Browse > Article
http://dx.doi.org/10.9708/jksci.2010.15.5.113

Hybrid PKI Public Certificate Security Method Based on Device ID  

Son, Young-Hwan (충북대학교 전자정보대학)
Choi, Woon-Soo (충북대학교 전자정보대학)
Kim, Ki-Hyun (에스지에이(주))
Choi, Han-Na (충북대학교 전자정보대학)
Lee, Dae-Yoon (충북대학교 전자정보대학)
Oh, Chung-Shick (한국과학기술정보연구원)
Cho, Yong-Hwan (충북대학교 전자정보대학)
Abstract
In this study, the hybrid authorization quotation technique is based on the device ID for the integrity of the source region guarantee of user certificate, in order to improve the convenience and security for user in the hybrid PKI certificate Mechanism for authentication. The feature of the model in which it is presented from this paper is 5. First, because the user can select the policy himself in which it matches with each authentication situation and security level, the convenience can be improved. Second, the integrity of the source region of the user certificate can be guaranteed through the comparison of the DLDI Key, that is the hash-value of the device ID. Third, the security can be improved by continuously changing an encoding, and the value of the key in which it decodes through the EOTP Key. Fourth, the index value is added to a certificate, and the storage of a certificate is possible at the Multi-Device. Fifth, since the addi the inan aratus for the integrity of the source region guarantee of a certificate is not needed, the authentication process time can be reduced and the computational load of the certificate server can be reduced also.
Keywords
Integrity of the source region; Device ID; Hybrid Certificate;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Andre Arnes and Svein J. Knapskog, "Selecting Revocation SolutiOIS for PKI," Proceedings of The Fifth Nordic Workshop On secure IT system(NORDSEC), 2000.
2 양형규, 최종호, "안전한 하이브리드 인증 메시지 프로토콜," 제12권 제4호, 77-85쪽, 2007년 9월.
3 "OTP 솔루션", http://www.datanet.co.kr, NETWORK TIME 2006.10.
4 A. Mwnezes, P. Van Oorschot and S. Vanstone, "Handbook of applied cryptography," CRC Prss, Inc, 1997.
5 노창현, "GPKI 공인인증서의 보안토큰(HSM)적용 정책 연구," 창원대학교 대학원 석사 학위 논문, 2009.6.
6 이성만, "통합 OTP 인증센터 개선 방안," 건국대학교 정보통신 대학원 석사학위 논문, 2008.6.
7 Mitchell, C.J., Chen, L., "Comments on the S/key User Authentication Scheme," ACM Operating Systems Review. Vol. 30. No. 4. 2002.
8 Yeh, T.C., Shen, H.Y., Hwang, j.j, "A Secure One-time Password Authentication Scheme Using Smart Cards," IEICE Trans. Commun. Vol. E85-B. No.11. Nov. 2002.
9 최동현, 김승주, 원동호, "일회용 패스워드(OTP : One-Time Password) 기술 분석 및 표준화 동향," 정보보호학회지, 제17권 제3호, pp. 12-17, 2007년6월.   과학기술학회마을
10 금융보안연구원, "OTP 통합인증센터에서 수용 가능한 인증방식," 주간정보 Vol. 1 제1권 제1호 창간지, 2007년 1월.
11 National Security Agency, "Technical Interoperability Profile for the Bridge Certification Authority(BCA) Interoperability DemOIStration Phase 2," prepared by A&N Associates, 2001.