pages 11~18
Multiple linear cryptanalysis has been researched as a method building up the linear attack strength. We indicate that the lastest linear attack algorithm using multiple approximations, which was proposed by Biryukov et al. is hardly applicable to block ciphers with highly nonlinear key schedule, and propose a new multiple linear attack algorithm. Simulation of the new attack algorithm with a small block cipher shows that theory for the new multiple linear cryptanalysis works well in practice.
Measurement of Fingerprint Image Quality using Hybrid Segmentation method
Park, Noh-Jun ; Jang, Ji-Hyeon ; Kim, Hak-Il ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 6, 2007, Pages 19~28
The purpose of this paper is to present a new measure for fingerprint image quality assessment that has a considerable effect on evaluation of fingerprint databases. This paper introduces a hybrid segmentation method for measuring an image quality and evaluates the experimental results using various fingerprint databases. This study compares the performance of the proposed hybrid segmentation using variance and coherence of fingerprints against the NIST's NFIQ program. Although NFIQ is a most widely used tool, it classifies the image quality into 5 levels. However, the proposed hybrid method is developed to be conformant to the ISO standards and accordant to human visual perception. The experimental results demonstrate that the hybrid method is able to produce finer quality measures.
Design of high-speed RSA processor based on radix-4 Montgomery multiplier
Koo, Bon-Seok ; Ryu, Gwon-Ho ; Chang, Tae-Joo ; Lee, Sang-Jin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 6, 2007, Pages 29~39
RSA is one of the most popular public-key crypto-system in various applications. This paper addresses a high-speed RSA crypto-processor with modified radix-4 modular multiplication algorithm and Chinese Remainder Theorem(CRT) using Carry Save Adder(CSA). Our design takes 0.84M clock cycles for a 1024-bit modular exponentiation and 0.25M cycles for a 512-bit exponentiations. With 0.18um standard cell library, the processor achieves 365Kbps for a 1024-bit exponentiation and 1,233Kbps for two 512-bit exponentiations at a 300MHz clock rate.
Specification-based Intrusion Detection System for WIPI
Kim, Ik-Jae ; Lee, Soo-Jin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 6, 2007, Pages 41~56
In this paper, we propose a specification-based intrusion detection system for WIPI(Wireless Internet Platform for Interoperability). In proposing the system, we focused on providing lightweight code, supporting multiple languages and hardware independence. The proposed system is based on an algorithm which detects an intrusion to main API of WIPI-HAL(Handset Adaptation Layer) and defines the prototype of mIDS(mobile IDS) API group that it can be added on the HAL. Moreover, we prove apply possibility through a WIPI emulator using java library.
A Digital ID Wallet User-oriented Mechanism in a Mobile Environment
Song, Dong-Ho ; Lim, Sun-Hee ; Lim, Jong-In ; Yi, Ok-Yeon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 6, 2007, Pages 57~64
As a ubiquitous environment approaches and the use of the wireless Internet using the mobile terminals is on the increase. Therefore, the users have to undergo the inconvenience of repeatedly input the same information for the user registration and the ID certification. The information the users have to put in to register in on-line services range from the basic personal information to the more other private information such as financial information. Accordingly the user can be in control of users personal information and safely manage the information by conveniently selecting from the Digital ID Wallet the Ticket that holds various information including the basic, financial or payment certification-related information. Consequently, we propose a digital identity management mechanism to control one's personal information in a mobile environment.
Peer to Peer Anonymous Protocol Based Random Walk
Cho, Jun-Ha ; Rhee, Hyun-Sook ; Park, Hyun-A ; Lee, Dong-Hoon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 6, 2007, Pages 65~76
The P2P file sharing system sends the results to users by searching the files in the shared folders. In the process of it, the problem is that the transferred information includes the pathname and file information and it can be revealed who searches which files. In related to this problem, anonymous file sharing P2P protocol has been an active research area where a number of works have been produced. However, the previous studies still have a few of weakness. Therefore, We propose two anonymous P2P file sharing protocols based on the decentralized and unstructured Random Walk. The first scheme uses the dynamic onion routing where the requester can receive the wanted file without knowing other peers' IDs. The second scheme uses the IP multicast method which lowers the computational overhead. Both of them are more suited for the dynamic P2P system.
An Improvement of Packet Filtering Functions for Tunneling Based IPv4/IPv6 Transition Mechanisms
Lee, Wan-Jik ; Heo, Seok-Yeol ; Lee, Won-Yeoul ; Shin, Bum-Joo ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 6, 2007, Pages 77~87
It will need a quite long time to replace IPv4 protocol, which currently used, with IPv6 protocol completely, thus we will use both IPv4 and IPv6 together in the Internet during the period. For coexisting protocols, IETF standardized various IPv4/IPv6 transition mechanisms. However, new security problems of IPsec adaptation and IPv6 packet filtering can be raised by tunneling mechanism which mainly used in transition mechanisms. To resolve these problems, we suggested two improved schemes for packet filtering functions, which consists of an inner header filtering scheme and a dedicated filtering scheme for IPv4/IPv6 transition mechanisms. Also we implemented our proposed schemes based on Linux Netfilter framework, and we tested their filtering functions and evaluated experimental performance of our implementation on IPv4/IPv6 transition testbed. These evaluation tests indicated that our improved packet filtering functions can solve packet filtering problems of IPv4/IPv6 transition mechanisms without severely affecting system performance.
Malware Detection Via Hybrid Analysis for API Calls
Kang, Tae-Woo ; Cho, Jae-Ik ; Chung, Man-Hyun ; Moon, Jong-Sub ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 6, 2007, Pages 89~98
We have come a long way in the information age. Thanks to the advancement of such technologies as the internet, we have discovered new ways to convey information on a broader scope. However, negative aspects exist as is with anything else. These may include invasion of privacy over the web, or identity theft over the internet. What is more alarming is that malwares so called 'maliciouscodes' are rapidly spreading. Its intent is very destructive which can result in hacking, phishing and as aforementioned, one of the most disturbing problems on the net, invasion of privacy. This thesis describes the technology of how you can effectively analyze and detect these kind of malicious codes. We propose sequencial hybrid analysis for API calls that are hooked inside user-mode and kernel-level of Windows. This research explains how we can cope with malicious code more efficiently by abstracting malicious function signature and hiding attribute.
Analysis on Vulnerability of Secure USB Flash Drive and Development Protection Profile based on Common Criteria Version 3.1
Jeong, Han-Jae ; Choi, Youn-Sung ; Jeon, Woong-Ryul ; Yang, Fei ; Won, Dong-Ho ; Kim, Seung-Joo ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 6, 2007, Pages 99~119
The USB flash drive is common used for portable storage. That is able to store large data and transfer data quickly and carry simply. But when you lose your USB flash drive without any security function in use, all stored data will be exposed. So the new USB flash drive supported security function was invented to compensate for the problem. In this paper, we analyze vulnerability of 6 control access program for secure USB flash drives. And we show that exposed password on communication between secure USB flash drive and PC. Also we show the vulnerability of misapplication for initialization. Further we develop a protection profile for secure USB flash drive based on the common criteria version 3.1. Finally, we examine possible threat of 6 secure USB flash drives and supports of security objectives which derived from protection profile.
Reversible Watermarking in JPEG Compression Domain
Cui, Xue-Nan ; Choi, Jong-Uk ; Kim, Hak-Il ; Kim, Jong-Weon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 6, 2007, Pages 121~130
In this paper, we propose a reversible watermarking scheme in the JPEG compression domain. The reversible watermarking is useful to authenticate the content without the quality loss because it preserves the original content when embed the watermark information. In the internet, for the purpose to save the storage space and improve the efficiency of communication, digital image is usually compressed by JPEG or GIF. Therefore, it is necessary to develop a reversible watermarking in the JPEG compression domain. When the watermark is embedded, the lossless compression was used and the original image is recovered during the watermark extracting process. The test results show that PSNRs are distributed from 38dB to 42dB and the payload is from 2.5Kbits to 3.4Kbits where the QF is 75. Where the QF of the Lena image is varied from 10 to 99, the PSNR is directly proportional to the QF and the payload is around
A Semi-fragile Watermarking Algorithm of 3D Mesh Model for Rapid Prototyping System Application
Chi, Ji-Zhe ; Kim, Jong-Weon ; Choi, Jong-Uk ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 6, 2007, Pages 131~142
In this paper, semi-fragile watermarking algorithm was proposed for the application to RP(Rapid Prototyping) system. In the case of the perceptual change or distortion of the original one, the prototype product will be affected from the process because the RP system requires the high precision measure. Therefore, the geometrical transformations like translation, rotation and scaling, the mesh order change and the file format change are used in the RP system because they do not change the basic shapes of the 3D models, but, the decimation and the smoothing are not used because they change the models. The proposed algorithm which is called semi-fragile watermarking is robust against to these kinds of manipulations which preserve the original shapes because it considers the limitations of the RP system, but fragile against to the other manipulations which change the original shapes. This algorithm does not change the model shapes after embedding the watermark information, that is, there is no shape difference between the original model and the watermarked model. so, it will be useful to authenticate the data integrity and hide the information in the field of mechanical engineering which requires the high precision measure.
Analysis of Security Vulnerability on Firewall Logging Mechanism against DDoS Attack
Choun, Jun-Ho ; Jang, Kun-Won ; Jun, Moon-Seog ; Shin, Dong-Gyu ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 6, 2007, Pages 143~148
In the context of mass traffic, firewall system cannot record normal log files against DDoS attack. The loss of log record causes that a firewall system does not know whether a packet is normally filtered or not, and firewall log, which is an essential data for the counter measure of violation accident, cannot be verified as trusted. As a network speed increases, these problems happen more frequently and largely. Accordingly, the method to use simply additional hardware devices is not recommended for the popularization of firewall. This paper is devoted to verify the loss of iptable log that is the mother's womb of most domestic firewall systems and show that the log handling methods for conventional firewall systems are needed to improve.
String analysis for detection of injection flaw in Web applications
Choi, Tae-Hyoung ; Kim, Jung-Joon ; Doh, Kyung-Goo ;
Journal of the Korea Institute of Information Security and Cryptology, volume 17, issue 6, 2007, Pages 149~153
One common type of web-application vulnerabilities is injection flaw, where an attacker exploits faulty application code instead of normal input. In order to be free from injection flaw, an application program should be written in such a way that every potentially bad input character is filtered out. This paper proposes a precise analysis that statically checks whether or not an input string variable may have the given set of characters at hotspot. The precision is accomplished by taking the semantics of condition into account in the analysis.