DOI QR코드

DOI QR Code

Key Exchange md Key Recovery System in Wireless Communications using Key Escrow

위탁 방식을 이용한 무선 통신 상의 키 분배 및 키 복구 시스템

  • 주미리 (국가보안기술연구소) ;
  • 원동호 (성균관대학교 정보통신공학부)
  • Published : 2002.10.01

Abstract

Wireless communications require the cryptography system which satisfies a opposite purpose as safety and efficiency. In this paper we proposed the efficient key distribution system satisfying in wireless communication using escrow in order to satisfy the requirements. We supplemented the key recovery function to prevent side effects of cryptography and it is possible to check verification. Also, transmitted information is a little so that the system is efficient. The proposed key recovery method can be applicable to various application fields.

무선 통신은 환경적인 특성 때문에 안전성과 효율성이라는 상반된 목적을 만족시킬 수 있는 암호 시스템을 요구한다 본 논문에서는 이를 만족시킬 수 있도록 위탁 방식을 이용하여 무선 통신상의 효율적인 키 분배 및 키 복구 시스템을 제안하였다. 제안하는 시스템은 암호의 역기능을 방지하기 위하여 요구되는 키 복구 기능을 추가하였으며, 키 복구 정보에 대한 유효성 검사가 가능하다. 또한 전송되는 정보가 적어 효율적이다. 본 논문에서 제안한 키 복구 방식은 송수신자 양쪽에서 동일한 방법을 사용하므로 다양한 응용 분야에 적용될 수 있다.

Keywords

References

  1. W. Diffie and M. Hellman, 'New Direction in Cryptography,' IEEE Trans. Info. Theory, 22, pp.644-654, 1976 https://doi.org/10.1109/TIT.1976.1055638
  2. NIST, 'Escrowed Encryption Standard,' Federal Information Proceeding Standards Publication 185, 1994
  3. David M. Balenson, Carl M. Elli son, StevenB. Lipner and Stephen T. Walker, 'A New Approach to Software Key Escrow Encryption,' Building in Big Brother : The Cryptographic Policy Debate, Springer-Verlag, pp.180-207, 1995
  4. Sivio Micali, 'Fair public key crypto-systems,' Crypto'92, Springer-Verlag, Lecture Notes in Computer Science, LNCS 740, pp.113-138, 1992
  5. Adam Young and Moti Yung, 'Auto-Recoverablel Auto-Certifiable Cryptosystems,' Advanced in Cryptology-Eurocrypto'98, Springer-Verlag, Lecture Notes in Computer Science, pp.17-31, 1998 https://doi.org/10.1007/BFb0054112
  6. Pascal Pailler and Moti Yung, 'Self-Escrowed Public Key Infrastructures,' Proceedings of ICISC'99, The 2nd International Conference Information Security and Cryptology. Springer-Verlag, Lecture Note in Computer Science, 1999
  7. Stephen T. Walker, Steven B. Lipner, Carl M. Ellison, Dennis K. Branstad and David M. Balenson, 'Commercial Key Escow : something for everyone now and for the future,' TIS Report, No.541, Trusted Information Systems Inc., 1995
  8. Eric Verheul and Henk C. A. van Tilborg, 'Binding ElGamal : A Fraud Detectable Alternative to Key-Escrow Proposals,' Eurocrypto'97,Springer-Verlag,Lecture Notes in Comfuter Science, LNCS 1233, pp.119-133, 1997
  9. Advanced Securuty for Personal Communications Technologies, http://www.esat.kuleuven.ac.be/cosic/aspect/index.html
  10. K. Rantos and C. Mltchell, 'Key Recovery in ASPeCT Authentication and Initialisation of Payment Protocol,' presented at ACTS Mobiles Summint, Sorrento, Italy, June, 1999
  11. J. Nieto, D. Park, C. Boyd and E. Dawson, 'Key Recovery in Third Generation Wireless Communication Symtems,' Public Key Cryptography-PKC 2000, LNCS 1751, pp.223-237, 2000
  12. C. H. Kim, P. J. Lee, 'New Key Recovery in WAKE Protocol,' Public Key Cryptography-PKC 2001, LNCS 1992, pp.325-338, 2001