Browse > Article

Design and Implementation of the SSL Component based on CBD  

Cho Eun-Ae (고려대학교 컴퓨터학과)
Moon Chang-Joo (건국대학교 컴퓨터응용과학부)
Baik Doo-Kwon (고려대학교 컴퓨터학과)
Abstract
Today, the SSL protocol has been used as core part in various computing environments or security systems. But, the SSL protocol has several problems, because of the rigidity on operating. First, SSL protocol brings considerable burden to the CPU utilization so that performance of the security service in encryption transaction is lowered because it encrypts all data which is transferred between a server and a client. Second, SSL protocol can be vulnerable for cryptanalysis due to the key in fixed algorithm being used. Third, it is difficult to add and use another new cryptography algorithms. Finally. it is difficult for developers to learn use cryptography API(Application Program Interface) for the SSL protocol. Hence, we need to cover these problems, and, at the same time, we need the secure and comfortable method to operate the SSL protocol and to handle the efficient data. In this paper, we propose the SSL component which is designed and implemented using CBD(Component Based Development) concept to satisfy these requirements. The SSL component provides not only data encryption services like the SSL protocol but also convenient APIs for the developer unfamiliar with security. Further, the SSL component can improve the productivity and give reduce development cost. Because the SSL component can be reused. Also, in case of that new algorithms are added or algorithms are changed, it Is compatible and easy to interlock. SSL Component works the SSL protocol service in application layer. First of all, we take out the requirements, and then, we design and implement the SSL Component, confidentiality and integrity component, which support the SSL component, dependently. These all mentioned components are implemented by EJB, it can provide the efficient data handling when data is encrypted/decrypted by choosing the data. Also, it improves the usability by choosing data and mechanism as user intend. In conclusion, as we test and evaluate these component, SSL component is more usable and efficient than existing SSL protocol, because the increase rate of processing time for SSL component is lower that SSL protocol's.
Keywords
SSL(Secure Socket Layer); Security application; Component; CBD;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Matt Blaze, Whitfield Diffie, Ronald L. Rivest, Bruce Schneier, Tsutomu Shimomura, Eric Thompson, and Michael Wiener, 'Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security,' 1996
2 Xiaodong Lin, Johnny W. Wong, Weidong Kou, 'Performance Analysis of Secure Web Server Based on SSL,' Lecture Notes in Computer Science, Springer-Verlag Heidelberg, Volume 1975/2000, Information Security: Third International Workshop, ISW 2000, Wollongong, Australia, December 2000. Proceedings, pp.249-261, 2003
3 K. Kant, R. Iyer and P. Mohapatra, 'Architectural Impact of Secure Socket Layer on Internet Servers,' Proc. IEEE 2000 International Conference on Computer Design, pp.7-14, 2000
4 R. W. Badlwin et C. V. Chang, 'Locking the e-safe,' IEEE Spectrum, 1997   DOI   ScienceOn
5 Sun, 'Java 2 Platform Enterprise Edition Specification, Version 1.4,' Sun Microsystems Inc, 2004
6 Alan O. Freier, Philip Karlton, and Paul C. Kocher, 'The SSL Protocol Version 3.0,' Work in progress, Netscape Communications, 1996
7 윤재호, '인증서 기반의 SSL Protocol', 한국정보보호진흥원, 2001
8 William Stallings, 'Cryptography and Network Security,' Principles and Practice, 3rd edition, Prentice Hall, 2002
9 'http://www.ncipher.com/ssl/,' nFastTM, nForceTM, nCipher
10 'http://www.nortelnetworks.com/products/01/alteon/isdssl/,' Alteon SSL Accelerator, Nortel Networks, 2003
11 Anh-Duy Nguyen, 'Securing Web Applications through a Secure Reverse Proxy,' Sun Microsystems, Inc., 2003
12 TTA Standard, 'Hash Function Standard-Part 2: Hash Function Algorithm Standard(HAS-160),' Telecommunications Technology Association, 2000
13 Booch, G., Rumbaugh, J., and Jacobson, I., 'The Unified Modeling Language User Guide,' Addison Wesley Longman, 1999
14 Sun, 'Enterprise Java Beans Specification Version 2.0 Final Release,' Sun Microsystems Inc, 2001
15 KISA, 'SEED Algorithm Specification,' Korea Information Security Agency, 1999
16 이경구, 'TLS 표준 동향,' 한국정보보호진흥원, 월간 '정보보호뉴스' 통권 19호, 1999
17 Chris Frye, 'Understanding Components,' Andersen Consulting Knowledge Xchange, 1998