Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information Security and Cryptology
Journal Basic Information
Journal DOI :
Korea Institutes of Information Security and Cryptology
Editor in Chief :
Volume & Issues
Volume 9, Issue 4 - Dec 1999
Volume 9, Issue 3 - Sep 1999
Volume 9, Issue 2 - Jun 1999
Volume 9, Issue 1 - Mar 1999
Selecting the target year
On the non-linear combination of the Linear Fedback Shift Register
Journal of the Korea Institute of Information Security and Cryptology, volume 9, issue 2, 1999, Pages 3~12
We introduce feedback registers and definitions of complexity of a register or a sequence generated by it. In the view point of cryptography the linear complexity of an ultimately periodic sequence is important because large one gives an enemy infeasible jobs. We state some results about the linear complexity of sum and product of two LFSRs.
A KCDSA Magic Ink Sinature Secret Sharing Method
Journal of the Korea Institute of Information Security and Cryptology, volume 9, issue 2, 1999, Pages 13~24
Electronic cash is a digital signature issued by bank. If the concept of the distributed secret sharing and magic ink signature is introduced in the existing electronic cash system we can increase the security level and the availability of electronic cash system and trace the electronic cash itself and the owner of electronic cash which was issued anonymously to a user in case of illegal usage of electronic cash by users. If the trust is concentrated on one bank system. the problem of misuse of bank can be occurred. To solve this problem, the distributed secrete sharing scheme need to be introduced in electronic cash system. In this paper We propose a DSS(Digital Signature Standard) distributed magic ink signature scheme and a KCDSA(Korea Certificate-based Digital Signature Algorithm) distributed magic ink signature scheme using a verifiable secret sharing method. and we compare two methods with respect to the required computation amount for the generation of magic-ink signature.
The Development of a One-time Password Mechanism Improving on S/KEY
Journal of the Korea Institute of Information Security and Cryptology, volume 9, issue 2, 1999, Pages 25~36
In this paper we propose a one-time password mechanism that solves the problems of the S/KEY: the limitation of a usage and the need of storage for keys. because of using a cryptographic algorithm the proposed mechanism has no the limitation of a usage. Also because of producing the key for an authentication from a user's password it is easy to manage the authentication key and is possible to share the session key between a client and a server after the authentication process. In addition the proposed mechanism is easy to protect and manage the authentication information because of using a smart card and is adopted by the system that needs a noe-way authentication from a client to a server without the challenge of a server.
Implementation of a Credit Authentication System
Journal of the Korea Institute of Information Security and Cryptology, volume 9, issue 2, 1999, Pages 37~48
The Internet has been used as the academic researching purposes. Nowadays accordance with improving and being familiar with the World-Wide Web Many people are giving it a try to use the Internet as commerce markets. The noticeable example of internet-based use of the commerce is the Internet shopping mall. Using the WWW companies exhibit their products and users select the ones and take the payment for ones in the on-line Increasing the the Internet shopping mall there needs to be the countermeasure that companies and clients must verify each other. In this paper there are explained the development credit authentication system of the Internet shopping mall and the construction of the trusted environment clients can use Internet shopping mall. That is to develop the credit authentication system the credit-rating of Internet shopping mall can be sent securely and easily to clients and the information of credit-ranting cannot be eavesdropped.
A Design of Expandable IC Card Operating System
Journal of the Korea Institute of Information Security and Cryptology, volume 9, issue 2, 1999, Pages 49~60
Implementation and Analysis of the Montgomery Algorithm for the Fast RSA Crypto-System
An, Jun Eon ; Yu, Gi Yeong ;
Journal of the Korea Institute of Information Security and Cryptology, volume 9, issue 2, 1999, Pages 61~61
Public key cryptosystem carry out the modular exponentiation of large integer for security, and the modular exponentiation is presented by the serial of the modular multiplication. This thesis presents implementation method for improving performance of modular multiplication based on the Montgomery algorithm which is known as the fastest modular multiplication algorithm. These implementation method is implemented in integer system and in Galois Field(2m), and is compared and analyzed with multiplication, addition, reading and writing memory.
An efficient ID-based authentication scheme based on the rth -residuosity problem in wireless environment
Journal of the Korea Institute of Information Security and Cryptology, volume 9, issue 2, 1999, Pages 73~82
In an open network computing environment a host cannot to identity its users correctly to network services. In order to prevent this thing we present the design of a authentication scheme 솟 using the notion of rth -residuosity problem and discrete logarithm problem which is proposed by S. J. Park et al. The proposed scheme described here is efficient method for mutual authentication without leakage of users identity in mobile communication system that ensure user anonymity and untraceability.
A Study on the Secure Key Escrow System
Journal of the Korea Institute of Information Security and Cryptology, volume 9, issue 2, 1999, Pages 83~92
Cryptography techniques can prevent eavesdroppers from maliciously intercepting or modifying sensitive information. however misuses of encryption may cause other problems First if the encryption key is lost or damaged even an authorized access to the original data will be denied. Second criminals can prevent authorized law enforcement officers from examining the necessary information by using the strong encrypted data can provide solutions for the situations. In this paper we propose a new key escrow system based on the ElGamal cryptosystem. Our system provide time-bound eavesdropping under court authorized permission protect from trustee's cheating and prevent user's shadow public key generation.