Browse > Article
http://dx.doi.org/10.13089/JKIISC.2003.13.4.85

Key Distribution Protocol Appropriate to Wireless Terminal Embedding IC Chip  

안기범 (성균관대학교 정보통신공학부 정보통신보호연구실)
김수진 (성균관대학교 정보통신공학부 정보통신보호연구실)
한종수 (성균관대학교 정보통신공학부 정보통신보호연구실)
이승우 (성균관대학교 정보통신공학부 정보통신보호연구실)
원동호 (성균관대학교 정보통신공학부)
Abstract
Computational power of IC chip is improved day after day producing IC chips holding co-processor continuously. Also a lot of wireless terminals which IC chip embedded in are produced in order to provide simple and various services in the wireless terminal market. However it is difficult to apply the key distribution protocol under wired communication environment to wireless communication environment. Because the computational power of co-processor embedded in IC chip under wireless communication environment is less than that under wired communication environment. In this paper, we propose the hey distribution protocol appropriate for wireless communication environment which diminishes the computational burden of server and client by using co-processor that performs cryptographic operations and makes up for the restrictive computational power of terminal. And our proposal is satisfied with the security requirements that are not provided in existing key distribution protocol.
Keywords
IC chip; key distribution; wireless communication environments;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Wireless Authentication Protocols Preserving User Anonymity /
[ Jaeseung Go;Kwangio Kim ] / SCIS-2001
2 이동 시스템에서의 효율적인 인증 및 키 교환 프로토콜 /
[ 최영근;김순자 ] / 통신정보보호논문지   과학기술학회마을
3 On the Disign of Security Protocols for Mobile Communications /
[ V.Varadharajan;Y.Mu ] / Australasian Conference, ACISP'96 Conference
4 Encrypted key exchange: password based protocols secure against dictionary attacks /
[ S.Vellovin;M.Merrit ] / Proceedings of the Symposium of Security and Privacy
5 타원곡선에 기반한 표준 키 분배 프로토콜의 안전성 분석 및 응용 분야에 관한 연구 /
[ 오수현;이승우;심경아;양형규;원동호 ] / 정보보호학회 논문지   과학기술학회마을
6 Privacy and Authentication on a Portable Communications System /
[ M.J.Beller;L.F.Chang;Y.Yacobi ] / Proceeding of GLOBECOM'91
7 시간정보를 이용한 인증서 상태 검증정보 제공에 관한 연구 /
[ 곽진;이승우;조석향;홍순좌;원동호 ] / 한국정보처리학회 춘계학술발표 눈문집
8 Message recovery for signature scheme based on the discrete logrithm problem /
[ K.Nyberg;R.A.Rueppel ] / Eurocrypt'94 Proceeding
9 Authenticated key exchange secure against dicitionary attacks /
[ M.Bellare;D.Pointcheval;P.Rogaway ] / Eurocrypt'00, LNCSI
10 /
[ G.Hom;K.M.Martin;C.J.Michell ] / Authentication Protocols for Mobile Network Environment Value-Added Service
11 타원곡선 암호의 기초와 응용 /
[ 이동훈;황효선;임채훈 ] / Technical Report
12 Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) /
[ Y.Zheng ] / Advances in Cryptology, Proceedings of CRYPTO '97
13 Secure Remote Password Protocol /
[ T.Wu ] / Proceedings of the Internet Society Network and Distributed System Security Symposium
14 온라인 인증서 상태 검증 프로토콜(OCSP)의 최근 연구 동향에 관한 분석 /
[ 곽진;이승우;조석향;원동호 ] / 한국정보보호학회 논문지   과학기술학회마을
15 An Authentication and Security Protocol for Mobile Computing /
[ Y.Zheng ] / proceeding of IFIP
16 AKA Protocols for Mobile Communications /
[ KookHeui Lee;SangJae Moon ] / Australasian Conference, ACISP 2000, LNCS 1841
17 PACS(Personal Access Communications System) Air Interface Standard /
[ JTC ] / J-STD-014