Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information Security and Cryptology
Journal Basic Information
Journal DOI :
Korea Institutes of Information Security and Cryptology
Editor in Chief :
Volume & Issues
Volume 20, Issue 6 - Dec 2010
Volume 20, Issue 5 - Oct 2010
Volume 20, Issue 4 - Aug 2010
Volume 20, Issue 3 - Jun 2010
Volume 20, Issue 2 - Apr 2010
Volume 20, Issue 1 - Feb 2010
Selecting the target year
Provable Security of Key Derivation Functions Based on the Block Ciphers
Kang, Ju-Sung ; Yi, Ok-Yeon ; Youm, Ji-Sun ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 4, 2010, Pages 3~16
Key derivation functions are used within many cryptographic systems in order to generate various keys from a fixed short key string. In this paper we survey a state-of-the-art in the key derivation functions and wish to examine the soundness of the functions on the view point of provable security. Especially we focus on the key derivation functions using pseudorandom functions which are recommended by NISI recently, and show that the variant of Double-Pipeline Iteration mode using pseudorandom permutations is a pseudorandom function. Block ciphers can be regarded as practical primitives of pseudorandom permutations.
A Differential Fault Attack on Block Cipher SEED
Jeong, Ki-Tae ; Sung, Jae-Chul ; Hong, Seok-Hie ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 4, 2010, Pages 17~24
A differential fault attack(DFA) is one of the most efficient side channel attacks on block ciphers. Almost all block ciphers, such as DES, AES, ARIA, SEED and so on., have been analysed by this attack. In the case of the known DFAs on SEED, the attacker induces permanent faults on a whole left register of round 16. In this paper, we analyse SEED against DFA with differential characteristics and addition-XOR characteristics of the round function of SEED. The fault assumption of our attack is that the attacker induces 1-bit faults on a particular register. By using our attack, we can recover last round keys and the master key with about
simple arithmetic operations. It can be simulated on general PC within about a couple of second.
Improved Differential Attack of Seven-Round SEED
Sung, Jae-Chul ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 4, 2010, Pages 25~30
Block Cipher SEED which was developed by KISA are not only Korea national standard algorithm of TTA but also one of standard 128-bit block ciphers of ISO/IEC. Since SEED had been developed, many analyses were tried but there was no distinguishing cryptanalysis except the 7-round differential attack in 2002. The attack used the 6-round differential characteristic with probability
and analyzed the 7-round SEED with
chosen plaintexts. In this paper, we propose a new 6-round differential characteristic with probability
and analyze the 7-round SEED with
A Novel Method for Effective Protection of IPTV Contents with One-Time Password and Conditional Access System
Seo, Ki-Taek ; Kim, Tae-Hun ; Kim, Jung-Je ; Lim, Jong-In ; Moon, Jong-Sub ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 4, 2010, Pages 31~40
The evolution of internet have opened the world of IPTV. With internet protocol, IPTV broadcasts contents stream. The IP protocol doesn't provide secure service due to IP characteristics. So, it is important to provide both connect and secure service. Conditional Access System and/or Digital Right Management are being used to protect IPTV contents. However, there exist restrictions in the view of security. In this paper, we analyse existing security technologies for IPTV and propose a novel method to enforce security efficiently. In the proposed method, OTP is used for encryption/decryption contents and CAS controls key for encryption/decryption and the right of user. With this scheme, it reduces the load of the system and provides more security.
Secure and Efficient V2V Message Authentication Scheme in Dense Vehicular Communication Networks
Jung, Seock-Jae ; Yoo, Young-Jun ; Paik, Jung-Ha ; Lee, Dong-Hoon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 4, 2010, Pages 41~52
Message authentication is an essential security element in vehicular ad-hoc network(VANET). For a secure message authentication, integrity, availability, privacy preserving skill, and also efficiency in various environment should be provided. RAISE scheme has been proposed to provide efficient message authentication in the environment crowded with lots of vehicles and generally considered to be hard to provide efficiency. However, as the number of vehicles communicating in the area increases, the overhead is also incurred in proportion to the number of vehicles so that it still needs to be reduced, and the scheme is vulnerable to some attacks. In this paper, to make up for the vulnerabilities in dense vehicular communication network, we propose a more secure and efficient scheme using a process that RSU(Road Side Unit) transmits the messages of neighbor vehicles at once with Bloom Filter, and timestamp to protect against replay attack. Moreover, by adding a handover function to the scheme, we simplify the authentication process as omitting the unnecessary key-exchange process when a vehicle moves to other area. And we confirm the safety and efficiency of the scheme by simulating the false positive probability and calculating the traffic.
A Privacy Preserving Efficient Route Tracing Mechanism for VANET
Lee, Byeong-Woo ; Kim, Sang-Jin ; Oh, Hee-Kuck ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 4, 2010, Pages 53~62
In VANETs (Vehicular Ad hoc NETwork), conditional anonymity must be provided to protect privacy of vehicles while enabling authorities to identify misbehaving vehicles. To this end, previous systems provide a mechanism to revoke the anonymity of individual messages. In VANET, if we can trace the movement path of vehicles, it can be useful in determining the liability of vehicles in car accidents and crime investigations. Although route tracing can be provided using previous message revocation techniques, they violate privacy of other vehicles. In this paper, we provide a route tracing technique that protects privacy of vehicles that are not targeted. The proposed method can be employed independently of the authentication mechanism used and includes a mechanism to prevent authorities from abusing this new function.
An Effective Feature Generation Method for Distributed Denial of Service Attack Detection using Entropy
Kim, Tae-Hun ; Seo, Ki-Taek ; Lee, Young-Hoon ; Lim, Jong-In ; Moon, Jong-Sub ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 4, 2010, Pages 63~73
Malicious bot programs, the source of distributed denial of service attack, are widespread and the number of PCs which were infected by malicious bot program are increasing geometrically thesedays. The continuous distributed denial of service attacks are happened constantly through these bot PCs and some financial incident cases have found lately. Therefore researches to response distributed denial of service attack are necessary so we propose an effective feature generation method for distributed denial of service attack detection using entropy. In this paper, we apply our method to both the DARPA 2000 datasets and also the distributed denial of service attack datasets that we composed and generated ourself in general university. And then we evaluate how the proposed method is useful through classification using bayesian network classifier.
A Secure Communication Scheme without Trusted RSU Setting for VANET
Fei, He ; Kun, Li ; Kim, Bum-Han ; Lee, Dong-Hoon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 4, 2010, Pages 75~87
Secure communication has been one of the main challenges in vehicular ad hoc networks(VANET) since broadcast messages from nearby vehicles contain life-critical information for drivers and passengers. So far various secure communication schemes have been proposed to secure the communication in VANET, and they satisfy most security requirements. However most of them need to put trust on roadside units(RSUs), which are usually deployed in unattended area and vulnerable to compromise. In this paper, we propose a secure communication scheme, which does not need to put trust on RSUs. And we adopt a grouping technique to averagely divide the huge burden in the server without jeopardizing the anonymity of users. Moreover we design a complete set of protocols to satisfy common security requirements with a relatively lower hardware requirement. At last, we evaluate the scheme with respect to security requirements, communication overhead, storage overhead and network performance.
A Random ID-based RFID Mutual authentication protocol for detecting Impersonation Attack against a back-end server and a reader
Yeo, Don-Gu ; Lee, Sang-Rae ; Jang, Jae-Hoon ; Youm, Heung-Youl ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 4, 2010, Pages 89~108
Recently many mutual authentication protocol for light-weight hash-based for RFID have been proposed. Most of them have assumed that communications between a backend server and reader are secure, and not considered threats for backend server and RFID reader impersonation. In the real world, however, attacks against database or reader are more effective rather than attacks against RFID tag, at least from attacker's perspective. In this paper, we assume that all communications are not secure to attackers except the physical attack, and considering realistic threats for designing a mutual authentication protocol based on hash function. And It supports a mutual authentication and can protect against the replay attack, impersonation attack, location tracking attack, and denial of service attack in the related work. We besides provide a secure and efficient RFID mutual authentication protocol which resists impersonation attacks on all of the entities and alow a backend server to search tag-related information efficiently. We conclude with analyzing the safety and efficiency among latest works.
A Pre-processing Technique for Performance Enhancement of the Differential Power Analysis Attack
Lee, You-Seok ; Lee, Yu-Ri ; Lee, Young-Jun ; Kim, Hyoung-Nam ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 4, 2010, Pages 109~115
Differential Power Analysis (DPA) is well known as one of efficient physical side-channel attack methods using leakage power consumption traces. However, since the power traces usually include the components irrelevant to the encryption, the efficiency of the DPA attack may be degraded. To enhance the performance of DPA, we introduce a pre-processing technique which extracts the encryption-related parts from the measured power consumption signals. Experimental results show that the DPA attack with the use of the proposed pre-processing method detects correct cipher keys with much smaller number of signals compared to that of the conventional DPA attack.
Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems
Kang, You-Sung ; Choi, Yong-Je ; Choi, Doo-Ho ; Lee, Sang-Yeoun ; Lee, Heyung-Sup ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 4, 2010, Pages 117~134
A passive RFID tag which received attention as a future technology for automatic and quick identification faces some difficulties about security problems such as tag authentication, reader authentication, data protection, and untraceability in addition to cost and reliable identification. A representative passive RFID technology is the ISO/IEC 18000-6 Type C which is an international standard for 900 MHz UHF-band. This standard has some difficulties in applying to the security services such as originality verification, tag's internal information protection, and untraceability, because it does not provide high-level security solution. In this paper, we summarize security requirements of ISO/IEC ITC 1/SC 31 international standardization group, propose security protocols suitable for the UHF-band passive RFID system using a crypto engine, and analyze its security strength. In addition, we verify that it is possible to implement a tag conforming with the proposed security protocols by presenting concrete command/response pairs and cryptographic method.
Integrated Privacy Protection Model based on RBAC
Cho, Hyug-Hyun ; Park, Hee-Man ; Lee, Young-Lok ; Noh, Bong-Nam ; Lee, Hyung-Hyo ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 4, 2010, Pages 135~144
Extensional End-to-End Encryption Technologies to Enhance User's Financial Information Security and Considerable Security Issues
Seung, Jae-Mo ; Lee, Su-Mi ; Noh, Bong-Nam ; Ahn, Seung-Ho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 4, 2010, Pages 145~154
End-to-End(E2E) encryption is to encrypt private and important financial information such as user's secret access numbers and account numbers from user's terminal to financial institutions. There has been found significant security vulnerabilities by various hacking in early E2E encryption system since early E2E encryption is not satisfied the basic security requirement which is that there does not exist user's financial information on plaintext in user's terminal. Extensional E2E encryption which is to improve early E2E encryption provides confidentiality and integrity to protect user's financial information from vulnerabilities such as alteration, forgery and leakage of confidential information. In this paper, we explain the extensional E2E encryption technology and present considerable security issues when the extensional E2E encryption technology is applied to financial systems.
Security Reconsideration on CRT-RSA Algorithm Against Fault Attacks using Opcode Modification
Ha, Jae-Cheol ; Baek, Yi-Roo ; Park, Jea-Hoon ; Moon, Sang-Jae ;
Journal of the Korea Institute of Information Security and Cryptology, volume 20, issue 4, 2010, Pages 155~160
Since the RSA cryptosystem based on Chinese Remainder Theorem is vulnerable to many fault insertion attacks, some countermeasures against them were proposed. Recently, Kim et al. or Ha et al. respectively proposed each countermeasure scheme based on fault propagation method. Unfortunately, Hur et al. insist that these countermeasures are vulnerable to their opcode modification fault attack. In this paper, we show that the proposed attack can not apply to almost CRT-RSA countermeasures which use multi-precision operations in long bit computation. Therefore, the countermeasure against fault attack proposed by Kim et al. or Ha et al. are still secure.