• Title/Summary/Keyword: PKI(Public Key Infrastructure)

Search Result 182, Processing Time 0.028 seconds

Mutual Authentication and Route Optimization between MN and CN using AAA in Mobile IPv6 (Mobile IPv6에서 AAA를 이용한 MN과 CN간의 상호 인증 및 경로 최적화)

  • 김미영;문영성
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.5
    • /
    • pp.429-437
    • /
    • 2004
  • The mobileip working group is equipped with the RR(Return Routabilit) taking the simple procedures and small amount of cryptographic operations by considering the processing capability of the mobile node however it dose not provide security features enough. To replace with enhanced methods, mobileip WG is making an effort to find the approved solutions include CGA(Craptographically Generated Address), IPsec(Internet Protocol Security) as well as the existing infrastructure such as AAA(Authentication, Authorization and Account) and PKI(Public Key Infrastructure). In this paper, we propose the authentication and route optimization based on AAA suitable for the requested security service for its successful story in wireless network such as 802.11 and 3GPP(3rd Generation Partnership Project) as well as wired one. We analyze the effectiveness of our scheme according to the traffic and mobility properties. The result shows the cost reduction up to 20 percent comparing with RR.

A Framework of Agent Protection Protocol for Secure Execution of Mobile Agent

  • Jung, Chang-Ryul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.371-378
    • /
    • 2004
  • As an agent is applied into various fields, it is suggested as the paradigm of new application technology in the area of computer communication. However, the mobile agent brines the problem of security on an agent due to mobility. This study proposals the mobile agent protection protocol framework for more effective protection and safety. The designed Framework of protocol uses the public ky, the private key and the digital signature in PKI environment based on JAVA. This is the mechanism accomplishing safely the work of an agent by tracking the pattern of execution and the mobility plan through the VS(verification server). This also secures the suity and the flawlessness of an agent through the VS guaranteeing safety from malicious attacks.

A Study on Distributed OCSP for minimizing the load of OCSP Server based on PKI (PKI환경의 OCSP서버 부하 감소를 위한 OCSP 분산 기법)

  • Ko, Hoon;Jang, Eui-Jin;Shin, Yong-Tae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.97-106
    • /
    • 2003
  • The important factor in Public-Key Infrastructure is the authentication to correspondent. We receive the digital certificate for authentication between each other, and then we check the existence of validity on the certificate by Certification Revocation List(CRL). But, To use CRL is the scheme used in offline status. So, it is impossible to refer to the latest information and the CRL scheme which is used after downloading is variously unsuitable to getting bigger of the CRL size as time goes on. Therefore, we prefer OCSP(Online Certificate Status Protocol) used in online to CRL used in offline. Consequently, we propose the scheme which provides the request of fast verification in case of requesting the verification on the certificate by owning the same update information to Certificate Registry and distributed OCSP.

Implementation of an RFID Key Management System for DASH7

  • Vegendla, Aparna;Seo, Hwajeong;Lee, Donggeon;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.1
    • /
    • pp.19-25
    • /
    • 2014
  • The wireless sensor networking standard DASH7 operates in low-power communication with a better transmission quality in active RFID networks. The DASH7 security standard supports public key cryptography. At present, the DASH7 standard uses the message authentication code in the network layer for authentication and integrity. However, its security standard is still in an incubation stage with respect to the implementation of a crypto exchange over a DASH7 network. Effective key management is an important factor for privacy and security. If organizations are not careful about where and how keys are stored, they leave the encrypted data vulnerable to theft. In this regard, we present a key management system designed for efficient key management through public key infrastructure authentication as well as a non-repudiation feature for the DASH7 standard. We analyze the performance of the proposed system on a basis of various performance criteria such as latency and throughput.

Public Key Infrastructure Model For Wireless Application Protocol(WAP) (WAP을 위한 국내 공개키기반구조(PKI)모델)

  • 이재일;박정환;송주석
    • Review of KIISC
    • /
    • v.10 no.4
    • /
    • pp.41-51
    • /
    • 2000
  • 무선 인터넷 서비스가 국내외적으로 크게 증가하고 있으며 2003년경에는 세계 무선 인터넷 사용인구가 6억 명에 이를 것이라는 전망이 나오고 있다. 그러나 무선인터넷이 보다 활성화되고 이를 이용한 뱅킹 서비스, 주식거래, 온라인 쇼핑 등의 전자상거래 서비스가 원활히 제공되기 위해서는 보안기술의 적용이 필수 사항이다. 본 고에서는 WAP(Wireless Application Protocol)을 위한 전자서명인증 및 키 분배용 모델을 제시함으로써 국내 무선공개키기반구조 구축시 발생할 수 있는 혼란을 최소화하고 국내 무선 인터넷 인증 관련 기술의 발전과 응용 서비스를 활성화시키는데 기여하고자 한다.

  • PDF

Result of the 1st Worldwide Internet Voting System

  • Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.219-224
    • /
    • 2002
  • In this paper, after designing an efficient and secure Internet voting protocol (called as “votopia”) based on modified Ohkubo et. al.'s scheme [8] under Public Key Infrastructure (PKI), we have implemented this system and served via the Internet to select the Most Valuable Players and Best Goal Keepers of 2002 FIFA World Cup Korea/Japan$\^$TM/. The sketch of voting protocol, practical implementation and voting result arc described.

  • PDF

An Efficient Protocol for the Cross Certification Path Validation (경로기반 상호인증을 위한 효율적 프로토콜)

  • 김홍석;박세현
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.217-220
    • /
    • 2000
  • With the expansion of E-commerce, Public Key Infrastructure (PKI) solutions are requited to resolve Internet security problems. But the certification mechanism for each organization has been independently developed under its own circumstances, so the cooperation of heterogeneous certification mechanisms must be carefully taken into account. In this paper, we propose an efficient protocol for the cross certification based on the path validation. The proposed “cross certification gateway” provides flexibility and convenience with the initial establishment protocol for the cross certification among different certification domains.

  • PDF

Traitor Traceable Protocols using Modified Signcryption (Signcryption을 이용한 부정자 추적 프로토콜)

  • Shin, Seong-Han;Park, Ji-Hwan;Huh, Young
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2001.06a
    • /
    • pp.471-476
    • /
    • 2001
  • 본 논문에서는 Y. Watanabe et al.에 의해 제안된 서명부가문서를 이용한 부정자 추적기법을 분석하여 PKI(Public Key Infrastructure)기반에서 구현 가능하도록 프로토콜을 재구성하고, 그 안전성을 분석한다. 그리고 변형된 Signcryption을 이용한 프로토콜을 제안하여 기존의 유사 프로토콜과 비교·분석하여 제안된 프로토콜이 더욱 효율적임을 보인다.

  • PDF

A Security Architecture for ID-Based Cryptographic Schemes in Ad Hoc Networks (Ad Hoc 네트워크에서 신원기반 암호기법을 위한 보안구조 설계)

  • Park Young-Ho;Rhee Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.7
    • /
    • pp.974-987
    • /
    • 2005
  • As the ad hoc networks have been received a great deal of attention to not only the military but also the industry applications, some security mechanisms are required for implementing a practical ad hoc application. In this paper, we propose a security architecture in ad hoc networks for the purpose of supporting ID-based public key cryptosystems because of the advantage that ID-based schemes require less complex infrastructure compared with the traditional public key cryptosystems. We assume a trusted key generation center which only issues a private key derived from IDs of every nodes in the system setup phase, and use NIL(Node ID List) and NRL(Node Revocation List) in order to distribute the information about IDs used as public keys in our system. Furthermore, we propose a collaborative status checking mechanism that is performed by nodes themselves not by a central server in ad-hoc network to check the validity of the IDs.

  • PDF

무선 PKI 환경에서 사용 가능한 사용자 보안 모듈의 개발 동향과 향후 전망

  • Kwak, Jin;Lee, Seung-Woo;Oh, Soo-Hyun;Won, Dong-Ho
    • Review of KIISC
    • /
    • v.12 no.5
    • /
    • pp.36-49
    • /
    • 2002
  • 최근 이동통신 기술의 발전으로 이동통신 서비스의 발전과 함께 휴대폰과 노트북, PDA(Personal Digital Assistance)를 이용하여 무선 인터넷 이용자가 증가하고 있다. 또한 이를 이용한 뱅킹 서비스, 주식 거래, 온라인 쇼핑 등의 전자상거래가 급속하게 발전하고 있다. 그러므로 무선 인터넷 환경에서 안전한 서비스를 제공하기 위해 유선 인터넷 환경에서와 같은 보안 서비스를 제공할 수 있는 무선 PKI(WPKI:Wireless Public Key Infrastructure)의 필요성이 대두되고 있다. 그러나 무선 인터넷 환경이 갖는 특수성과 사용하는 단말기의 제약 사항들로 인해 유선 인터넷 환경과는 달리 여러 문제점들이 있다. 이러한 무선 인터넷 환경에서의 문제점들을 해결하기 위해 사용자가 쉽게 사용할 수 있는 보안모듈의 필요성이 대두되었다. 현재 대표적인 보안 모듈로는 스마트 카드 방식과 USB 기반 방식이 있으며, 본 고에서는 각 방식들에 관한 관련표준과 최근 제품 동향에 대해 언급하고, 사용자 보안 모듈의 향후 전망에 대하여 살펴보도록 한다.