Browse > Article
http://dx.doi.org/10.7465/jkdi.2017.28.1.163

On the application of authorized certificate for cryptology  

Kim, Daehak (Department of Mathematical Sciences, Catholic University of Daegu)
Publication Information
Journal of the Korean Data and Information Science Society / v.28, no.1, 2017 , pp. 163-171 More about this Journal
Abstract
With the advance of function of smart phone system and internet services, mobile trade grows more popular in the area of e-business or banking. These environmental changes, it makes the needs of authorized certificates. Authorized certificate is not only important in these days but also future society. In 2015, 27 millions of Korean people used public key certificate, but most of them does not know the details on the public key certificate. Therefore, in this paper, we explain and investigate the characteristics on the public certificate and explain the relation ship between authorized certificate and public key encrytion. By investigating several papers, internet data, newspapers and books, we found the historical changes, substantial aspects, the encryption systems on the authorized certificate. Also we study the pros and cons of authorized certificate. Finally we predict the number of issued authorized certificate for the future society based on nonparametric statistical method.
Keywords
Bio-medical services; certificate; cryptology; hash function; public key;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Rivest, R. L., Shamir, A. and Adleman, L. (1978). A method of obtaining digital signature and public-key cryptosystem. Communication of the Association for Computing Machinery, 21, 120-126.   DOI
2 Trappe, W. and Washington, L. (2006). Introduction to cryptography with coding theory, Prentice Hall, Upper Saddle River.
3 Blake, I., Seroussi, G. and Smart, N. (1999). Elliptic curves in Cryptography, London Mathematical Society, lecture note series 265, Cambridge University Press, Cambridge.
4 Kim, D. (2015). Computer intensive method for extended euclidean algorithm. Journal of the Korean Data & Information Science Society, 25, 1467-1474.
5 ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31, 469-472.   DOI
6 Forouzan, B. A. (2008). Introduction to cryptography and network security, The McGraw-Hill Companies, New York.
7 Kim, D. (2012). On the development of DES round key generator based on Excel Macro. Journal of the Korean Data & Information Science Society, 23, 1203-1212.   DOI
8 Korea Electronic Certification Authority (Crosscert). http://www.crosscert.com.
9 Korea Financial Telecommnications & Cleanings Institute (Yessign, KFTC). http://www.yessign.com.
10 Korea Information Certificat Authority (Signgate). http://signgate.com.
11 Korea Internet & Security Agency (2011a). Development of improved certificate encryption system, Korea Internet & Security Agency, Seoul.
12 Korea Internet & Security Agency (2011b). Development of improved korean digital signature algorithem and standard, Korea Internet & Security Agency, Seoul.
13 Korea Trade Nnetwork (Tradesign). http://www.tradesign.net/.
14 Koscom (Signkorea). http://www.signkorea.com.
15 Rivest, R. L. (1992). The MD4 message digest algorithm, RFC 1320, MIT and RSA Data Security, Cambridge.