Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2005.12C.7.973

Design of User Authentication and DRM Security System Using Security Agent  

Kim Jung-Jae (숭실대학교 컴퓨터학과)
Lee Kyung-Seog (산업연구원 연구위원)
Jun Moon-Seog (숭실대학교 컴퓨터학과)
Abstract
This paper proposes the more various key generation algorithms than existing method and the DRM encryption system supporting the higher security than the existing systems which do not store a symmetric key made by the key generation algorithm in a server. Also, we propose a client security agent system which decrypts a data by analogized key. We designed and implemented the proposed system And, we tested the video data files with the various sizes to evaluate the performance of our system Our experiment results show that the delay time which includes an encryption and decryption time was significantly reduced through our proposed scheme.
Keywords
DRM; Symmetric Key; Security Agent; PKI; Authentication;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Whitfield Diffie and Martin Hellman, 'New Directions in Cryptography, ' IEEE Transaction on Information Theory, VoI.IT-22, No.6, pp.644-654, November, 1976   DOI
2 Intertrust: http://www.intertrust.com/main/overview/drm.html
3 Joshua Duhl and Susan Kevorkian, 'Unde rstanding DRM system: An IDC White paper,' IDC, 2001
4 Joshua Duhl, 'Digital Rights Management: A Definition,' IDC 2001
5 Microsoft: http://www.microsoft.com/windows/windowsmedia/drm.asp
6 V.K. Gupta, 'Technological Measures of Protection,' Proceedings of International Comference on WIPO, Seoul Korea, October, 25-27, 2000
7 김정재 외 2명, '동영상 데이터 보호를 위한 공유키 풀 기반의 DRM 시스템,' 정보처리학회논문지C, Vol.12-C No.02, pp. 0183-0190, April, 2005   과학기술학회마을   DOI   ScienceOn
8 김지홍 외 5명, '전자상거래 보안기술', 생능출판사, 2001
9 Brad Cox, Superdistribution: Objects As Property on the Electronic Frontier, Addision-Wesley, May, 1996
10 Sung, J. Park, 'Copyrights Protection Tech niques,' Proceedings International Digital Content Conference, Seoul Korea, Nov., 28-29, 2000