Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information Security and Cryptology
Journal Basic Information
Journal DOI :
Korea Institutes of Information Security and Cryptology
Editor in Chief :
Volume & Issues
Volume 24, Issue 6 - Dec 2014
Volume 24, Issue 5 - Oct 2014
Volume 24, Issue 4 - Aug 2014
Volume 24, Issue 3 - Jun 2014
Volume 24, Issue 2 - Apr 2014
Volume 24, Issue 1 - Feb 2014
Selecting the target year
Practical Conjunctive Searchable Encryption Using Prime Table
Yang, Yu-Jin ; Kim, Sangjin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 5~14
DOI : 10.13089/JKIISC.2014.24.1.5
Searchable encryption systems provide search on encrypted data while preserving the privacy of the data and the search keywords used in queries. Recently, interest on data outsourcing has increased due to proliferation of cloud computing services. Many researches are on going to minimize the trust put on external servers and searchable encryption is one of them. However, most of previous searchable encryption schemes provide only a single keyword boolean search. Although, there have been proposals to provide conjunctive keyword search, most of these works use a fixed field which limit their application. In this paper, we propose a field-free conjunctive keyword searchable encryption that also provides rank information of search results. Our system uses prime tables and greatest common divisor operation, making our system very efficient. Moreover, our system is practical and can be implemented very easily since it does not require sophisticated cryptographic module.
SEED and ARIA algorithm design methods using GEZEL
Kwon, TaeWoong ; Kim, Hyunmin ; Hong, Seokhie ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 15~29
DOI : 10.13089/JKIISC.2014.24.1.15
Increasing the smart instrument based social and economical activity, problems of electronic business's safety, reliability and user's privacy are be on the rise. so variety standard cryptography algorithms for information security have been developed in korea and How to efficiently implement them in a variety of environments is issued. ARIA and SEED, developed in Korea, are standard block cipher algorithm to encrypt the 128-bit plaintext, are each configured Feistel, SPN structure. In this paper, SEED and ARIA were implemented using the GEZEL language that can be used easily in the software designer because grammar is simple compared to other hardware description language. In particular, in this paper, will be described in detail the characteristics and design method using GEZEL as the first paper that implements 128bits ARIA and SEED and it showed the flexibility and efficiency of development using GEZEL. SEED designed GEZEL is occupied 69043 slice, is operating Maximum frequency 146.25Mhz and ARIA is occupied 7282 slice, is operating Maximum frequency 286.172Mhz. Also, Speed of SEED designed and implemented signal flow method is improved 296%.
The Secure Key Store to prevent leakage accident of a Private Key and a Certificate
Park, Young-Jin ; Kim, Seon-Jong ; Lee, Dong-Hoon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 31~40
DOI : 10.13089/JKIISC.2014.24.1.31
In Korea, the Public Key Infrastructure (PKI) has been introduced. For secure information transmission and identification, the electronic signature authorization system of a certificate-based is built, and then the service provide.The certificate is stored in location what users can easily access and copy. Thus, there is a risk that can be stolen by malware or web account hacking. In addition, private key passwords can be exposed by the logging tool, after keyboard security features are disabled. Each of these security weaknesses is a potential conduit for identity theft, property/asset theft, and theft of the actual certificates. The present study proposes a method to prevent the private key file access illegally. When a certificate is stored, the private key is encrypted by the dependent element of the device, and it is stored securely. If private key leakage occurs, the retrieved key could not be used on other devices.
Fault Detection Architecture of the Field Multiplication Using Gaussian Normal Bases in GF(2
Kim, Chang Han ; Chang, Nam Su ; Park, Young Ho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 41~50
DOI : 10.13089/JKIISC.2014.24.1.41
In this paper, we proposed an error detection in Gaussian normal basis multiplier over
. It is shown that by using parity prediction, error detection can be very simply constructed in hardware. The hardware overheads are only one AND gate, n+1 XOR gates, and one 1-bit register in serial multipliers, and so n AND gates, 2n-1 XOR gates in parallel multipliers. This method are detect in odd number of bit fault in C = AB.
A Segmented Leap-Ahead LFSR Pseudo-Random Number Generator
Park, Young-Kyu ; Kim, Sang-Choon ; Lee, Je-Hoon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 51~58
DOI : 10.13089/JKIISC.2014.24.1.51
A LFSR is commonly used for various stream cryptography applications to generate random numbers. A Leap-ahead LFSR was presented to generate a multi-bits random number per cycle. It only requires a single LFSR and it has an advantages in hardware complexity. However, it suffers from the significant reduction of maximum period of the generated random numbers. This paper presents the new segmented Leap-ahead LFSR to solve this problem. It consists of two segmented LFSRs. We prove the efficiency of the proposed segmented architecture using the precise mathematical analysis. We also demonstrate the proposed comparison results with other counterparts using Xinilx Vertex5 FPGA. The proposed architecture can increase 2.5 times of the maximum period of generated random numbers compared to the typical Leap-ahead architecture.
Relationship-based Dynamic Access Control Model with Choosable Encryption for Social Network Service
Kwon, Keun ; Jung, Youngman ; Jung, Jaewook ; Choi, Younsung ; Jeon, Woongryul ; Won, Dongho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 59~74
DOI : 10.13089/JKIISC.2014.24.1.59
The social network service is a online service letting users express the personality and enhancing the human network. However, these features result in side effects which diffuse personal information and make users access to treacherous information. Therefore, various access control models have been proposed. However, the access control mechanisms which encrypt data are only able to be applied for controlling access from direct node, and the access control mechanisms without data encryption allow service provider to access all the information. Moreover, both mechanisms do not consider dynamic changes in reliability of the users. In this paper, we propose relationship-based dynamic access control model including encryption of sensitive data, which consider the characteristics of SNS and improves the security of SNS.
Building More Secure Femtocell with Improved Proxy Signature
Choi, Hyoung-Kee ; Han, Chan-Kyu ; Kim, Seung-Ryong ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 75~86
DOI : 10.13089/JKIISC.2014.24.1.75
Demand for the femtocell is largely credited to the surge in a more always best connected communication conscious public. 3GPP defines new architecture and security requirement for Release 9 to deal with femtocell, Home eNode B referred as HeNB. In this paper, we analyze the HeNB security with respect to mutual authentication, access control, and secure key agreement. Our analysis pointed out that a number of security vulnerabilities have still not been addressed and solved by 3GPP technical specification. These include eavesdropping, man-in-the-middle attack, compromising subscriber access list, and masquerading as valid HeNB. To the best of our knowledge, any related research studying HeNB security was not published before. Towards this end, this paper proposes an improved authentication and key agreement mechanism for HeNB which adopts proxy-signature and proxy-signed proxy-signature. Through our elaborate analysis, we conclude that the proposed not only prevents the various security threats but also accomplishes minimum distance from use-tolerable authentication delay.
Detecting Rogue AP using k-SVM method
Lee, Jae-Wook ; Lee, Si-Young ; Moon, Jong-Sub ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 87~95
DOI : 10.13089/JKIISC.2014.24.1.87
Under only authorized AP is allowable environment, rogue AP which is generated by a smartphone tethering can be a serious security breach. To solve rogue AP problem, this paper proposes classifying algorithm of Kernel Support Vector Machine using features of RTT data. Through our experiment, we can detect rogue AP from LTE mobile network.
Technical and Managerial Requirements for Privacy Protection Using Face Detection and Recognition in CCTV Systems
Shin, Yong-Nyuo ; Chun, Myung Geun ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 97~106
DOI : 10.13089/JKIISC.2014.24.1.97
CCTV(Closed Circuit television) is one of the widely used physical security technologies and video acquisition device installed at specific point with various purposes. Recently, as the CCTV capabilities improve, facial recognition from the information collected from CCTV video is under development. However, in case these technologies are exploited, concerns on major privacy infringement are high. Especially, a computer connected to a particular space images taken by the camera in real time over the Internet has emerged to show information services. In the privacy law, safety measures which is related with biometric template are notified. Accordingly, in this paper, for the protection of privacy video information in the video surveillance system, the technical and managerial requirements for video information security are suggested.
A Study on Unknown Malware Detection using Digital Forensic Techniques
Lee, Jaeho ; Lee, Sangjin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 107~122
DOI : 10.13089/JKIISC.2014.24.1.107
The DDoS attacks and the APT attacks occurred by the zombie computers simultaneously attack target systems at a fixed time, caused social confusion. These attacks require many zombie computers running attacker's commands, and unknown malware that can bypass detecion of the anti-virus products is being executed in those computers. A that time, many methods have been proposed for the detection of unknown malware against the anti-virus products that are detected using the signature. This paper proposes a method of unknown malware detection using digital forensic techniques and describes the results of experiments carried out on various samples of malware and normal files.
Digital Forensic Investigation of MongoDB
Yoon, Jong-Seong ; Jung, Doo-Won ; Kang, Chul-Hoon ; Lee, Sang-Jin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 123~134
DOI : 10.13089/JKIISC.2014.24.1.123
As the data gets bigger recently, the demand for relational database management system (RDBMS) and NoSQL DBMS to process big data has been increased consistently. The digital forensic investigation method for RDBMS has been studied actively, but that for NoSQL DBMS, which is popularly used nowadays, has almost no research. This paper proposes the digital forensic investigation process and method for MongoDB, the most popularly used among NoSQL DBMS.
The analysis of Windows 7·8 IconCache.db and its application
Lee, Chan-Youn ; Lee, Sang-Jin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 135~144
DOI : 10.13089/JKIISC.2014.24.1.135
Since anti-forensics have been developed in order to avoid digital forensic investigation, the forensic methods for analyzing anti-forensic behaviors have been studied in various aspects. Among the factors for user activity analysis, "Iconcache.db" files, which have the icon information of applications, provides meaningful information for digital forensic investigation. This paper illustrates the features of IconCache.db files and suggests the countermeasures against anti-forensics utilizing them.
Andro-profiler: Anti-malware system based on behavior profiling of mobile malware
Yun, Jae-Sung ; Jang, Jae-Wook ; Kim, Huy Kang ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 145~154
DOI : 10.13089/JKIISC.2014.24.1.145
In this paper, we propose a novel anti-malware system based on behavior profiling, called Andro-profiler. Andro-profiler consists of mobile devices and a remote server, and is implemented in Droidbox. Our aim is to detect and classify malware using an automatic classifier based on behavior profiling. First, we propose the representative behavior profiling for each malware family represented by system calls coupled with Droidbox system logs. This is done by executing the malicious application on an emulator and extracting integrated system logs. By comparing the behavior profiling of malicious applications with representative behavior profiling for each malware family, we can detect and classify them into malware families. Andro-profiler shows over 99% of classification accuracy in classifying malware families.
A Study on Fake Data Filtering Method of CCN
Kim, DaeYoub ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 155~163
DOI : 10.13089/JKIISC.2014.24.1.155
To enhance network efficiency, content-centric networking (CCN) proposes that intermediated network nodes on a content-delivery path temporally cache transmitted contents. Then if an intermediated node receives a content request message (Interest) for previously cached content, the node directly transmits the cached content as a response message (Data) to requestors and finishes the transmission of the received Interest. Since Interest is performed by intermediated network nodes, it is possible to efficiently transmit contents and to effectively solve a network congestion problem caused around contents sources. For that, CCN utilizes both content store to temporarily cache content and pending Interest table (PIT) to record Interest incoming Face. However, it has mentioned the possibility of denial service attack using both the limitation of PIT resource and fake Interests. In this paper, we briefly describe the presented PIT flooding attack utilizing fake Interest. Then we introduce new attack possibility using fake Data and propose a countermeasure for the proposed attack. Also we evaluate the performance of our proposal.
A Hierarchical Authentication for Proxy Mobile IPv6 Networks
Kim, KyungJoon ; Baek, JaeJong ; Song, JooSeok ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 165~170
DOI : 10.13089/JKIISC.2014.24.1.165
In this paper, a hierarchical authentication protocol is proposed to minimize authentication delay in proxy mobile IPv6 networks. The authentication function of the AAA server is distributed to the LMAs and the MAGs. If the LMAs or the MAGs have authentication information of the MNs, they authenticate the MN on behalf of the AAA servers. Therefore, the authentication delay is reduced. The AAA server is vulnerable to denial-of-service attack. If the AAA server is down, MNs cannot access the proxy mobile IPv6 network until they are authenticated. The proposed scheme reduces the load on the AAA server by distributing the authentication function to the LMAs and the MAGs.
How to Combine Secure Software Development Lifecycle into Common Criteria
Park, Jinseok ; Kang, Heesoo ; Kim, Seungjoo ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 171~182
DOI : 10.13089/JKIISC.2014.24.1.171
Common Criteria is a scheme that minimize IT products's vulnerabilities in accordance with the evaluation assurance level. SSDLC(Secure Software Development Lifecycle) is a methodology that reduce the weakness that can be used to generate vulnerabilities of software development life cycle. However, Common Criteria does not consider certificated IT products's vulnerabilities after certificated it. So, it can make a problem the safety and reliability of IT products. In addition, the developer and the evaluator have the burden of duplicating evaluations of IT products that introduce into the government business due to satisfy both Common Criteria and SSDLC. Thus, we researched the relationship among the Common Criteria, the static code analysis tools, and the SSDLC. And then, we proposed how to combine SSDLC into Common Criteria.
Ko, Yumi ; Choi, Jaewon ; Kim, Beomsoo ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 183~193
DOI : 10.13089/JKIISC.2014.24.1.183
A Study on the Curriculum of Department of Information Security in Domestic Universities and Graduate Schools and Comparison with the Needs of Industry Knowledge
Kim, Min-Jeong ; Lee, Haeni ; Song, Shin-Jeong ; Yoo, Jinho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 195~205
DOI : 10.13089/JKIISC.2014.24.1.195
These days cyber attacks are increasing all over the world, and the national critical infrastructure and information network protection has become important. For this reason, the concentrated investment in information security and development of professional human resource are essential, but there is a shortage of information security workforce in Korea. Currently, departments of information security in domestic universities make efforts to develop human resource of information security and have a increasing interest in the curriculum design. So this paper investigates the curriculums of information security in domestic universities and graduate schools. And then, it compares with the needs of industry knowledge and skills by using SPSS. Through this analysis, we will get implications about curriculum design of Information security.
A study on the influence of information security in selecting smart-phone
Ahn, Jong-Chang ; Lee, Seung-Won ; Lee, Ook ; Cho, Sung-Phil ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 207~214
DOI : 10.13089/JKIISC.2014.24.1.207
Recently, smartphone spyware resembles various types of virus components in PCs and has trends getting more and more severe. Users do not perceive the risk factors severely even if smartphone security is very vulnerable in spite of the smartphone spyware growth. Thus, this study observes the influence of information security in selecting smartphone based on the personal inclinations and spyware perceptions. The main variables of study model are such as the degree of personal risk-accepting and the risk of smartphone spyware as independent variables and smartphone purchasing intention as a dependent variable. The model is tested using SPSS 21 packages on the effective 200 samples gathered through questionnaire survey on the present smartphone users. As a result, the two main hypotheses which are "the degree of personal risk-accepting will influence on the perceiving risk of smartphone spyware" and "the perceiving risk of smartphone spyware will influence on smartphone purchasing intention" were significant statistically. Therefore, we could find out information security's influence on the selecting smartphone.
Detection of invalidated sanity checks caused by undefined behaviors
Lee, JongHyup ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 215~219
DOI : 10.13089/JKIISC.2014.24.1.215
C programming language has undefined behaviors, which cause unintended execution of a program. When a programmer adds sanity checks without caring about undefined behaviors, compilers may misunderstand and invalidate the sanity checks. Thus, we propose an automated system to detect invalidated sanity checks by marking sanity checks in source code and checking the marks in binary code.
Second-Order G-equivariant Logic Gate for AND Gate and its Application to Secure AES Implementation
Baek, Yoo-Jin ; Choi, Doo-Ho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 221~227
DOI : 10.13089/JKIISC.2014.24.1.221
When implementing cryptographic algorithms in mobile devices like smart cards, the security against side-channel attacks should be considered. Side-channel attacks try to find critical information from the side-channel infromation obtained from the underlying cryptographic devices' execution. Especially, the power analysis attack uses the power consumption profile of the devices as the side-channel information. This paper proposes a new gate-level countermeasure against the power analysis attack and the glitch attack and suggests how to apply the measure to securely implement AES.
Implementing Side Channel Analysis Evaluation Boards of KLA-SCARF system
Choi, YongJe ; Choi, DooHo ; Ryou, JeaCheol ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 229~240
DOI : 10.13089/JKIISC.2014.24.1.229
With increasing demands for security evaluation of side-channel resistance for crypto algorithm implementations, many equipments are developed at various research institutes. Indeed, commercial products came out for the purpose of evaluation and certification tool of security products. However, various types of security products exclusive a smart card make it difficult to implement a security evaluation system for them. In this paper, we describe implementation and characteristic of the side-channel evaluation boards of the KLA-SCARF, which is the project to develop domestic side-channel evaluation system. This report would be helpful for following researchers who intend to develop side-channel evaluation boards for other security devices.
Guidelines for Safe and Reliable PUF Implementation
Lee, Donggeon ; Lee, Yeonchoel ; Kim, Kyunghoon ; Park, Jong-Gyu ; Choi, Yong-Je ; Kim, Howon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 241~259
DOI : 10.13089/JKIISC.2014.24.1.241
A PUF is a technology for distinguishing a device from other devices like biological information such as humans' iris or fingerprints. Over the past decade, many researchers studied various methods for implementing PUFs and utilizing them in identification, random number generation, key distribution and authentication. However, various attacks on the PUFs are the major reason to inhibiting the proliferation of PUF. For the reasons, various technologies are being studied to enhance safety of PUFs. In this paper, we will see several PUF implementations and various attacks on PUFs, and suggest guidelines for securely implementing PUFs. We expect our guidelines would be the foundation for implementing the secure and reliable PUFs.
A New Simple Power Analysis Attack on the m-ary Exponentiation Implementation
Ahn, Sung-Jun ; Choi, Doo-Ho ; Ha, Jae-Cheol ;
Journal of the Korea Institute of Information Security and Cryptology, volume 24, issue 1, 2014, Pages 261~269
DOI : 10.13089/JKIISC.2014.24.1.261
There are many researches on fast exponentiation algorithm which is used to implement a public key cryptosystem such as RSA. On the other hand, the malicious attacker has tried various side-channel attacks to extract the secret key. In these attacks, an attacker uses the power consumption or electromagnetic radiation of cryptographic devices which is measured during computation of exponentiation algorithm. In this paper, we propose a novel simple power analysis attack on m-ary exponentiation implementation. The core idea of our attack on m-ary exponentiation with pre-computation process is that an attacker controls the input message to identify the power consumption patterns which are related with secret key. Furthermore, we implement the m-ary exponentiation on evaluation board and apply our simple power analysis attack to it. As a result, we verify that the secret key can be revealed in experimental environment.