Browse > Article

암호시스템의 키 관리 기술  

Song, Kie-On (성균관대학교 컴퓨터공학과 정보통신보호연구실)
Lee, Jin-Woo (성균관대학교 컴퓨터공학과 정보통신보호연구실)
Kwak, Jin (성균관대학교 컴퓨터공학과 정보통신보호연구실)
Yang, Hyung-Kyu (강남대학교 컴퓨터미디어공학과)
Won, Dong-Ho (성균관대학교 컴퓨터공학과)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 W.Fumy, P.Landrock, 'Principles of key management', IEEE Journal on Select- ed Areas in Communications pp. 785- 793, 1993
2 R.A.Rueppel, 'Criticism of ISO CD 11166 banking key management by means of asymmetric algorithms', Proceedings of the 3rd Symposium on State and Pro- gress of Research in Cryptography, pp. 191-198. 1993
3 IEEE P1363, Standard Specifications For Public Key Cryptography, IEEE, 2001
4 Russ Housley, Tim Polk, 'Planning for PKI', Wiley Computer Publishing, New York. 2001
5 NIST, Key management guideline - Part 2: Best Practices for Key Management Organization. NIST Special Publication 800-57. 2003
6 Alfred J.Menezes. Paul C.van Oorschot Scott A.Vanstone, Handbook of Applied Cryptography, pp. 543-590, 1996
7 R.Anderson, E.Biham, 'Robustness Principles for public key protocols', Advances in Cryptology-CRYPTO '95, LNCS 963, pp. 236-247, 1995
8 NIST, Guideline to Federal Organizations on security Assurance and Acquisition /Use of Tested/Evaluated Products. NIST Special Publication 800-23, 2000
9 S.M.Matyas, C.H.Meyer. 'Generation, distribution, and installation of Cryptographic keys', IBM Systems Journal 17. pp. 126-137, 1978
10 ISO/IEC 11770-1, Information technology Security techniques-Key Management Part 1 : Framework, ISO, 1996
11 D.W.Davies, W.L.Price, 'Security for Computer Networks', John Wiley & Sons, New York, 2nd edition, 1989
12 M.Abadi, R.Needham, 'Prudent engineering practice for cryptographic Protocols', Digital Equipment Corporation, DEC SRC report #125, 1994
13 ISO 10202-7. Financial transaction cards - Security architecture of financial tran saction systems using integrated circuit cards - Part 7: Key management. ISO, 1998
14 NIST. Guideline for the Certification and Accreditation of Information Technology Systems, NIST Special Publication 800-37, 2003