Browse > Article
http://dx.doi.org/10.13089/JKIISC.2008.18.2.139

Vulnerability and Security Requirement Analysis on Security Token and Protection Profile Development based on Common Criteria Version 3.1  

Kwak, Jin (Soonchunhyang University, Department of Information Security Engineering)
Hong, Soon-Won (Korea Information Security Agency)
Yi, Wan-Suck (Korea Information Security Agency)
Abstract
Recently, financial institutes and industrial companies are adopted to security token such as OTP, smart card, and USB authentication token and so on for secure system management and user authentication. However, some research institutes have been introduced security weaknesses and problems in security tokens. Therefore, in this paper, we analyses of security functions and security requirements in security token performed by analyses of standardization documents, trends, security problems, attack methods for security tokens. Finally, we propose a CC v.3.1 based security token protection profile.
Keywords
security token; threats; protection profile; CC;
Citations & Related Records
연도 인용수 순위
  • Reference
1 국가기관용 개방형 스마트카드 플랫폼 보호프로 파일 Vl.1, 국가정보원 IT보안인증사무국, 한국 정보보호진흥원, 2006. 5
2 Supporting Docrunent Mandatory Technical Document, Application of Attack Potential to Smartcards, Version 2.1, CCDB, 2006. 4
3 Supporting Docrunent Mandatory Technical Document, The Application of CC to Integrated Circuits, Version 2.0, CCDB, 2006. 4
4 Protection Profile Authentication Device, DAUTHPP (PKI based), 2006. 1
5 Department of Defense Public Key Infrastructure and Key Management Infrastructure Token Protection Profile(Medium Robustness), V3.0, 2002. 3
6 iKey 2032 Security Target, RainbowA사, 2004. 5
7 KISA, KCAC.TS.HSM v1.2, 보안토큰 기반의 공인인증서 이용 기술규격, 2007
8 Common Criteria for Information Technology Security Evaluation, Version 3.1, CCMB, 2006. 9
9 Common Methodology for Information Technology Security Evaluation, Version 3.1, CCMB, 2006. 9
10 Common Criteria Protection Profile, USBDatentrager, BSI-PP-0025, 2006. 3