암호시스템의 키 관리 기술
![]() |
Song, Kie-On
(성균관대학교 컴퓨터공학과 정보통신보호연구실)
Lee, Jin-Woo (성균관대학교 컴퓨터공학과 정보통신보호연구실) Kwak, Jin (성균관대학교 컴퓨터공학과 정보통신보호연구실) Yang, Hyung-Kyu (강남대학교 컴퓨터미디어공학과) Won, Dong-Ho (성균관대학교 컴퓨터공학과) |
1 | W.Fumy, P.Landrock, 'Principles of key management', IEEE Journal on Select- ed Areas in Communications pp. 785- 793, 1993 |
2 | R.A.Rueppel, 'Criticism of ISO CD 11166 banking key management by means of asymmetric algorithms', Proceedings of the 3rd Symposium on State and Pro- gress of Research in Cryptography, pp. 191-198. 1993 |
3 | IEEE P1363, Standard Specifications For Public Key Cryptography, IEEE, 2001 |
4 | Russ Housley, Tim Polk, 'Planning for PKI', Wiley Computer Publishing, New York. 2001 |
5 | NIST, Key management guideline - Part 2: Best Practices for Key Management Organization. NIST Special Publication 800-57. 2003 |
6 | Alfred J.Menezes. Paul C.van Oorschot Scott A.Vanstone, Handbook of Applied Cryptography, pp. 543-590, 1996 |
7 | R.Anderson, E.Biham, 'Robustness Principles for public key protocols', Advances in Cryptology-CRYPTO '95, LNCS 963, pp. 236-247, 1995 |
8 | NIST, Guideline to Federal Organizations on security Assurance and Acquisition /Use of Tested/Evaluated Products. NIST Special Publication 800-23, 2000 |
9 | S.M.Matyas, C.H.Meyer. 'Generation, distribution, and installation of Cryptographic keys', IBM Systems Journal 17. pp. 126-137, 1978 |
10 | ISO/IEC 11770-1, Information technology Security techniques-Key Management Part 1 : Framework, ISO, 1996 |
11 | D.W.Davies, W.L.Price, 'Security for Computer Networks', John Wiley & Sons, New York, 2nd edition, 1989 |
12 | M.Abadi, R.Needham, 'Prudent engineering practice for cryptographic Protocols', Digital Equipment Corporation, DEC SRC report #125, 1994 |
13 | ISO 10202-7. Financial transaction cards - Security architecture of financial tran saction systems using integrated circuit cards - Part 7: Key management. ISO, 1998 |
14 | NIST. Guideline for the Certification and Accreditation of Information Technology Systems, NIST Special Publication 800-37, 2003 |
![]() |