보안토큰 평가대상 및 보안환경에 대한 연구

  • Published : 2007.11.30

Abstract

본 고에서는 미 국방성(DoD: Department of Defense) 커뮤니티 지원 하에 국가안전보장국 (NSA: National Security Agency)에 의해 작성된 공개키 기반구조 및 키 관리 기반구조 보안토큰 보호프로파일에서의 평가대상(TOE: Target of Evaluation) 분석을 통해 보안토큰에서의 평가대상 (TOE)에 대한 응용과 보안환경에 대하여 분석한다.

Keywords

References

  1. Ayer, Ken. "Risk Management & Smart Cards." In CardTech/SecurTech 99 Gateway to Practical Innovation. Chicago, 1999
  2. Bovelander, Ernst. "Evaluations of Smart Card Based Security Systems-Is Your Smart Card Really Secure?" In CardTech/SecurTech 95 Strategies for the Millennium. Washington, D. C., 1995
  3. Bovelander, Ernst, and Jan Pieters. "A Struc- tured Approach to Smart Card Security." In CardTech/SecurTech 96 Applications in Action. Atlanta, 1996
  4. DoD Public Key Infrasructure and Key Management Infrastructure Token Protection Profile. Version 3.0, 2002
  5. Garon, Gilles. "Overview of Smart Card Security and Standards." In CardTech/SecurTech 95 Strategies for the Millennium. Washington, D.C., 1995
  6. Johnson, Lance. "Smart Card Chip Security: Classification and Evaluation." In CardTech/SecurTech 97 The Art of Implementation. Orlando. 1997
  7. Kocher, Paul. "Differential Power Analysis and Problems in Applied Cryptography." In CardTechi SecurTech 99 Gateway to Practical Innovation. Chicago. 1999
  8. Krueger, Julie. "The Evolution of Personal Tokens in a More Secure Future." In CardTech/SecurTech 96 Applications in Action. Atlanta, 1996