DOI QR코드

DOI QR Code

해쉬 알고리듬 개발 및 디지털 이동통신을 위한 인증 시스템에의 응용

Development of Hash Algorithm and Its Application to the Authentication System for Digital Mobile Communication

  • 이국희 (경북대학교 전자전기공학부) ;
  • 이상곤 (동서대학교 전자기계공학부) ;
  • 정원영 (한국통신 가입자망 연구소) ;
  • 김태근 (한국통신 가입자망 연구소) ;
  • 문상재 (경북대학교 전자전기공학부)
  • 발행 : 1998.12.01

초록

이동통신에서의 사용자 인증 서비스는 통화도용 방지와 신뢰성 있는 과금을 위한 중요한 보호서비브이다. 본 논문에서는 해쉬 함수를 개발하고 이를 IS-95A 인증시스템의 인증 알고리듬과 인증 키생성 알고리듬을 적용하였다. 특히 인증 알고리듬을 활용하여 인증 키 생성알고리듬을 oracle 해쉬함수의 형태로 구현함으로써 인증 시스템의 높은 안전성과 간결성ㅇ르 동시에 성취하였다. 그리고 통계적분석 기법을 사용하여 개발된 알고리듬의 출력 특성을 분석한다.

키워드

참고문헌

  1. Information Processing-OSI Basic Reference Model - Part 2 : Security Architecture ISO/IEC 7498-2
  2. Interim Standard 95 Mobile-Base Station Compatibility Standard for Dual-Mode Wideband Spread spectrum Cellular System TIA/EIA IS-95A
  3. European Digital Cellular Telecommunication System (phase 2) - Security Related Network Functions ETSI
  4. Personal Communications Services PACS Air Interface Specification JTC
  5. Crypto '97 Toward realizing Random Oracles : Hash Functions that Hides All Partial Information Ran Canetti
  6. 1st ACM Comference on Computer and Communications Security Random oracles are practical : a paradigm for designing efficient protocols M. Bellare;J. Kilian;P. Rogaway
  7. Telecommunication Review v.6 no.2 디지털 이동통신 인증 서비스의 기술동향 이국희;류정수;하재철;문상재
  8. U.S.A. Patent No. 5153919 Service Provision Authentication Protocol J. A. Reeds Ⅲ;P. A. Treventi
  9. Contemporary Cryptology : The Science of Information Integrity C. J. Mitchell;K. Piper;P. Will;G. J. Simmons(ed.)
  10. Requests for Comments (RFC) 1321 The MD5 message digest algorithm R. Rivest
  11. FIPS PUB 180-1 Secure Hash Standard U.S. Department of Commerce(NIST)
  12. Fast Software Encryption, LNCS1039 RIPEMD-160 : A strengthened version of RIPEMD H. Dobbertin;A. Bosselaers;B. Preneel
  13. Auscrypt '92 Abstract HAVAL-A On-way Hashing Algorithm with Variable of Output Y. Zhang;J. Pieprzyk;J. Seberry
  14. Advances in Cryptology-Eurocrypt '93, LNCS 773 Collision for the compression function of MD5 B. den Boea;A. Bosselaers
  15. Journal of Cryptology RIPEMD with two-round compression function is not collision free H. Dobbertin
  16. Cryptography : Policy and Algorithm Keyed Hash Function S. Bakhtiary;R. Safavi-Naini;J. Pieprzky
  17. WCT '97 워트샵자료집 이동통신을 위한 인증 알고리듬 개발 이국희;정명준;이상곤;문상재;정원영;김태근
  18. Advances in Cryptology-Crypt '96, LNCS 1109 Fast hashing on the Pentium A. Bosselaers;R. Govaerts;J. Van-dewalls
  19. proceeding of Eurocrypt '97, LNCS 1233 SHA : a design for parallel architecture A. Bosselaers;R. Govaerts;J. Van-dewalls
  20. Introduction to Mathematical Statics (4th ed.) Paul G. Hoel
  21. Cryptography : Policy and Algorithms Randomness Measures Related to Subset Occurrence H. M. Gustafson;E. P. Dawson;J. Dj. Gli
  22. Tech. rep. 95-09 Cryptographic Hash Functions : A Survey S. Bakhtiari;R. Safavi-Naini;J. Pieprzyk
  23. in Series of Annual Workshop on Selected Areas in Cryptography (SAC '95) Practical and Secure Message Authentication S. Bakhtiari;R. Safavi-Naini;J. Pieprzyk
  24. workshop on Selected Areas in Cryptology 1998, Peproceedings Cryptanalysis of ORYX. D. Wagner;L. Simpson;E. Dawson;J. Kelsey;W. Millan;B. Shneier
  25. Advances in Cryptology-Crypto '97 Proceedings, LNCS 1294 Cryptanalysis of the Cellular Message Encryption Algorithm D. Wagner;B. Schneier;J. Kelsey
  26. in the 1st International Conference on Information Security and Cryptology, Proceedings Cryptanalysis of the Aleged CAVE Algorithm W. Millan
  27. New security algorithms : Call for development Telecommuniactions Industry Association
  28. Dual Mode Cellular System : Authentication, Message Encryption, Voice Privacy Mask Generation, Shared Secret Data generation, A-Key Verification, and Test Data TIA IS-54 Appendix A