Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information Security and Cryptology
Journal Basic Information
Journal DOI :
Korea Institutes of Information Security and Cryptology
Editor in Chief :
Volume & Issues
Volume 26, Issue 4 - Aug 2016
Volume 26, Issue 3 - Jun 2016
Volume 26, Issue 2 - Apr 2016
Volume 26, Issue 1 - Feb 2016
Selecting the target year
An Algorithm for Switching from Arithmetic to Boolean Masking with Low Memory
Kim, HanBit ; Kim, HeeSeok ; Kim, TaeWon ; Hong, SeokHie ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 5~15
DOI : 10.13089/JKIISC.2016.26.1.5
Power analysis attacks are techniques to analyze power signals to find out the secrets when cryptographic algorithm is performed. One of the most famous countermeasure against power analysis attacks is masking methods. Masking types are largely classified into two types which are boolean masking and arithmetic masking. For the cryptographic algorithm to be used with boolean and arithmetic masking at the same time, the converting algorithm can switch between boolean and arithmetic masking. In this paper we propose an algorithm for switching from boolean to arithmetic masking using storage size at less cost than ones. The proposed algorithm is configured to convert using the look-up table without the least significant bit(LSB), because of equal the bit of boolean and arithmetic masking. This makes it possible to design a converting algorithm compared to the previous algorithm at a lower cost without sacrificing performance. In addition, by applying the technique at the LEA it showed up to 26 percent performance improvement over existing techniques.
An Efficient Public Trace and Revoke Scheme Using Augmented Broadcast Encryption Scheme
Lee, MoonShik ; Lee, Juhee ; Hong, JeoungDae ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 17~30
DOI : 10.13089/JKIISC.2016.26.1.17
In this paper, we propose an efficient public key trace and revoke scheme. An trace and revoke scheme is a broadcast encryption scheme which has a tracing and revocation algorithm. It would maintain security of the scheme to revoke pirate keys which are colluded by malicious users. In addition, property of revocation can be applied to various circumstances because it can help cipher text delivered to certain users who are supposed to. In this paper, we would change the scheme[Augmented broadcast encryption scheme] based on the bilinear groups of the composite order into that of prime order and we can improve the size of public key, secret key, ciphertext considerably. Furthermore, we define property of revocation precisely, so we can obtain the result that the scheme with limited revocation can be expanded to have a full revocation. This paper can be easily applied to the organization such as government, military, which has a hierarchical structure.
Parallel Implementation of LSH Using SSE and AVX
Pack, Cheolhee ; Kim, Hyun-il ; Hong, Dowon ; Seo, Changho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 31~39
DOI : 10.13089/JKIISC.2016.26.1.31
Hash function is a cryptographic primitive which conduct authentication, signature and data integrity. Recently, Wang et al. found collision of standard hash function such as MD5, SHA-1. For that reason, National Security Research Institute in Korea suggests a secure structure and efficient hash function, LSH. LSH consists of three steps, initialization, compression, finalization and computes hash value using addition in modulo
, bit-wise substitution, word-wise substitution and bit-wise XOR. These operation is parallelizable because each step is independently conducted at the same time. In this paper, we analyse LSH structure and implement it over SIMD-SSE, AVX and demonstrate the superiority of LSH.
Design of Security Keypad Against Key Stroke Inference Attack
Seo, Hwajeong ; Kim, Howon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 41~47
DOI : 10.13089/JKIISC.2016.26.1.41
In Black hat USA 2014, a hacking method to infer the password entry of smartphone or smartpad with google glass in distance is presented. In this paper, we design the secure keypad to protect the key stroke inference attacks with google glass which has unique layout ensuring same input entry but different input value.
Probabilistic Analysis of AIS.31 Statistical Tests for TRNGs and Their Applications to Security Evaluations
Park, Hojoong ; Kang, Ju-Sung ; Yeom, Yongjin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 49~67
DOI : 10.13089/JKIISC.2016.26.1.49
SP 800-90B of NIST(USA) and AIS.31 of BSI(Germany) are representative statistical tests for TRNGs. In this paper, we concentrate on AIS.31 which is under the ongoing international standardization process. We examine the probabilistic meaning of each statistic of the test in AIS.31 and investigate its probability distribution. By changing significance level and the length of sample bits, we obtain formalized accept region of the test. Furthermore we propose the accept regions for some iterative tests, that are not mentioned in AIS.31, and provide some simulations.
Biometric Authentication Protocol Using Hidden Vector Key Encapsulation Mechanism
Seo, Minhye ; Hwang, Jung Yeon ; Kim, Soo-hyung ; Park, Jong Hwan ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 69~79
DOI : 10.13089/JKIISC.2016.26.1.69
Biometric authentication is considered as being an efficient authentication method, since a user is not required to possess or memorize any other information other than biometrics. However, since biometric information is sensitive and could be permanently unavailable in case of revealing that information just once, it is essential to preserve privacy of biometrics. In addition, since noise is inherent in the user of biometric recognition technologies, the biometric authentication needs to handle the noise. Recently, biometric authentication protocols using fuzzy extractor have been actively researched, but the fuzzy extractor-based authentication has a problem that a user should memorize an additional information, called helper data, to deal with their noisy biometric information. In this paper, we propose a novel biometric authentication protocol using Hidden Vector Key Encapsulation Mechanism(HV-KEM) which is one of functional encryption schemes. A primary advantage of our protocol is that a user does not need to possess or memorize any additional information. We propose security requirements of HV-KEM necessary for constructing biometric authentication protocols, and analyze our proposed protocol in terms of correctness, security, and efficiency.
Analysis of 27MHz Wireless Keyboard Electromagnetic Signal Using USRP and GNU Radio
Kim, Ho-Yeon ; Sim, Bo-Yeon ; Park, Ae-Sun ; Han, Dong-Guk ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 81~91
DOI : 10.13089/JKIISC.2016.26.1.81
Nowadays, electronic device is in a close relationship with human life. Above all, the use of wireless electronic devices such as smart phone, tablet pc, and wireless keyboard is increasing owing to the high convenience and portability. Furthermore, according to the increasing use of sensitive personal and financial information from the electronic device, various attacks for stealing information are being reported. In this paper we do an analysis of 27MHz wireless keyboard vulnerability and set up an analysis environment. Moreover, we make an experiment and show that there are real vulnerabilities. An experimental result will be used for safety analysis and vulnerability verification of wireless electronic devices.
A Study on Game Bot Detection Using Self-Similarity in MMORPGs
Lee, Eun-Jo ; Jo, Won-Jun ; Kim, Hyunchul ; Um, Hyemin ; Lee, Jina ; Kwon, Hyuk-min ; Kim, Huy-Kang ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 93~107
DOI : 10.13089/JKIISC.2016.26.1.93
Game bot playing is one of the main risks in Massively Multi-Online Role Playing Games(MMORPG) because it damages overall game playing environment, especially the balance of the in-game economy. There have been many studies to detect game bot. However, the previous detection models require continuous maintenance efforts to train and learn the game bots' patterns whenever the game contents change. In this work, we have proposed a machine learning technique using the self-similarity property that is an intrinsic attribute in game bots and automated maintenance system. We have tested our method and implemented a system to major three commercial games in South Korea. As a result, our proposed system can detect and classify game bots with high accuracy.
A Study on Geodata Trace of Navigation Application in Smart Devices
Yeon, KyuChul ; Kim, Moon-Ho ; Kim, Dohyun ; Lee, Sang-jin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 109~115
DOI : 10.13089/JKIISC.2016.26.1.109
Nowadays, smart devices are the target of the digital forensic investigation. Among various smart devices, we can obtain much information from smart phone which is provided with continuous power and used for data communication. This paper deals with the traces to be left in Android smart phones after using the navigation applications with the GPS function. We selected navigation applications(domestic and overseas) which have a high number of download times, anaylzed them and discussed the meaning of the analysis result in digital forensic investigation.
Research on Utilizing Emulab for Malware Analysis
Lee, Man-hee ; Seok, Woo-jin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 117~124
DOI : 10.13089/JKIISC.2016.26.1.117
Virtual environment is widely used for analyzing malware which is increasing very rapidly. However, knowing this trend, hackers are adopting virtual environment detection techniques for malware to kill itself or stop malicious behaviors when detecting virtual environments. Various research is going on in order to thwart any efforts to utilize anti-virtualization techniques, but until now several techniques can evade most of well known virtual environments, making malware analysis very difficult. Emulab developed by Utah University assigns real systems and networks as researchers want in realtime. This research seeks how to use Emulab for malware analysis.
The Method of Deleted Record Recovery for MySQL MyISAM Database
Noh, Woo-seon ; Jang, Sung-min ; Kang, Chul-hoon ; Lee, Kyung-min ; Lee, Sang-jin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 125~134
DOI : 10.13089/JKIISC.2016.26.1.125
MySQL database is currently used by many users and It has gained a big market share in the database market. Even though MyISAM storage engine was used as a default storage engine before, but records recovery method does not existed. Deleted records have a high possibility for important evidence and it is almost impossible to determine that investigators manually examine large amounts of database directly. This paper suggests the universal recovery method for deleted records and presents the experimental results.
Ensuring the Admissibility of Mobile Forensic Evidence in Digital Investigation
Eo, Soowoong ; Jo, Wooyeon ; Lee, Seokjun ; Shon, Taeshik ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 135~152
DOI : 10.13089/JKIISC.2016.26.1.135
Because of the evolution of mobile devices such as smartphone, the necessity of mobile forensics is increasing. In spite of this necessity, the mobile forensics does not fully reflect the characteristic of the mobile device. For this reason, this paper analyzes the legal, institutional, and technical considerations for figuring out facing problems of mobile forensics. Trough this analysis, this study discuss the limits of screening seizure on the mobile device. Also, analyzes and verify the mobile forensic data acquisition methods and tools for ensuring the admissibility of mobile forensic evidence in digital investigation.
An Analysis of a Structure and Implementation of Error-Detection Tool of Cryptography API-Next Generation(CNG) in Microsoft
Lee, Kyungroul ; You, Ilsun ; Yim, Kangbin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 153~168
DOI : 10.13089/JKIISC.2016.26.1.153
This paper introduces a structure, features and programming techniques for the CNG(Cryptography API: Next Generation), which is the substitution of the CAPI(Cryptography API) from Microsoft. The CNG allows to optimize a scope of functions and features because it is comprised of independent modules based on plug-in structure. Therefore, the CNG is competitive on development costs and agility to extend. In addition, the CNG supports various functions for the newest cryptographic algorithm, audit, kernel-mode programming with agility and possible to contribute for core cryptography services in a new environment. Therefore, based on these advantageous functions, we analyze the structure of CNG to extend it for the enterprise and the public office. In addition, we implement an error-detection tool for program which utilizes CNG library.
DroidSecure: A Technique to Mitigate Privilege Escalation in Android Application
Nguyen-Vu, Long ; Jung, Souhwan ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 169~176
DOI : 10.13089/JKIISC.2016.26.1.169
Android platform is designed to be user-friendly, yet sometimes its convenience introduces vulnerabilities that normal users cannot justify. In this paper, after making an overview of popular open source analysis tools for android applications, we point out the dangerous use of Permission Group in current Google Policy, and suggest a technique to mitigate the risks of privilege escalation that attackers are taking advantage of. By conducting the investigation of 21,064 malware samples, we conclude that the proposed technique is considered effective in detecting insecure application update, as well as giving users the heads-up in security awareness.
A Study on the Vulnerability of Security Keypads in Android Mobile Using Accessibility Features
Lee, Jung-Woong ; Kim, In-Seok ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 177~185
DOI : 10.13089/JKIISC.2016.26.1.177
As the fintech industry is growing at an incredible rate, mobile phones are positioned as the most important tool for financial transaction. However, with a rising number of malware applications, the types of attack and illegal access to mobile device are becoming more diverse and sophisticated. This paper studies the potential keylogger attack by exploiting the Accessibility Service in Android framework. This type of attack allows the malicious individual to use keylogger on the victim's Android mobile phone to steal passwords during mobile financial transaction regardless of security keypad setting. Lastly the paper proposes solutions to counter these types of attack by verifying the accessibility usage and amending the application guideline for accessibility.
A Scheme for Identifying Malicious Applications Based on API Characteristics
Cho, Taejoo ; Kim, Hyunki ; Lee, Junghwan ; Jung, Moongyu ; Yi, Jeong Hyun ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 187~196
DOI : 10.13089/JKIISC.2016.26.1.187
Android applications are inherently vulnerable to a repackaging attack such that malicious codes are easily inserted into an application and then resigned by the attacker. These days, it occurs often that such private or individual information is leaked. In principle, all Android applications are composed of user defined methods and APIs. As well as accessing to resources on platform, APIs play a role as a practical functional feature, and user defined methods play a role as a feature by using APIs. In this paper we propose a scheme to analyze sensitive APIs mostly used in malicious applications in terms of how malicious applications operate and which API they use. Based on the characteristics of target APIs, we accumulate the knowledge on such APIs using a machine learning scheme based on Naive Bayes algorithm. Resulting from the learned results, we are able to provide fine-grained numeric score on the degree of vulnerabilities of mobile applications. In doing so, we expect the proposed scheme will help mobile application developers identify the security level of applications in advance.
Visualized Malware Classification Based-on Convolutional Neural Network
Seok, Seonhee ; Kim, Howon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 197~208
DOI : 10.13089/JKIISC.2016.26.1.197
In this paper, we propose a method based on a convolutional neural network which is one of the deep neural network. So, we convert a malware code to malware image and train the convolutional neural network. In experiment with classify 9-families, the proposed method records a 96.2%, 98.7% of top-1, 2 error rate. And our model can classify 27 families with 82.9%, 89% of top-1,2 error rate.
Fintech Users' Information Privacy Concerns and User Resistance: Investigating the Interaction Effect with Regulatory Focus
Lee, Ae Ri ; Ahn, Hyo Young ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 209~226
DOI : 10.13089/JKIISC.2016.26.1.209
Recently, there is a growing interest in Fintech which is a business based on using IT to provide financial services. At the early stage of diffusion of Fintech, one of the issues raised is the concern for information security. This study examines actual users' information privacy concern and user resistance to Fintech services. We also investigates the effects of social influence and mobile Internet literacy on information privacy concern and user resistance. In particular, this research verifies the interaction effect between regulatory focus and information privacy concern to influence user resistance. Based on the findings, the results of this study provide strategic implications for firms which attempt to reduce user resistance to Fintech services and proliferate Fintech usage.
Perceptual Differences between Managers and Practitioners on Competencies of Information Security Consultants
Kim, Se-Yun ; Kim, Tae-Sung ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 227~235
DOI : 10.13089/JKIISC.2016.26.1.227
As various measures of law observance obligations such as mandatory obligation of privacy impact assessment (PIA) for public institutions and authorization of information security management system (ISMS) are put into practice, increase in demand for information security consulting and securement of information security consultants are emerging as a major issue. The purpose of this study is to empirically investigate what core competencies information security consultants should possess and how much they actually possess them. By analyzing the differences in perception between practitioners and managers on core competencies, this study understands difference of views between the two groups and suggests ideas for cultivation of information security consultants.
Strategic Decision Making Model Among Collective Intelligences Using The Game Theory in Cyber Attacks - Case study of KHNP Hacking -
Park, Sang-min ; Lee, Kyung-ho ; Lim, Jong-in ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 237~246
DOI : 10.13089/JKIISC.2016.26.1.237
Recently various types of cyber attacks have occurred. The strategic goals & tactical means of these have evolved. Especially KHNP cyber attack was the type of hacktivism combined hack and psychological warfare. The cyber attackers have forecd the nation to participate in the cyber warfare and the government to make strategic decisions to the releases of confidential information and the threats of stopping KHNP. In this paper, we would like to study the effective strategic decision-making model utilizing the game theory and including an attack intelligence on open policy Decision framework.
An Improved Model of Effectiveness on the Implementation of Personal Information Utilization Agreement in Financial Companies
Jang, Gi-hyun ; Lee, Kyung-ho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 247~257
DOI : 10.13089/JKIISC.2016.26.1.247
It is required to have Personal Information Agreement when a financial company uses personal information by the Law of Privacy. So, financial companies have to demand customers the submission of Personal Information Agreement. Thus, financial companies have made Personal Information Agreement in various formats for customers. However, financial companies are lack of a verification process, the cases of collecting invalid Agreement often occurred. This study focuses on the verification process of Personal Information Agreement and the contents of Personal Information Agreement. In conclusion, this study proposes an improved model that added to the process of verification for the concept of Agreement. Based on this study, I hope financial companies to reform their agreement process and to improve the effectiveness on the implementation of Personal Information Utilization Agreement.
A Decision-Making Model for Handling Personal Information Using Metadata
Kim, Yang-Ho ; Cho, In-Hyun ; Lee, Kyung-Ho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 259~273
DOI : 10.13089/JKIISC.2016.26.1.259
After realizing through the three large-scale data leakage incidents that intentional or accidental insider jobs are more serious than external intrusions, financial companies in Korea have been taking measures to prevent data leakage from occuring again. But, the IT system architecture reflecting the domestic financial environment is highly complicated and thereby difficult to grasp. It is obvious that despite administrative, physical, and technical controls, insider threats are likely to cause personal data leakage. In this paper, we present a process that based on metadata defines and manages personally identifiable attribute data, and that through inter-table integration identifies personal information broadly and controls access. This process is to decrease the likelihood of violating compliance outlined by the financial supervisory authority, and to reinforce internal controls. We derive and verify a decision-making model that reflects the proposed process.
A Study on the Stock Price Fluctuation of Information Security Companies in Personal Information Leakage
Kim, Min-Jeong ; Heo, Namgil ; Yoo, Jinho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 275~283
DOI : 10.13089/JKIISC.2016.26.1.275
Currently Internet and IT infrastructure of Korea has maintained the world's highest levels. But in another aspect, security incident, especially personal information breaches occur frequently. As personal information leakage happened, the companies will be negatively affected. And to prevent this, they have implemented to use a variety of security solutions from information security vendors. Therefore we set up hypotheses that the companies experienced personal information leakage as well as information security companies providing security solutions will be affected by the leakages. So this paper verify hypotheses about the impact of the value of information security companies, through analysing stock price fluctuation of the companies. We found that the stock price of information security companies has increased as personal information leakage happened. And differences according to leakage volumes and types of business are not statistically significant. But there are significant differences according to business classification of information security companies.
Study on Usable Security of Facebook
Kim, Chung-han ; Park, Min-su ; Kim, Seung-joo ;
Journal of the Korea Institute of Information Security and Cryptology, volume 26, issue 1, 2016, Pages 285~296
DOI : 10.13089/JKIISC.2016.26.1.285
Recently, as the widespread use of Facebook through a smartphone or tablet PC, it has increased the threat that contains the malicious code to post a social attacks and comments that use personal information that has been published of Facebook. To solve these problems, Facebook is, by providing a security function, but would like to address these threats, in setting the security function, the security function of the user's convenience is not considered a properly there is a problem that is not in use. Thus, in this paper, on the basis of the information obtained via the cogTool, on Facebook security features, the user experience by presenting a method that can be quantitatively measured by this, the user convenience It classifies about Facebook security features to decrease.