Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information Security and Cryptology
Journal Basic Information
Journal DOI :
Korea Institutes of Information Security and Cryptology
Editor in Chief :
Volume & Issues
Volume 20, Issue 6 - Dec 2010
Volume 20, Issue 5 - Oct 2010
Volume 20, Issue 4 - Aug 2010
Volume 20, Issue 3 - Jun 2010
Volume 20, Issue 2 - Apr 2010
Volume 20, Issue 1 - Feb 2010
Selecting the target year
Efficient Hardware Implementation of
Pairing Based Cryptography
Lee, Dong-Geoon ; Lee, Chul-Hee ; Choi, Doo-Ho ; Kim, Chul-Su ; Choi, Eun-Young ; Kim, Ho-Won ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 1, 2010, Pages 3~16
Recently in the field of the wireless sensor network, many researchers are attracted to pairing cryptography since it has ability to distribute keys without additive communication. In this paper, we propose efficient hardware implementation of
pairing which is one of various pairing scheme. we suggest efficient hardware architecture of
pairing based on parallel processing and register/resource optimization, and then we present the result of our FPGA implementation over GF(
). Our implementation gives 15% better result than others in Area Time Product.
An Efficient Signature Batch Verification System for VANET
Lim, Ji-Hwan ; Oh, Hee-Kuck ; Kim, Sang-Jin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 1, 2010, Pages 17~31
In VANET (Vehicular Ad hoc NETwork), vehicles can efficiently verify a large number of signatures efficiently using batch verification techniques. However, batch verification performed independently in each vehicle raises many redundant verification cost. Although, an RSU (Road Side Unit) can perform the batch verification as a proxy to reduce this cost, it additionally requires an efficient method to identify invalid signatures when the batch verification fails. In this paper, we analyze several ways of constructing a distributed batch verification system, and propose an efficient distributed batch verification system in which participating vehicles perform batch verification in a distributive manner for a small size signature set. In our proposed system, each node can report the batch verification result or the identified invalid signatures list and the RSU who received these reports can identify the invalid signatures and efficiently exclude them.
Privacy Aware Authentication Protocol for Cognitive Radio Networks
Kim, Hyun-Sung ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 1, 2010, Pages 33~40
Recently, the spectrum scarcity is becoming a big issue because there are exponential growth of broadcasting and communication systems in the spectrum demand. Cognitive radio is a technology that is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum opportunistically. Kuroda et al. proposed a radio-independent authentication protocol for cognitive radio networks. This paper first shows the privacy weaknesses in the authentication protocol by Kuroda et al. and proposes a privacy aware authentication protocol to solve the weaknesses.
Mutual Identification and Key Exchange Scheme in Secure Vehicular Communications based on Group Signature
Kim, Dai-Hoon ; Choi, Jae-Duck ; Jung, Sou-Hwan ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 1, 2010, Pages 41~50
This paper proposes a mutual identification and session key exchange scheme in secure vehicular communication based on the group signature. In VANETs, security requirements such as authentication, conditional privacy, non-repudiation, and confidentiality are required to satisfy various vehicular applications. However, existing VANET security methods based on the group signature do not support a mutual identification and session key exchange for data confidentiality. The proposed scheme allows only one credential to authenticate ephemeral Diffie-Hellman parameters generated every key exchange session. Our scheme provides a robust key exchange and reduces storage and communication overhead. The proposed scheme also satisfies security requirements for various application services in VANETs.
Secure AKA(Authentication and Key Agreement) Protocol for Binary CDMA Network
Kim, Yong-Hee ; Park, Mi-Ae ; Cho, Jin-Woong ; Lee, Hyeon-Seok ; Lee, Jang-Yeon ; Yi, Ok-Yeon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 1, 2010, Pages 51~61
Koinonia system is designed to fully utilize the advantage of Binary CDMA so as to guarantee QoS in wireless networks. In this paper, we propose the new network structure based on this system and refer to it as BLAN(Binary CDMA LAN). Although BLAN is similar structure to IEEE 802.11 WLAN, it will ensure the fast handover and QoS. We also propose the AKA(Authentication and Key Agreement) protocol and Reauthentication protocol to be used for communication in BLAN. These protocols are securely and efficiently designed using the user identity module to support the more powerful authentication. Hence, BLAN, including the proposed protocols, will support the high mobility and security. In conclusion, we expect that BLAN can be applied to future infrastructure on special environment, and it can be helpful showing the new network model which alternate WLAN.
Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database
Won, Tae-Youn ; Yu, Young-Jun ; Chun, Ji-Young ; Byun, Jin-Wook ; Lee, Dong-Hoon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 1, 2010, Pages 63~72
RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.
Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments
Eun, Sun-Ki ; Jeon, Seo-Kwan ; Ahn, Jae-Young ; Oh, Soo-Hyun ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 1, 2010, Pages 73~83
Recently, as IT technologies developed, communication technologies of a various forms that satisfied convenience of user are being researched. Among various research, unlike traditional forms of communication, M2M communication is getting attention that without any control or involvement of people to establish communication between devices. However, the M2M communication could more easily be exposed to many security problems such as data exposure, data theft, unauthorized change and delete and privacy. Therefore, in this paper, we derive security requirements and propose the M2M communication architecture that provide a secure M2M communication environment. Also, we propose a secure mutual authentication and key establishment protocol between a M2M device or gateway domain and a M2M network domain. The proposed protocol is secure against replay attack, impersonation attack and protect a user privacy and tracing.
Improved Authentication and Data Protection Protocol of Passive RFID Security Tag and Reader
Yang, Yeon-Hyun ; Kim, Sun-Young ; Lee, Pil-Joong ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 1, 2010, Pages 85~94
As an automatic identification technology, in which electronic tags are attached to items and system auto-identifies informations of the items using wireless communication technology, use of RFID system is increasing in various fields. According to that, related security problems are becoming important issue. Up to now, many authentication protocols have been proposed to solve security problem of RFID system. In this paper, We show that the RFID authentication protocols in [9, 10], which are compatible with Type C RFID system in ISO 18000-6 Amd1, are vulnerable to a spoofing attack. In addition, we propose improved protocols having small additional cost over the original protocols.
Information Security Professionals' Turnover Intention and Its Causes
Yoo, Hye-Won ; Kim, Tae-Sung ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 1, 2010, Pages 95~104
As the information security industry has developed and its proportion in the national economy has increased, the demand for the information security manpower also has expanded. With the frequent turnovers of the information security professionals within the industry and between other industries, it is essential to investigate the causes of turnovers for the efficient human resource management and furthermore the sustainable growth of the industry. This study aims to analyze the factors affecting the information security professionals' turnover intention. We reviewed related researches to select the turnover causes that affect the turnover intention and tested the relationships between the turnover causes and the turnover intention. Human resource managers can use the results of this study to maximize the performance of the organization through the reasonable turnover management of information security professionals.
An Algorithm for Detecting Leak of Defaced Confidential Information Based on SVDD
Ghil, Ji-Ho ; Nam, Ki-Hyo ; Kang, Hyung-Seok ; Kim, Seong-In ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 1, 2010, Pages 105~111
This paper proposes the algorithm which addresses the problem of detecting leak of defaced confidential documents from original confidential document. Generally, a confidential document is defaced into various forms by insiders and then they are trying to leak these defaced documents to outside. Traditional algorithms detecting leak of documents have low accuracy because they are based on similarity of two documents, which do not reflect various forms of defaced documents in detection. In order to overcome this problem, this paper proposes a novel v-SVDD algorithm which is based on SVDD, the novelty detection algorithm. The result of experiment shows that there is significant improvement m the accuracy of the v-SVDD in comparison with the traditional algorithms.
System Specification-based Design of Mobile Alarm System for Privacy Protection
Jang, Eun-Young ; Kim, Hyung-Jong ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 1, 2010, Pages 113~121
The system specification is a system theory based formal representation method for systems' structure and behavior modeling. When we make use of the system specification method in each step of software development, we can derive a hierarchical and modularized system design which enables us to manage the software development process flexibly. This research presents system specification based design of a mobile alarm system which sends alerts about illegal usage of private information and manages the response against the each alert. In our design of mobile alarm system, there are formal definition of alert message overcoming the functional limitation of mobile device and hierarchical modularized modeling of alarm processing using system specification. The efficiency of making use of the system specification is shown by applying the specification method to implementation of mobile alarm system. The contribution of this work is in design and implementation of mobile alarm system which enables us to handle the private information leakage situation more flexible way using system specification based software designing method.
Role Based Petri-Net : Role Based Expression Model for an Efficient Design of Attack Scenarios
Park, Jun-Sik ; Cho, Jae-Ik ; Moon, Jong-Sub ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 1, 2010, Pages 123~128
Graph expression of attack scenarios is a necessary method for analysis of vulnerability in server as well as the design for defence against attack. Although various requirement analysis model are used for this expression, they are restrictive to express combination of complex scenarios. Role Based Petri Net suggested in this paper offer an efficient expression model based role on Petri Net which has the advantage of concurrency and visuality and can create unknown scenarios.
Domain Key Based Efficient Redistribution Mechanism of Scalable Contents
Park, Su-Wan ; Shin, Sang-Uk ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 1, 2010, Pages 129~134
In this paper, we propose a redistribution mechanism of the content that is adapted to devices, which may have different display size and computing capabilities, in home network. The proposed system introduces a mechanism that the encrypted content compressed by H.264/SVC(Scalable Video Coding) scheme which has been standardized recently is provided to the device into a level of content suitable to each device capability. To efficiently superdistribute SVC content, this paper defines three requirements and proposes redistribution mechanism which satisfies these requirements using another licence that it is called 'Ticket'. Our system allows devices to redistribute the content freely in the domain using domain key.