다운로드와 수행의 병행을 허용하는 모바일 코드 인증 기법

Mobile Code Authentication Schemes that Permit Overlapping of Execution and Downloading

  • 박용수 (한양대학교 정보통신대학) ;
  • 조유근 (서울대학교 전기컴퓨터공학부)
  • 발행 : 2005.04.01

초록

모바일 장치에서 코드를 다운로드 받아 수행할 때, 코드 인증이 매우 중요하다. 한편, 모바일 코드의 수행 시간 지연을 줄이기 위해 통상 전체 코드가 다운로드 되기 전에 수신된 일부 코드로 수행이 시작된다. 그러나. 저자들이 조사한 바로는 이 경우 코드 인증을 할 수 있는 방법이 아직 발표된 바가 없다. 본 논문에서는 전송될 코드 청크의 순서가 미리 결정되어 있는 경우와 프로그램 실행 도중 동적으로 결정되는 2 가지 경우에 대하여, 일부 코드로 수행을 시작하면서도 인증이 가능한 2 가지 방법을 제시한다. 이 방법은 각각 해쉬 체인 기법과 인증 트리 기법을 기반으로 한다. 특히, 후자의 기법에서 각 모바일 코드 청크를 인증시 이전 수신한 인증 정보를 활용함으로써 통신 오버헤드와 검증 지연 시간을 줄였다. 코드 청크의 개수가 n 일 때, 두 기법의 통신 오버헤드의 크기는 O(n)이며, 검증 지연 시간은 각각 O(1), O(log n)이다.

When the application code is downloaded into the mobile device, it is important to provide authentication. Usually, mobile code execution is overlapped with downloading to reduce transfer delay. To the best of our knowledge, there has not been any algorithm to authenticate the mobile code in this environment. In this paper, we present two efficient code authentication schemes that permit overlapping of execution and downloading under the two cases: the first is when the order of transmission of code chunks is determined before the transmission and the second is when this order is determined during the transmission. The proposed methods are based on hash chaining and authentication trees, respectively. Especially, the latter scheme utilizes previously received authentication informations to verify the currently received chunk, which reduces both communication overhead and verification delay. When the application code consists of n chunks, communication overheads of the both schemes are 0(n) and verification delays of these two schemes are O(1) and O(log n), respectively.

키워드

참고문헌

  1. KTF, '위피 상용 서비스 계획', available at http://www.etnews.co.kr/news/detail.html?id=200310150022, 2003
  2. S. Bergel, 'US Wireless Carriers Bullish on BREW,' Asia BizTech, May 2, 2003
  3. C. Krintz, B. Calder, and U. Holzle, 'Reducing Transfer Delay Using Java Class File Splitting and Prefetching,' In Proceedings of the 1999 ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languates, and Applications, pp. 276-291, 1999 https://doi.org/10.1145/320384.320412
  4. E. G. Sirer, A. J. Gregory, and B. N. Bershad, 'A Practical Approach for Improving Startup Latency in Java Applications,' In Workshop on Compiler Support for System Software, pp. 47-55, 1999
  5. C. Krintz, B. Calder, H. B. Lee, and B. G. Zorn, 'Overlapping Execution with Transfer Using Non-Strict Execution for Mobile Programs,' In Proceedings of the 8th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 159-169, 1998 https://doi.org/10.1145/291006.291040
  6. D. Lee, J. -L. Baer, B. Bershad, and T. Anderson, 'Reducing Startup Latency in Web and Desktop Applications,' In Proceedings of the 3rd USENIX Windows NT Symposium, pp. 165-174, 1999
  7. T. Gamou, 'A Working-Set Approach to Reduce the Download-Execution Time of Mobile Programs,' In Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002, pp. 239-248, 2002 https://doi.org/10.1109/ICDCS.2002.1022261
  8. G. McGraw and E. Felten, Securing Java: Getting Down to Business with Mobile Code, John Wiley & Sons, Inc., 1999
  9. R. Gennaro and P. Rohatgi, 'How to Sign Digital Streams,' In CRYPTO'97, pp. 180-197, 1997
  10. R. C. Merkle, 'A Certified Digital Signature,' In CRYPTO'89, pp. 218-238, 1989
  11. N. Barie and B. Pfitzmann, 'Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees,' in CRYPTO'97, pp. 480-494, 1997 https://doi.org/10.1007/3-540-69053-0_33
  12. P. Devanbu, M. Gertz, A. Kwong, C. Martel, G. Nuckolls, and S. B. Stubblebine, 'Flexible Authentication Of XML documents,' in ACM CCS'00, pp. 136-145, 2000 https://doi.org/10.1145/501983.502003
  13. K. Fu, M. Frans Kaashoek, and D. Mazieres, 'Fast and secure distributed Read-only file system,' in USENIX OSDI'00, pp. 1-24, 2000 https://doi.org/10.1145/505452.505453
  14. Y. Park, T. Jung, and Y. Cho., 'An Efficient Stream Authentication Scheme using Tree Chaining,' Information Processing Letters, Vol. 86, No. 1, pp. 1-8, 2003 https://doi.org/10.1016/S0020-0190(02)00456-8
  15. A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997
  16. S. Goldwasser, S. Micali, and R. L. Rivest, 'A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks,' SIAM Journal of Computing, Vol. 17, Issue 2, pp. 281-308, 1998 https://doi.org/10.1137/0217017
  17. M. Roe, 'Performance of Protocols,' In Security Protocols Workshop, LNCS vol. 1796, pp. 140-146, 1999
  18. W. Dai, 'Cypto++ 5.1 Benchmarks,' available at http://www.eskimo.com/-weidai/benchmarks.html, 2003