• Title/Summary/Keyword: PKI(Public Key Infrastructure)

Search Result 182, Processing Time 0.034 seconds

A Study on a Message Recovery Signature based on Elliptic Curves for Wireless Environment ("무선 환경에 적합한 타원곡전상의 복원형 전자서명에 관한 연구")

  • Kim, Keun-Ok;Ahn, Sang-Man;Oh, Soo-Hyun;Won, Dong-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.917-920
    • /
    • 2002
  • PKI(Public Key Infrastructure)의 발달과 함께 전자서명의 필요성 또한 대두되고 있다. 전자서명이 무선 PKI환경에서도 사용되기 위해서는 최소한의 서명 생성 검증 시간과 적은 저장 공간, 적은 대역폭의 사용 등의 조건을 만족해야 한다. 본 논문에서는 서명 생성 검증 시간을 줄여주기 위해서 타원곡선 상의 연산을 이용하고, 대역폭의 감소를 위해서 서명의 크기를 최소화해서 보내줄 수 있는 복원형 전자서명에 대해서 알아볼 것이다.

  • PDF

Biometric Certificate on Secure Group Communication

  • Han, Kun-Hee
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.25-29
    • /
    • 2014
  • Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consist of knowledge-based and token-based methods. One of the token-based methods is a X.509 certificate, which is used under a Public Key Infrastructure (PKI); it is the most well-known authentication system in a distributed network environment. However, it has a well-known weakness, which only proves the belonging of a certificate. PKI cannot assure identity of a person. The conventional knowledge-based and token-based methods do not really provide positive personal identification because they rely on surrogate representations of the person's identity. Therefore, I propose a secure X.509 certificate with biometric information to assure the identity of the person who uses the X.509 certificate in a distributed computing environment.

  • PDF

Design and Implementation of the System Supporting Security Communication between a Web Browser and a CGI Program (웹 브라우져와 CGI 프로그램 사이의 보안 통신을 지원하는 시스템 설계 및 구현)

  • Lee, Jun-Seok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.641-653
    • /
    • 1999
  • The paper is design and implementation of the system to support security communication between a Web Browser and a CGI program by a Web Server using PKI(Public Key Infrastructure. This system uses GSS(Generic Security Service)-API to communicate with PKI, offers a Web user a Client Proxy, and offers a CGI developer there library functions related with security. TLS(Transport Layer Security) supports security communication between a Web Browser and a Web Server, but the system supports security communication between a Web Browser and a CGI program as the protected data received from a Client Proxy are sent to a CGI program, and the CGI program decrypts the data using the library functions supported by this system.

  • PDF

A Study on Single Authentication Service through Inter-working in Extranet Environments (익스트라넷 환경에서 상호 연동을 통한 단일 인증 서비스에 대한 연구)

  • 손태식;이건희;유정각;이규호;박종운;김동규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.721-723
    • /
    • 2001
  • 익스트라넷 환경에서는 인트라넷 환경에서 고려되는 보안 문제는 물론이고, 이와 함께 익스트라넷 환경 내의 여러조직사이에 공유되는 자원의 관리 및 사용자에 대한 접근 제어에 있어 많은 문제를 가지고 있다. 본 논문에서는 익스트라넷 환경에서의 보안 문제를 해결하기 위해 익스트라넷 내부의 여러 도메인을 PKI(Public Key Infrastructure)를 기반으로 상호 연동하는 방안을 제안한다. 또한 상호 연동된 여러 도메인 사이의 상호 인증을 통해 익스트라넷 사용자에 대한 단일 인증 서비스를 제공하는 방안을 제안한다. 각 도메인 내부에는 도메인의 사용자 정보를 가지고 있는 사용자 관리 서버를 두고, 이 사용자 관리 서버에서는 사용자에 대한 인증과 응용 서버에 접근하여 응용 서비스를 제공받을 수 있는 서비스 티켓을 발급한다. 사용자 관리 서버에서 부여된 권한 정보가 담긴 서비스 티켓을 통하여 각 응용 서버는 응용 서버 자신의 보안 정책에 맞는 권한 속성을 접근하는 사용자에게 부여한다. 따라서 사용자의 인증은 PKI 기반으로 상호 연동되어 있는 도메인내의 사용자 관리 서버에서 한번 이루어지며 이때 발급한 서비스 티켓의 권한 정보를 통하여 사용자는 권한에 맞는 권한 속성에 따라 응용 서비스를 각 응용 서버에서 독립적으로 제공받을 수 있다.

  • PDF

Design of AOD System based on PKI for e-Commerce (전자상거래를 위한 공개키 기반 AOD 시스템의 설계)

  • 김영준;이윤정;박남섭;이병래;김태윤
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.658-660
    • /
    • 2001
  • 최근 초고속 통신망을 이용한 인터넷의 대중화와 더불어 인터넷을 기반으로 하는 전자상거래가 활발해지고 있다. 특히 인터넷을 통한MP3 데이터 등의 멀티미디어 컨텐츠의 유통은 많은 연구의 대상이 되고 있다. 하지만 기존의 AOD(Audio On Demand) 시스템들은 실질 적인 불법복제방지와 저작권 보호에 미흡한 단점이 있다. 따라서 본 논문에서는 공개키 기반 구조(PKI: Public Key Infrastructure)[1,2]에 기초하여 실질적인 불법복제방지와 저작권을 보호하는 AOD 시스템을 제안한다. 제안된 기법은 사용자의 공개키를 이용하여 MP3 데 이터를 전송함으로써 전송 도중 제 3자로부터의 공격에 대응할 수 있고, 정당한사용자 외에는 MP3 데이터를 사용하지 못하도록 함으로써 사용자와 판매자의 권리를 보장한다.

  • PDF

Design and Implementation of Web-based Electronic Bidding System using XML (웹 기반의 XML을 활용한 전자 입찰 시스템의 설계 및 구현)

  • 윤선희
    • The Journal of Information Systems
    • /
    • v.10 no.1
    • /
    • pp.127-146
    • /
    • 2001
  • The area of business applications in the internet are extended enormously in result of fast development of computing and communication technologies, increase of internet use, and use of intranet/extranet in enterprise information system. Widely spread the use of the internet, there are various applications for Business to Business (B to B) or Business to Customer(B to C) model that are based on the intranet or extranet. This paper designed and implemented the Web-based Electronic Bidding System for Business to Business (B to B) model. The technical issues of electronic bidding system in the internet are involved in the connection between web client and server, electronic data interchange for the contract document, and security solution during the bidding and contracting processes. The web-based electronic bidding system in this paper is implemented using Java applet and servlet as a connection interface for web client and server, XML/EDI-based documents for a bid and a contract, and bidding server and notary server for enhancing the security using PKI(Public Key Infrastructure)-based public key cryptography, digital signature and Certification Authority(CA).

  • PDF

An Improved Authentication Protocol in Vehicular Ad-hoc Networks using Certificateless Signature (Certificateless 서명기법을 이용한 Vehicular Ad-hoc 네트워크에서 향상된 인증프로토콜)

  • Jung, Chae-Duk;Sur, Chul;Park, Sang-Woo;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.3
    • /
    • pp.507-513
    • /
    • 2007
  • In this paper, we propose an efficient authentication protocol based on certificateless signature scheme, which does not need anyinfrastructure to deal with certification of public keys, among the vehicles in Vehicular Ad-hoc Networks. Moreover, due to the characteristicsof VANET nodes (i.e., vehicles) that is fast and movement, the proposed protocol introduces the concept of interval signing key to overcome efficiently the problem of certificate revocation in traditional Public Key Infrastructure(PKI).

Identity-based Deniable Authenticated Encryption for E-voting Systems

  • Jin, Chunhua;Chen, Guanhua;Zhao, Jianyang;Gao, Shangbing;Yu, Changhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3299-3315
    • /
    • 2019
  • Deniable authentication (DA) is a protocol in which a receiver can generate an authenticator that is probabilistically indistinguishable from a sender. DA can be applied in many scenarios that require user privacy protection. To enhance the security of DA, in this paper, we construct a new deniable authenticated encryption (DAE) scheme that realizes deniable authentication and confidentiality in a logical single step. Compared with existing approaches, our approach provides proof of security and is efficient in terms of performance analysis. Our scheme is in an identity-based environment; thus, it avoids the public key certificate-based public key infrastructure (PKI). Moreover, we provide an example that shows that our protocol is applicable for e-voting systems.

Secure Key Exchange Protocols against Leakage of Long-tenn Private Keys for Financial Security Servers (금융 보안 서버의 개인키 유출 사고에 안전한 키 교환 프로토콜)

  • Kim, Seon-Jong;Kwon, Jeong-Ok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.119-131
    • /
    • 2009
  • The world's widely used key exchange protocols are open cryptographic communication protocols, such as TLS/SSL, whereas in the financial field in Korea, key exchange protocols developed by industrial classification group have been used that are based on PKI(Public Key Infrastructure) which is suitable for the financial environments of Korea. However, the key exchange protocols are not only vulnerable to client impersonation attacks and known-key attacks, but also do not provide forward secrecy. Especially, an attacker with the private keys of the financial security server can easily get an old session-key that can decrypt the encrypted messages between the clients and the server. The exposure of the server's private keys by internal management problems, etc, results in a huge problem, such as exposure of a lot of private information and financial information of clients. In this paper, we analyze the weaknesses of the cryptographic communication protocols in use in Korea. We then propose two key exchange protocols which reduce the replacement cost of protocols and are also secure against client impersonation attacks and session-key and private key reveal attacks. The forward secrecy of the second protocol is reduced to the HDH(Hash Diffie-Hellman) problem.

Single Sing-On System enabling Mutual Authentication in Multi Domain Environments (다중 도메인 환경에서 상호 인증이 가능한 단일 인증 시스템)

  • 손태식;서정택;윤혁중;이철원;김동규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.5
    • /
    • pp.3-16
    • /
    • 2001
  • With the development of Internet, it is widely spreaded to a Intranet based on Internet technology. Intranet is a private, unique network to share the information of organization such as incorporate, research institute and university. With the increase of Intranet using, Intranet environment is developing into Extranet environment which is connected many Intranet. Currently such Intranet and Extranet environments, above all, it is important to solve security problems which can appear through use of information between domains. Thus, in this paper, we propose SSO(Single Sign-on System) model with authorization management and single sign-on operation, and we extend it to enable mutual authentication through inter-working based on PKI(Public Key Infrastructure) in Extranet environments.