Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information Security and Cryptology
Journal Basic Information
Journal DOI :
Korea Institutes of Information Security and Cryptology
Editor in Chief :
Volume & Issues
Volume 23, Issue 6 - Dec 2013
Volume 23, Issue 5 - Oct 2013
Volume 23, Issue 4 - Aug 2013
Volume 23, Issue 3 - Jun 2013
Volume 23, Issue 2 - Apr 2013
Volume 23, Issue 1 - Feb 2013
Selecting the target year
A Study on Security Improvement in Hadoop Distributed File System Based on Kerberos
Park, So Hyeon ; Jeong, Ik Rae ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 5, 2013, Pages 803~813
DOI : 10.13089/JKIISC.2013.23.5.803
As the developments of smart devices and social network services, the amount of data has been exploding. The world is facing Big data era. For these reasons, the Big data processing technology which is a new technology that can handle such data has attracted much attention. One of the most representative technologies is Hadoop. Hadoop Distributed File System(HDFS) designed to run on commercial Linux server is an open source framework and can store many terabytes of data. The initial version of Hadoop did not consider security because it only focused on efficient Big data processing. As the number of users rapidly increases, a lot of sensitive data including personal information were stored on HDFS. So Hadoop announced a new version that introduces Kerberos and token system in 2009. However, this system is vulnerable to the replay attack, impersonation attack and other attacks. In this paper, we analyze these vulnerabilities of HDFS security and propose a new protocol which complements these vulnerabilities and maintains the performance of Hadoop.
Recent Trends in Implementing Cryptography with Embedded Microprocessors
Seo, Hwa-Jeong ; Kim, Howon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 5, 2013, Pages 815~824
DOI : 10.13089/JKIISC.2013.23.5.815
Traditionally embedded microprocessors is considered as a device for low- and simple-computations because of its limited computing power and constrained resources. However high-end embedded devices have been developed and many applications are getting feasible in the embedded devices. To provide secure and robust service environments, security on embedded devices are in order. Recently many research results on embedded devices have been proposed. In this paper, we explore various cryptography implementation results on representative 8-, 16- and 32-bit embedded processors including AVR, MSP and ARM. This report would be helpful for following researchers who are interested in cryptography implementation techniques on resource constrained devices.
The Vulnerability Analysis of CA Arcot VPS
Lee, Sang-Ho ; Kim, Sung-Ho ; Nyang, Dea-Hun ; Lee, Kyung-Hee ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 5, 2013, Pages 825~830
DOI : 10.13089/JKIISC.2013.23.5.825
CA Arcot corporation in U.S.A has secure on-line financial trade solution and patent that verify whether transaction had change using virtual session. But, VPS(Virtual Private Session) has another vulnerability by way to construct CAPTCHA. We can't fully trust safety of VPS, Cause it could be attacked by using color information of CAPTCHA. In this paper, We suggest the method of attack VPS, and also point out the vulnerability of VPS though simulation.
Secure Authentication Protocol in Hadoop Distributed File System based on Hash Chain
Jeong, So Won ; Kim, Kee Sung ; Jeong, Ik Rae ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 5, 2013, Pages 831~847
DOI : 10.13089/JKIISC.2013.23.5.831
The various types of data are being created in large quantities resulting from the spread of social media and the mobile popularization. Many companies want to obtain valuable business information through the analysis of these large data. As a result, it is a trend to integrate the big data technologies into the company work. Especially, Hadoop is regarded as the most representative big data technology due to its terabytes of storage capacity, inexpensive construction cost, and fast data processing speed. However, the authentication token system of Hadoop Distributed File System(HDFS) for the user authentication is currently vulnerable to the replay attack and the datanode hacking attack. This can cause that the company secrets or the personal information of customers on HDFS are exposed. In this paper, we analyze the possible security threats to HDFS when tokens or datanodes are exposed to the attackers. Finally, we propose the secure authentication protocol in HDFS based on hash chain.
Efficient File System Level Encryption Mechanism Using HSM
Kang, Cheol-Oh ; Won, Jong-Jin ; Park, Sung-Jin ; Ryou, Jea-Cheol ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 5, 2013, Pages 849~858
DOI : 10.13089/JKIISC.2013.23.5.849
In today's mobile computing environment, there are many threats, such as device loss or theft, malware, to the sensitive information stored on end user device. To prevent disclosure of information, encryption and authentication method are properly adjusted to the device. In cryptographic file systems, CBC mode of operation has been commonly used. It requires an IV need not be secret, but must be unpredictable and protect integrity of the IV. In this paper, we propose file system-level encryption mechanism with HSM that satisfy the requirement of the IV and improve the performance. Moreover, Design and experimental results prove the efficiency of our proposed method.
Secure classical RSA Cryptosystem against Fault Injection Attack based on Fermat's Theorem
Seo, Gae Won ; Baek, Yoo Jin ; Kim, Sung Kyoung ; Kim, Tae Won ; Hong, Seokhie ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 5, 2013, Pages 859~865
DOI : 10.13089/JKIISC.2013.23.5.859
Esmbedded devices such as smart cards and electronic passports highly demand security of sensitive data. So, the secure implementation of the cryptographic system against various side-channel attacks are becoming more important. In particular, the fault injection attack is one of the threats to the cryptosystem and can destroy the whole system only with single pair of the plain and cipher texts. Therefore, the implementors must consider seriously the attack. Several techniques for preventing fault injection attacks were introduced to a variety of the cryptosystem, But the countermeasures are still inefficient to be applied to the classical RSA cryptosystem. This paper introduces an efficient countermeasure against the fault injection attack for the classical RSA cryptosystem, which is based on the famous Fermat's theorem. The proposed countermeasure has the advantage that it has less computational overhead, compared with the previous countermeasures.
The Analysis of Event-based Jitter Buffer Algorithm
Choi, Seung-Han ; Park, Jong-Min ; Seo, Chang-Ho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 5, 2013, Pages 867~871
DOI : 10.13089/JKIISC.2013.23.5.867
In this paper, a major factor in determining voice quality that corresponds to the jitter and jitter buffer algorithm for removing jitter will be described. We analyze various jitter buffer algorithms and suggest ways to improve performance of jitter buffer algorithm.
Security Threat Evaluation for Smartgrid Control System
Ko, Jongbin ; Lee, Seokjun ; Shon, Taeshik ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 5, 2013, Pages 873~883
DOI : 10.13089/JKIISC.2013.23.5.873
Security vulnerability quantification is the method that identify potential vulnerabilities by scoring vulnerabilities themselves and their countermeasures. However, due to the structural feature of smart grid system, it is difficult to apply existing security threat evaluation schemes. In this paper, we propose a network model to evaluate smartgrid security threat for AMI and derive attack scenarios. Additionally, we show that the result of security threat evaluation for proposed network model and attack scenario by applying MTTC scheme.
An Group-based Security Protocol for Machine Type Communications in LTE-Advanced
Choi, Dae-Sung ; Choi, Hyoung-Kee ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 5, 2013, Pages 885~896
DOI : 10.13089/JKIISC.2013.23.5.885
MTC(Machine Type Communications), providing a variety of services anytime and anywhere by connecting the cellular network to the machine and things without human intervention, is being considered as a major challenge of the next-generation communications. Currently, When a massive MTC devices simultaneously connect to the network, each MTC device needs an independent access authentication process. Because of this process, authentication signaling congestion and overload problems will cause in LTE-Advanced. In this paper, we propose a group-based authentication protocol and a key management protocol. For managing the MTC devices as group units, the proposed protocol elects a group leader and authentications only once with the core network. After the authentication is completed, a group leader manages the rest members and MME(Mobility Management Entity) by constructing a binary tree. Finally, the propose protocol analysis show that the proposed protocol not only can reduces the authentication signaling which generated in between the MTC devices and the core network but also can manages the MTC devices, efficiently.
A framework of management for preventing illegal distribution of pdf bookscan file
Lee, Kuk-Heon ; Chung, Hyun-Ji ; Ryu, Dae-Gull ; Lee, Sang-Jin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 5, 2013, Pages 897~907
DOI : 10.13089/JKIISC.2013.23.5.897
Since various smart devices are being developed, a growing number of people are reading eBooks instead of paper books. However, people started making eBooks on their own by scanning paper books because there are not enough eBooks provided from market. The term "Bookscan" was made with this reason. The number of bookscan company is increasing because the equipment is too expensive. However, the commercial activity of bookscan company is against copyright law. Also bookscan files are in danger of being illegally distributed on web, because bookscan companies are not protecting copyright. Publication market follows the same procedure with sound market which was collapsed due to copyright problem. Therefore, the technical methods should be prepared for law system against bookscan. The previous ICOP(Illegal Copyrights Obstruction Program) system has been applied to sound and movie files, but not applied to publication. This paper suggests the framework for bookscan file management based on practical mechanism.
Analysis of Naver CAPTCHA with Effective Segmentation
Nyang, Dae Hun ; Choi, Yong Heon ; Hong, Seok Jun ; Lee, Kyunghee ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 5, 2013, Pages 909~917
DOI : 10.13089/JKIISC.2013.23.5.909
CAPTCHA is an automated test to tell apart computers from human mainly for web services, and it has been evolved since the most naive form in which users are requested to input simple strings has been introduced. Though many types of CAPTCHAs have been proposed, text-based CAPTCHAs have been widely prevailed for user convenience. In this paper, we introduce new segmentation schemes and show an attack method to break the CAPTCHA of Naver that occupies more than 70% of the market share in search engine. The experimental results show that 938 trials out of 1000 have successfully analyzed, which implies that we cannot use the CAPTCHA anymore.
The Sub Authentication Method For Driver Using Driving Patterns
Jeong, Jong-Myoung ; Kang, Hyung Chul ; Jo, Hyo Jin ; Yoon, Ji Won ; Lee, Dong Hoon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 5, 2013, Pages 919~929
DOI : 10.13089/JKIISC.2013.23.5.919
Recently, a variety of IT technologies are applied to the vehicle. However, some vehicle-IT technologies without security considerations may cause security problems. Specially, some researches about a smart key system applied to automobiles for authentication show that the system is insecure from replay attacks and modification attacks using a wireless signal of the smart key. Thus, in this paper, we propose an authentication method for the driver by using driving patterns. Nowadays, we can obtain driving patterns using the In-vehicle network data. In our authentication model, we make driving ppatterns of car owner using standard normal distribution and apply these patterns to driver authentication. To validate our model, we perform an k-fold cross validation test using In-vehicle network data and obtain the result(true positive rate 0.7/false positive rate is 0.35). Considering to our result, it turns out that our model is more secure than existing 'what you have' authentication models such as the smart key if the authentication result is sent to the car owner through mobile networks.
A kernel memory collecting method for efficent disk encryption key search
Kang, Youngbok ; Hwang, Hyunuk ; Kim, Kibom ; Lee, Kyoungho ; Kim, Minsu ; Noh, Bongnam ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 5, 2013, Pages 931~938
DOI : 10.13089/JKIISC.2013.23.5.931
It is hard to extract original data from encrypted data before getting the password in encrypted data with disk encryption software. This encryption key of disk encryption software can be extract by using physical memory analysis. Searching encryption key time in the physical memory increases with the size of memory because it is intended for whole memory. But physical memory data includes a lot of data that is unrelated to encryption keys like system kernel objects and file data. Therefore, it needs the method that extracts valid data for searching keys by analysis. We provide a method that collect only saved memory parts of disk encrypting keys in physical memory by analyzing Windows kernel virtual address space. We demonstrate superiority because the suggested method experimentally reduces more of the encryption key searching space than the existing method.
Anomaly Detection for IEC 61850 Substation Network
Lim, Yong-Hun ; Yoo, Hyunguk ; Shon, Taeshik ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 5, 2013, Pages 939~946
DOI : 10.13089/JKIISC.2013.23.5.939
This paper proposes normal behavior profiling methods for anomaly detection in IEC 61850 based substation network. Signature based security solutions, currently used primarily, are inadequate for APT attack using zero-day vulnerabilities. Recently, some researches about anomaly detection in control network are ongoing. However, there are no published result for IEC 61850 substation network. Our proposed methods includes 3-phase preprocessing for MMS/GOOSE packets and normal behavior profiling using one-class SVM algorithm. These approaches are beneficial to detect APT attacks on IEC 61850 substation network.
The method of recovery for deleted record in Oracle Database
Choi, Jong-Hyun ; Jeong, Doo Won ; Lee, Sangjin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 5, 2013, Pages 947~955
DOI : 10.13089/JKIISC.2013.23.5.947
Most of the enterprise information is stored in the database. Therefore, in order to investigate the company's criminal behavior, forensic analysis is important for the database and delete record is a need to develop recovery techniques. This paper is explained structure of the oracle database tablespace file and analyzed system tables that stored table information. Further, we suggests a method of recovery for deleted record in oracle tablespace.
A Study of Performance Improvement of Two Dimensional FEC Schemes For Data Security
Min, Sun-Ho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 5, 2013, Pages 957~962
DOI : 10.13089/JKIISC.2013.23.5.957
This paper proposes the new enhanced 2-D(2-Dimension) FEC scheme. It analyzes the probability of entire packet loss rate of the existing 2-D FEC by mathematical modeling, finds the problem of the existing 2-D FEC, and deduces the new enhanced 2-D FEC scheme that reduces the entire packet loss probability.
The Study of Performance Improvement of Dejitter Algorithm applying Time Series Model for VoicePlatform Security Data
Min, Sun-Ho ; Seo, Chang-Ho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 5, 2013, Pages 963~968
DOI : 10.13089/JKIISC.2013.23.5.963
In this paper, a major factor in determining voice quality that corresponds to the jitter and dejitter algorithm for removing jitter will be described. We analyze legacy dejitter algorithm and propose the study applying Time Series Model to improve performance of the dejitter algorithm.
A study on the security policy improvement using the big data
Kim, Song-Young ; Kim, Joseph ; Lim, Jong-In ; Lee, Kyung-Ho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 5, 2013, Pages 969~976
DOI : 10.13089/JKIISC.2013.23.5.969
The information protection systems of company are intended to detect all weak points, intrusion, document drain. All actions of people in company are recorded and can check persistently. On the other hand, what analyze security log generated by these systems becomes more difficult. Most staff who manages the security systems, and analyze log is more incomprehensible than a user or a person of drain for an information distribution process of the work-site operations and the management procedure of the critical information. Such a reality say the serious nature of the internal information leakage that can be brought up more. While the research on the big data proceeds actively recently, the successful cases are being announced in the various areas. This research is going to present the improved big data processing technology and case of the security field.
Personal Information Exposure on Social Network Service
Choi, Daeseon ; Kim, Seok Hyun ; Cho, Jin-Man ; Jin, Seung-Hun ; Cho, Hyun-Sook ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 5, 2013, Pages 977~983
DOI : 10.13089/JKIISC.2013.23.5.977
This paper presents result of researching personal information exposure of Korean twitter and facebook users. Personally identifiable information such as e-mail and phone numer is exposed in the accounts less than 1%. However there are many cases that a person is identified by non personally identifiable information. For example, 350 thousands accounts are distinguished with other accounts because its name is unique. Using combination of information such as name and high school, we can distinguish 2.97 millions accounts. We also found 170 thousands account pairs that are candidate of one users' own account. Linkability between two accounts in two different domains means that the person is identified. Currently, only personally identifiable information is protected by policy. This paper shows that the policy has limited effects under the circumstances that a person can be identified by non personally identifiable information and the account linking is possible.