Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information Security and Cryptology
Journal Basic Information
Journal DOI :
Korea Institutes of Information Security and Cryptology
Editor in Chief :
Volume & Issues
Volume 22, Issue 6 - Dec 2012
Volume 22, Issue 5 - Oct 2012
Volume 22, Issue 4 - Aug 2012
Volume 22, Issue 3 - Jun 2012
Volume 22, Issue 2 - Apr 2012
Volume 22, Issue 1 - Feb 2012
Selecting the target year
Study on Vulnerability and Countermeasures of Authentication Mechanism in Wireless LAN
Choi, Jin-Ho ; Oh, Soohyun ;
Journal of the Korea Institute of Information Security and Cryptology, volume 22, issue 6, 2012, Pages 1219~1230
Recently, lots of users are using wireless LAN providing authentication and confidentiality with security mechanism such as WEP, WPA. But, weakness of each security mechanism was discovered and attack methods that user's information was exposed or modified to the third parties with it and abused by them were suggested. In this paper, we analyzed architecture of security mechanisms in wireless LAN and performed PSK cracking attack and cookie session hijacking attack with the known vulnerability. And, an improved 4-way handshake mechanism which can counter PSK cracking attack and a cookie replay detection mechanism which can prevent cookie session hijacking attack were proposed. Proposed mechanisms are expected to apply to establish more secure wireless LAN environment by countering existing vulnerability.
Construction of an Asymmetric Traitor Tracing Schemes with Anonymity
Lee, Moonsik ; Kang, SunBu ; Lee, Juhee ;
Journal of the Korea Institute of Information Security and Cryptology, volume 22, issue 6, 2012, Pages 1231~1242
Traitor tracing schemes deter traitors from sharing their private keys by tracing at least one of the subscribers who were implicated in the construction of a pirate decoder. In general, it is assumed that the system manager in the scheme generates and distributes the subscribers' private key. But if the system manager knows the subscribers' private keys, he cannot convince a third party of a certain subscriber's piracy. To solve this problem, the system manager should not know the whole parts of subscribers' private keys and this leads to researches of asymmetric schemes. Moreover for the purpose of enhancing subscribers' privacy, there were two proposals of introducing anonymity onto asymmetric traitor tracing schemes, but one of them turned out to be a failure. In this paper, we point out that the other proposal also has flaws. We consider how to introduce anonymity to traitor tracing schemes, as a result, we suggest a new framework which is practical. We also construct a scheme by using an anonymous credential system and an asymmetric traitor tracing scheme. We prove the security of our scheme and consider the typical applications.
STM-GOMS Model: A Security Model for Authentication Schemes in Mobile Smart Device Environments
Shin, Sooyeon ; Kwon, Taekyoung ;
Journal of the Korea Institute of Information Security and Cryptology, volume 22, issue 6, 2012, Pages 1243~1252
Due to the widespread use of smart devices, threats of direct observation attacks such as shoulder surfing and recording attacks, by which user secrets can be stolen at user interfaces, are increasing greatly. Although formal security models are necessary to evaluate the possibility of and security against those attacks, such a model does not exist. In this paper, based on the previous work in which a HCI cognitive model was firstly utilized for analyzing security, we propose STM-GOMS model as an improvement of GOMS-based model with regard to memory limitations. We then apply STM-GOMS model for analyzing usability and security of a password entry scheme commonly used in smart devices and show the scheme is vulnerable to the shoulder-surfing attack. We finally conduct user experiments to show the results that support the validity of STM-GOMS modeling and analysis.
A Ternary Tree-based Authenticated Group Key Agreement For Dynamic Peer Group
Kim, Ho-Hee ; Kim, Soon-Ja ;
Journal of the Korea Institute of Information Security and Cryptology, volume 22, issue 6, 2012, Pages 1253~1263
As a result of the increased popularity of group oriented applications, the design of an efficient authenticated group key agreement protocol has received a lot of attention. Lee et al. proposed a tree-based group key agreement protocol, which applies a ternary key tree structure and pairing-based cryptography to the key agreement of Dynamic Peer Group. In their protocol, only the group sponsor knows all member's session random keys computes all blinded keys. In addition, when the group sponsor leaves a group, all nodes of the tree should be changed. In this paper, we present the modified protocol that has several sponsors. Since a secret value for each member isn't given to the group sponsor, the key renewing of our protocol is more secure and efficient than that of Lee et al.'s protocol in the previous case. Therefore, our protocol is suitable to Dynamic Peer Groups.
Closest Vector Problem Based Interactive Proof
Lee, Kyunghee ; Nyang, DaeHun ;
Journal of the Korea Institute of Information Security and Cryptology, volume 22, issue 6, 2012, Pages 1265~1270
In this paper, we propose a new closest vector problem based interactive proof that is useful for authentication. Contribution of this paper is that the proposed protocol does not use a special form of a lattice, but a general lattice, which makes the protocol design very simple and easy to be proved. We prove its security in terms of completeness, soundness, simulatability.
Location-Based Authentication Mechanism for Server Access Control
Choi, Jung Min ; Cho, Kwantae ; Lee, Dong Hoon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 22, issue 6, 2012, Pages 1271~1282
Recently, security incidents occur continuously, resulting in the leakages of a large amount of the company's confidential and private information. For these reasons, the security technologies such as the authentication and the access control in order to prevent the information leakage are attracting attention. In particular, location-based authentication that utilizes the user's current location information which is used an authentication factor. And it provides more powerful authentication by controlling the users who attempt to access and blocks internal information leakage path. However, location information must be handled safely since it is the personal information. The location based authentication scheme proposed in this paper enhances the stability of the process location information compared with existing relevant location-based authentication protocol. Also it strengthens the end-user authentication by using one-time password. In addition, the proposed scheme provides authentication to prevent information leakage and employs the concept of the user's physical access control. Resultingly, the proposed scheme can provide higher security than the previous studies, while guarantee to low communication cost.
Privacy Protection and Non-repudiation Mechanisms for Parcel Service
Choi, Min Seok ; Cho, Kwantae ; Lee, Dong Hoon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 22, issue 6, 2012, Pages 1283~1292
As delivery services market has grown the damage cases are also continuously increased. When using delivery services, Customers would not be compensated in any way. Perhaps worse, losing a cargo would create a great deal of trouble. Because the lack of evidence, they takes a lot of time to clarify who is responsible. To prevent these things, we must create, collect, maintain and confirm. In this paper, we introduce new delivery system with a trusted third party for non-repudiation services. Moreover, in damage case, we show that the proposed system is efficient and provide non-repudiation. Using sending and receiving codes, the proposed system identifies a responsible subject with quickness and clearness.
An OpenAPI based Security Framework for Privacy Protection in Social Network Service Environment
Yoon, Yongseok ; Kim, Kangseok ; Shon, Taeshik ;
Journal of the Korea Institute of Information Security and Cryptology, volume 22, issue 6, 2012, Pages 1293~1300
With the rapid evolution of mobile devices and the development of wireless networks, users of mobile social network service on smartphone have been increasing. Also the security of personal information as a result of real-time communication and information-sharing are becoming a serious social issue. In this paper, a framework that can be linked with a social network services platform is designed using OpenAPI. In addition, we propose an authentication and detection mechanism to enhance the level of personal information security. The authentication scheme is based on an user ID and password, while the detection scheme analyzes user-designated input patterns to verify in advance whether personal information protection guidelines are met, enhancing the level of personal information security in a social network service environment. The effectiveness and validity of this study were confirmed through performance evaluations at the end.
A case study on the performance of encrypted data
Hong, Jung Hwa ; Jeong, Ik Rae ;
Journal of the Korea Institute of Information Security and Cryptology, volume 22, issue 6, 2012, Pages 1301~1313
The importance of protecting personal information is increasing day by day due to invasion of privacy, and data encryption is the most effective way to eliminate it. However, current data encryption methods tend to having problems for applying in practical fields because of critical issues such as low performances and frequent changes of applications. In order to find proper solutions for data security, this paper reviews data encryption technologies and experiments on performance of encrypted data in Oracle Database. On top of that, this paper analyses a data encryption technique not only efficiency of performance but also minimization of application changes.
A Method for Detection and Classification of Normal Server Activities and Attacks Composed of Similar Connection Patterns
Chang, Beom-Hwan ;
Journal of the Korea Institute of Information Security and Cryptology, volume 22, issue 6, 2012, Pages 1315~1324
Security visualization is a form of the data visualization techniques in the field of network security by using security-related events so that it is quickly and easily to understand network traffic flow and security situation. In particular, the security visualization that detects the abnormal situation of network visualizing connections between two endpoints is a novel approach to detect unknown attack patterns and to reduce monitoring overhead in packets monitoring technique. However, the session-based visualization doesn't notice a difference between normal traffic and attacks that they are composed of similar connection pattern. Therefore, in this paper, we propose an efficient session-based visualization method for analyzing and detecting between normal server activities and attacks by using the IP address splitting and port attributes analysis. The proposed method can actually be used to detect and analyze the network security with the existing security tools because there is no dependence on other security monitoring methods. And also, it is helpful for network administrator to rapidly analyze the security status of managed network.
Research on the Classification Model of Similarity Malware using Fuzzy Hash
Park, Changwook ; Chung, Hyunji ; Seo, Kwangseok ; Lee, Sangjin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 22, issue 6, 2012, Pages 1325~1336
In the past about 10 different kinds of malicious code were found in one day on the average. However, the number of malicious codes that are found has rapidly increased reachingover 55,000 during the last 10 year. A large number of malicious codes, however, are not new kinds of malicious codes but most of them are new variants of the existing malicious codes as same functions are newly added into the existing malicious codes, or the existing malicious codes are modified to evade anti-virus detection. To deal with a lot of malicious codes including new malicious codes and variants of the existing malicious codes, we need to compare the malicious codes in the past and the similarity and classify the new malicious codes and the variants of the existing malicious codes. A former calculation method of the similarity on the existing malicious codes compare external factors of IPs, URLs, API, Strings, etc or source code levels. The former calculation method of the similarity takes time due to the number of malicious codes and comparable factors on the increase, and it leads to employing fuzzy hashing to reduce the amount of calculation. The existing fuzzy hashing, however, has some limitations, and it causes come problems to the former calculation of the similarity. Therefore, this research paper has suggested a new comparison method for malicious codes to improve performance of the calculation of the similarity using fuzzy hashing and also a classification method employing the new comparison method.
Research on Secure Card-Payment System of Social Commerce
Heo, Wonseok ; Lee, Sangjin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 22, issue 6, 2012, Pages 1337~1344
This paper analyzed electronic transaction systems of social commerce service which have rapidly grown recent days, and as a result found that most of the electronic transaction systems of social commerce service had payment amount modification issue. This paper proposes a method for solving the payment amount modification issue. The proposed method adds an authentication process between servers of social commerce service provider and payment-gateway company. The added authentication process prohibits user getting involved in payment procedure, and thus prevents payment amount modification.
Vulnerability Analysis Method of Software-based Secure USB
Kim, Minho ; Hwang, Hyunuk ; Kim, Kibom ; Chang, Taejoo ; Kim, Minsu ; Noh, Bongnam ;
Journal of the Korea Institute of Information Security and Cryptology, volume 22, issue 6, 2012, Pages 1345~1354
The modern society with the wide spread USB memory, witnesses the acceleration in the development of USB products that applied secure technology. Secure USB is protecting the data using the method as device-based access control, encryption of stored files, and etc. In terms of forensic analyst, to access the data is a lot of troubles. In this paper, we studied software-based data en/decryption technology and proposed for analysis mechanism to validation vulnerability that secured on removable storage media. We performed a vulnerability analysis for USB storage device that applied security mechanism. As a result, we found vulnerabilities that extracts a source file without a password.
A Study on ACAS for Enhanced Security in Cloud Virtualization Internal Environment
Park, Tae-Sung ; Choi, Do-Hyeon ; Do, Kyoung-Hwa ; Jun, Moon-Seog ;
Journal of the Korea Institute of Information Security and Cryptology, volume 22, issue 6, 2012, Pages 1355~1362
As the utilization of cloud computing service rapidly increases to meet demands for various forms of service recently, the virtualization technology has made a rapid rise, further leading to some issues related to security, such as safety and reliability. As a system to provide environments what multiple virtual operating systems can be loaded, hypervisors may be a target of various attacks, such as control loss and authority seizure, since all the agents fcan be damaged by a malicious access to the virtualization layer. Therefore, this paper was conducted to investigate the access control for agents and suggest a plan to control malicious accesses to the cloud virtualization internal environment. The suggested technique was verified not to have effect on the performance of the system and environment through an analysis of its performance.
Forensic Investigation Procedure for Real-time Synchronization Service
Lee, Jeehee ; Jung, Hyunji ; Lee, Sangjin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 22, issue 6, 2012, Pages 1363~1374
The number and use of Internet connected devices has dramatically increased in the last several years. Therefore many services synchronizing data in real-time is increasing such as mail, calendar and storage service. This service provides convenience to users. However, after devices are seized, the data could be changed because of characteristic about real-time synchronization. Therefore digital investigation could be difficult by this service. This work investigates the traces on each local device and proposes a method for the preservation of real-time synchronized data. Based on these, we propose the procedures of real-time synchronization data.
Evaluation Criteria for Korean Smart Grid based on K-ISMS
Kim, Kichul ; Kim, Seungjoo ;
Journal of the Korea Institute of Information Security and Cryptology, volume 22, issue 6, 2012, Pages 1375~1391
Smart grid is a next-generation intelligent power grid that applying ICT to power grid to maximize the energy efficiency ratio. Recently, technologies and standards for smart grid are being developed around the world. Information security which is an essential part of smart grid development has to be managed continuously. Information security management system certification for organizational risk management has been implemented in Korea. Although preparation for information security management system certification which is applicable to smart grid is considered, there are no specific methods. This paper is to propose core and added evaluation criteria for Korean smart grid based on K-ISMS through comparative analysis between ISMS operated in Korea and smart grid information security management system developed in the United States. Added evaluation criteria enable smart grid related business that certified existing ISMS to minimize redundant and unnecessary certification assessment work.
A Feasibility Study on Introduction of Information Security Disclosure
Jun, Hyo-Jung ; Kim, Tae-Sung ;
Journal of the Korea Institute of Information Security and Cryptology, volume 22, issue 6, 2012, Pages 1393~1405
This study intends to help establishing guidelines on providing easier access to security status-related information about business and public institutions by interested parties such as investors and civic societies, and to push ahead with the compulsory execution of the information security disclosure. We suggest a draft for the information disclosure system by reviewing the existing disclosure systems and validate the draft by surveying experts. It is expected that the result of this study will be the basis for the adoption of the information security disclosure system and be used as a referential material in the establishment of the relevant policy.
Quantitative Scoring Criteria on the Importance of Software Weaknesses
Ahn, Joonseon ; Bang, Ji-Ho ; Lee, Eunyoung ;
Journal of the Korea Institute of Information Security and Cryptology, volume 22, issue 6, 2012, Pages 1407~1417
In order to protect a software system from security attacks, it is important to remove the software security weaknesses through the entire life cycle of software development. To remove the software weaknesses more effectively, software weaknesses are prioritized and sorted continuously. In this paper, we introduce the existing scoring systems for software weakness and software vulnerability, and propose a new quantitative standard for the scoring system, which helps evaluate the importance of software weakness objectively. We also demonstrate the practicability of the proposed standard by scoring 2011 CWE/SANS Top 25 list with the proposed standard and comparing it to the original score of MITRE.
Jang, Wonchang ; Shin, Ilsoon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 22, issue 6, 2012, Pages 1419~1427