Browse > Article
http://dx.doi.org/10.13089/JKIISC.2014.24.1.31

The Secure Key Store to prevent leakage accident of a Private Key and a Certificate  

Park, Young-Jin (Gradute School of Information Security, Korea University)
Kim, Seon-Jong (INITECH CO., LTD.)
Lee, Dong-Hoon (Gradute School of Information Security, Korea University)
Abstract
In Korea, the Public Key Infrastructure (PKI) has been introduced. For secure information transmission and identification, the electronic signature authorization system of a certificate-based is built, and then the service provide.The certificate is stored in location what users can easily access and copy. Thus, there is a risk that can be stolen by malware or web account hacking. In addition, private key passwords can be exposed by the logging tool, after keyboard security features are disabled. Each of these security weaknesses is a potential conduit for identity theft, property/asset theft, and theft of the actual certificates. The present study proposes a method to prevent the private key file access illegally. When a certificate is stored, the private key is encrypted by the dependent element of the device, and it is stored securely. If private key leakage occurs, the retrieved key could not be used on other devices.
Keywords
PKI; Device; Device-DNA; Device-DNA Map;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Korea Internet & Security Agency, "Research on the Actual condition of Electronic Signature System Usage," Dec. 2011
2 Hyung-uk Kim, "A Enhanced Private Key Protection Techniques in the Device Authentication Environments," M.A,Soongsil University, Dec. 2011
3 Ho-kuen Lee, "public certificate management techniques by random number information for identification," Korea University ,M.A,Dec.2010
4 National Assembly, "Digital Signature Act(DSN)", Mar, 2013
5 Korea Internet & Security Agency, "KCAC.TS.CM-Certificate Management in Mobile Device," v1.30, Feb, 2012
6 Korea Internet & Security Agency, "KCAC.TS.UI-User Interface Specification for the Interoperability between Accredited Certification Authorities," v1.83, Feb. 2012
7 Byung-hoon Kang, Beom-soo Kim and Kyung-kyu Kim, Society for e-Business Studies, "Securing the Private Key in the Digital Certificate Using a Graphic Password," 16(4), pp.1-16, Nob. 2011   과학기술학회마을   DOI
8 Ki-jung Lee , Tae-kyoung Kwon, Seong-woon Hwang and Ki-song Yoon, Jonornal of The Korea Institute of information Security & Cryptology, "A Study on the Secure Storage Device for Protecting Cryptographic Keys in Untrusted DRM Client Systems," 14(2), pp.3-13, Apr.2004   과학기술학회마을
9 Network Working Group, "Public-Key Cryptography Standards (PKCS) #8 : Private-Key Information Syntax Specification v1.2," RFC 5208, May. 2008
10 RSA, "PKCS #5 v2.0 : Password-Based Cryptography Standard", Mar.1999