Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information Security and Cryptology
Journal Basic Information
Journal DOI :
Korea Institutes of Information Security and Cryptology
Editor in Chief :
Volume & Issues
Volume 25, Issue 6 - Dec 2015
Volume 25, Issue 5 - Oct 2015
Volume 25, Issue 4 - Aug 2015
Volume 25, Issue 3 - Jun 2015
Volume 25, Issue 2 - Apr 2015
Volume 25, Issue 1 - Feb 2015
Selecting the target year
The De-identification Technique Using Data Grouping in Relational Database
Park, Jun-Bum ; Jin, Seung-Hun ; Choi, Daeseon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 3, 2015, Pages 493~500
DOI : 10.13089/JKIISC.2015.25.3.493
Personal information exposed in the Internet is increasing by the public data opening and sharing, vitalization of SNS(Social Network Service) and growth of information shared between users. Exposed personal information in the Internet can infringe upon targeted users using linkage attack or background attack. To prevent these attack De-identification models were appeared a few years ago. The 'k-anonymity' has been introduced in the first place, and the '
-diversity' and 't-closeness' have been followed up as solutions, and diverse algorithms have been being suggested for performance improvement nowadays. However, industry or public sectors actually needs a whole solution as a system for the de-identification process rather than performance of the de-identification algorithm. This paper explains a way of de-identification techique for 'k-anonymity', '
-diversity', and 't-closeness' algorithm using QI(Quasi-Identifier) grouping method in the relational database.
A Multi-Channel Security Card based on Cryptographically Secure Pseudo-Random Number Generator
Seo, Hwa-jeong ; Seok, Seon-hee ; Kim, Kyoung-hoon ; Kim, Ho-won ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 3, 2015, Pages 501~507
DOI : 10.13089/JKIISC.2015.25.3.501
The online banking service handles a banking business over the internet, it is necessary to ensure that all financial transactions are processed securely. So, there are various authentication technique for e-banking service : a certificate, a personal identification number(PIN), a security card and a one-time password(OTP). Especially, the security card is most important means including secret information. If the secret information of card is leaked, it means not only loss of security but also easy to attack because security card is a difficult method to get. In this paper, we propose that a multi-channel security card saves an secret information in distributed channel. Proposed multi-channel security card reduces vulnerability of the exposed and has a function to prevent phishing attacks through decreasing the amount of information displayed and generating secret number randomly.
An Improved Side Channel Power Analysis with OP-Amp
Kim, JinBae ; Ji, JaeDeok ; Cho, Jong-Won ; Kim, MinKu ; Han, Dong-Guk ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 3, 2015, Pages 509~517
DOI : 10.13089/JKIISC.2015.25.3.509
Side Channel Analysis of applying the power-consumption was known as effective method to analyze the key of security device based on chip. The precedential information of power-consumption was measured by the voltage distribution method using by series connection of resistor. This method was dependent on the strength of the voltage. If the voltage cannot be acquired much information which is involved with the key, the information of power-consumption significantly might be influenced by noise. If so, some of the information of power-consumption might be lost and distorted. Then, this loss can reduce the performance of the analysis. For the first time, this paper will be introduced the better way of the improvement with using the method of Current to Voltage Converter with OP-Amp. The suggested method can reduce the effect of the noise which is included in the side channel information. Therefore we can verify the result of our experiments which is provided with the improvement of the performance of side channel analysis.
Secure Transaction Method on Smartphones with Smartwatches
Zhou, Jun ; Choi, JinChun ; Nyang, DaeHun ; Lee, KyungHee ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 3, 2015, Pages 519~530
DOI : 10.13089/JKIISC.2015.25.3.519
With the development of technologies, smartphone provides excellent extensibility and performance. Users can install application programs easily in smartphone, so they can use smartphone in various way. In the past, users used smartphone for enhancing security in personal computer. Nowadays, smartphone has become a major target for attackers. Therefore we needs a reliable portable device for smartphone security. There are various wearable devices such as smartglasses and smartwatches, so they can be used for enhancing security in smartphone. In this paper, we study about that smartwatches can be role for enhancing smartphone security, and we implement transaction information verification scheme, Transaction information verification scheme based on CAPTCHA and CAPTCHA based transaction OTP scheme and experiment with users in prototype application.
Certificateless Non-Interactive Key Exchange Protocol with Forward Secrecy
Lee, Young Kyung ; Eom, Ji Eun ; Seo, Seung-Hyun ; Lee, Dong Hoon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 3, 2015, Pages 531~546
DOI : 10.13089/JKIISC.2015.25.3.531
A non-interactive key exchange protocol provides an efficiency of overall system by eliminating additional communication. However, traditional non-interactive key exchange protocols without updating a private key fail to provide forward secrecy, since there is no usage of ephemeral key for randomness of session key. In 2012, Sang et al. proposed a certificateless non-interactive key exchange(CL-NIKE) protocol, but they do not prove the security of the protocol and it does not provide forward secrecy. In this paper, we propose a new CL-NIKE protocol and it's security model. Then we prove the proposed protocol is secure under the security model based on DBDH(Decision Bilinear Diffie-Hellman) assumption. Moreover, we propose a CL-NIKE protocol with forward secrecy which updates user's private key by using multilinear map and prove it's security.
Provable Security of PRF-based Key Derivation Functions according to Input Types of Counters
Kim, Nayoung ; Kang, Ju-Sung ; Yeom, Yongjin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 3, 2015, Pages 547~557
DOI : 10.13089/JKIISC.2015.25.3.547
The security of all cryptographic algorithms and protocols is based on the confidentiality of secret keys. Key management mechanism is an indispensable part of the cryptographic system and this deals with the generation, exchange, storage, use, and replacement of keys. Within the key management mechanism there are key derivation functions (KDFs) which derive one or more keys from a master key. NIST specifies three families of PRF-based KDFs in SP 800-108. In this paper, we examine the difference of security models between the KDFs and the encryption modes of operations. Moreover we focus on the provable security of PRF-based KDFs according to input types of counters, and show that the counter and feedback modes of KDFs using XOR of counters are insecure, while these modes using concatenation of counters are secure.
Countermeasures for BadUSB Vulnerability
Choi, Jun ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 3, 2015, Pages 559~565
DOI : 10.13089/JKIISC.2015.25.3.559
To defend against information leakage or malware inflow by USB memory, security technologies such as copy protection and device control have being researched and developed. However, countermeasure are insufficient despite being recognized as a fatal security-hole for BadUSB presented at the Black Hat Security Conference 2014. To solve this problem, the countermeasures for BadUSB vulnerability are proposed.
A generating method of CM parameters of pairing-friendly abelian surfaces using Brezing-Weng family
Yoon, Kisoon ; Park, Young-Ho ; Chang, Nam Su ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 3, 2015, Pages 567~571
DOI : 10.13089/JKIISC.2015.25.3.567
Brezing and Weng proposed a method to generate CM parameters of pairing-friendly elliptic curves using polynomial representations of a number field, and Freeman generalized the method for the case of abelian varieties. In this paper we derive explicit formulae to find a family of polynomials used in Brezing-Weng method especially in the case of abelian surfaces, and present some examples generated by the proposed method.
Method of estimating the deleted time of applications using Amcache.hve
Kim, Moon-Ho ; Lee, Sang-jin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 3, 2015, Pages 573~583
DOI : 10.13089/JKIISC.2015.25.3.573
Amcache.hve file is a registry hive file regarding Program Compatibility Assistant, which stores the executed information of applications. With Amcache.hve file, We can know execution path, first executed time as well as deleted time. Since it checks both the first install time and deleted time, Amcache.hve file can be used to draw up the overall timeline of applications when used with the Prefetch files and Iconcache.db files. Amcache.hve file is also an important artifact to record the traces of anti-forensic programs, portable programs and external storage devices. This paper illustrates the features of Amcache.hve file and methods for utilization in digital forensics such as estimation of deleted time of applications.
The Method for Data Acquisition on a Live NAS System
Seo, Hyeong-Min ; Kim, Dohyun ; Lee, Sang-Jin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 3, 2015, Pages 585~594
DOI : 10.13089/JKIISC.2015.25.3.585
As the storage market has been expanded due to growing data size, the research on various kinds of storages such as cloud, USB, and external HDD(Hard Disk Drive) has been conducted in digital forensic aspects. NAS(Network-Attached Storage) can store the data over one TB(Tera Byte) and it is well used for private storage as well as for enterprise, but there is almost no research on NAS. This paper selects three NAS products that has the highest market share in domestic and foreign market, and suggests the process and method for data acquisition in live NAS System.
A Study on Preprocessing Method for Effective Semantic-based Similarity Measures using Approximate Matching Algorithm
Kang, Hari ; Jeong, Doowon ; Lee, Sangjin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 3, 2015, Pages 595~602
DOI : 10.13089/JKIISC.2015.25.3.595
One of the challenges of the digital forensics is how to handle certain amounts of data efficiently. Although reliable and various approximate matching algorithms have been presented to quickly identify similarities between digital objects, its practical effectiveness to identify the semantic similarity is low because of frequent false positives. To solve this problem, we suggest adding a pre-processing of the approximate matching target dataset to increase matching accuracy while maintaining the reliability of the approximate matching algorithm. To verify the effectiveness, we experimented with two datasets of eml and hwp using sdhash in order to identify the semantic similarity.
A Study on the attack technique using android UI events
Yoon, Seok-Eon ; Kim, Min-Sung ; Lee, Sang-jin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 3, 2015, Pages 603~613
DOI : 10.13089/JKIISC.2015.25.3.603
Smart-phone Applications are consists of UI(User Interface). During using applications, UI events such as button click and scroll down are transmitted to Smart-phone system with many changes of UI. In these UI events, various information including user-input data are also involved. While Keylogging, which is a well-known user-input data acquisition technique, is needed a restrictive condition like rooting to obtain the user-input data in android environment, UI events have advantage which can be easily accessible to user-input data on user privileges. Although security solutions based keypad in several applications are applied, we demonstrate that these were exposed to vulnerability of application security and could be obtained user-input data using UI events regardless of presence of any security system. In this paper, we show the security threats related information disclosure using UI events and suggest the alternative countermeasures by showing the replay-attack example based scenarios.
A Study on Improvement of Effectiveness Using Anomaly Analysis rule modification in Electronic Finance Trading
Choi, Eui-soon ; Lee, Kyung-ho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 3, 2015, Pages 615~625
DOI : 10.13089/JKIISC.2015.25.3.615
This paper proposes new methods and examples for improving fraud detection rules based on banking customer's transaction behaviors focused on anomaly detection method. This study investigates real example that FDS(Fraud Detection System) regards fraudulent transaction as legitimate transaction and figures out fraudulent types and transaction patterns. To understanding the cases that FDS regard legitimate transaction as fraudulent transaction, it investigates all transactions that requied additional authentications or outbound call. We infered additional facts to refine detection rules in progress of outbound calling and applied to existing detection rules to improve. The main results of this study is the following: (a) Type I error is decreased (b) Type II errors are also decreased. The major contribution of this paper is the improvement of effectiveness in detecting fraudulent transaction using transaction behaviors and providing a continuous method that elevate fraud detection rules.
A study on the identity theft detection model in MMORPGs
Kim, Hana ; Kwak, Byung Il ; Kim, Huy Kang ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 3, 2015, Pages 627~637
DOI : 10.13089/JKIISC.2015.25.3.627
As game item trading becomes more popular with the rapid growth of online game market, the market for trading game items by cash has increased up to KRW 1.6 trillion. Thanks to this active market, it has been easy to turn these items and game money into real money. As a result, some malicious users have often attempted to steal other players' rare and valuable game items by using their account. Therefore, this study proposes a detection model through analysis on these account thieves' behavior in the Massive Multiuser Online Role Playing Game(MMORPG). In case of online game identity theft, the thieves engage in economic activities only with a goal of stealing game items and game money. In this pattern are found particular sequences such as item production, item sales and acquisition of game money. Based on this pattern, this study proposes a detection model. This detection model-based classification revealed 86 percent of accuracy. In addition, trading patterns when online game identity was stolen were analyzed in this study.
Risk Rating Process of Cyber Security Threats in NPP I&C
Lee, Woomyo ; Chung, Manhyun ; Min, Byung-Gil ; Seo, Jungtaek ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 3, 2015, Pages 639~648
DOI : 10.13089/JKIISC.2015.25.3.639
SInce 2000, Instrumentation and Control(I&C) systems of Nuclear Power Plant(NPP) based on analog technology began to be applied to the digital technology. NPPs under construction in the country with domestic APR1400 I&C system, most devices were digitalized. Cyber security of NPP I&C systems has emerged as an important issue because digital devices compared to the existing analog equipment are vulnerable to cyber attacks. In this paper, We proposed the risk rating process of cyber security threats in NPP I&C system and applied the proposed process to the Reactor Protection System(RPS) developed through Korea Nuclear Instrumentation & Control System(KINCS) project for evaluating the risk of cyber security threats.
The relationship between security incidents and value of companies : Case of listed companies in Korea
Hwang, Haesu ; Lee, Heesang ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 3, 2015, Pages 649~664
DOI : 10.13089/JKIISC.2015.25.3.649
Recently, the risk of security incidents has been increased due to change of IT environment and development of new hacking methods. Event study methodology that measures the effect of a specific security incident on the stock price is widely adopted to analyze the damage cost of security incidents on market value. However, analysis of company's temporary stock price change is limited to immediate practical implication, and reputation loss should be considered as a collateral damage caused by security incidents. We analyzed 52 security incidents of listed Korean companies in the last decade; by refining the criteria presented by Tobin's q, we quantitatively showed that the companies has significantly higher reputation loss due to security loss than the other companies. Our research findings can be used in order that the companies can efficiently allocate its resource and investment for information security.
Analysis on international financial biometric adoption cases and propose a scheme for korean financial telebiometrics
Shin, Yong-Nyuo ; Chun, Myung Geun ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 3, 2015, Pages 665~672
DOI : 10.13089/JKIISC.2015.25.3.665
In this paper, we analyze the international financial biometric adoption cases in smart phones and ATMs and propose a scheme for Korean financial telebiometrics. Regional privacy issues, financial services environment, according to the differences in the direction of government policy introducing biometric aspects were appearing differently. In Korea, due to changes in fin-tech vitalization and outstanding convenience mobile oriented service to the regulatory environment, the introduction of biometric technology is the point that is being actively discussed. In this paper, we propose a scheme for the Korean banking financial sector through the introduction of biometric technology adoption case analysis of each country. Thus, this paper is intended to help that the financial sector makes a precise decision when it is establishes a policy of biometric technology application for electronic financial services.
A Comparative Study on Reforming the Resident Registration Number
Kim, Seon-Ju ; Lee, Kyung-Ho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 3, 2015, Pages 673~689
DOI : 10.13089/JKIISC.2015.25.3.673
Resident Registration Number(RRN) has been used broadly by public institutions or civilian departments as a means of personal identification due to its effectiveness and convenience in managing the information. Recently, because of personal information leakage including resident registration number, the potential damage is increasing public anxiety. In this situation, there have been demands requiring systems that can end the link between the resident registration number and personal information. In order to solve the problem, multiple alternatives are under consideration. In this research, we will discuss limits, needs for change of the system, and the basic concepts or traits that new registration number require. Also, by comparing the alternatives being discussed, we will analyze personal information security level and the cost required for reorganizing the system to present alternative that has high effectiveness.
A Study on Personal Information Protection Management Assessment Method by DEA
Jeong, Myeong-soo ; Lee, Kyung-ho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 3, 2015, Pages 691~701
DOI : 10.13089/JKIISC.2015.25.3.691
Recently, with the growing number of services using personal information, government offices' tasks have become more dependent to personal information. Various policies and systems have been made and managed for the safe use of personal information in the circumstances that inevitably require the use of personal information, but the personal information privacy incidents and their scale are on a constant increase. Thus, Korea has been implementing personal information protection management system since 2008 to examine whether public organizations observe the personal information protection act and to how well they manage the personal information, and to improve what is insufficient in the process. However, despite high scores of the outcomes of the system, questions about the effectiveness of the outcomes and about the actual manage level are being raised. Thus, this study seeks to analyze public organizations' activities to protect personal information and the effectiveness of their foundation efforts for them by using the DEA model, and to propose a new model to enhance the effectiveness of the outcomes of personal information protection management system by reflecting them into the outcomes of system, using the derived effectiveness.
A Study of Security Certification and Accreditation for DNP3 linkage section in EMS/SCADA
Kim, Jongwan ; Shon, Taeshik ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 3, 2015, Pages 703~713
DOI : 10.13089/JKIISC.2015.25.3.703
The linking system between the control system and the field devices in the existing EMS/SCADA, in order to increase the reliability of the data, and access control through the separation of external network. Currently, There is a tendency that the need for connection to an external network that takes into account the economic aspect, systematic management and efficiency of operations is increasing. Such is evolved linkage section, is to have more security vulnerabilities than in the past, Eventually communication EMS/SCADA linkage section requires special management method. In this paper, taking into account the domestic environment, were presented the security Certification and Accreditation technology that was applied to serial DNP3 and TCP/IP based DNP3 that are mainly used in EMS/SCADA linkage section. Presented to security of Certification and Accreditation technology, divided into Resource Robustness Test and Malicious Packet Test for evaluate the safety. Each of the security requirements and evaluation method in proposed technology, is an attempt to present the differentiation of the existing Certification and Accreditation technology.