안전한 통신채널 확보를 위한 혼합형 인증알고리즘에 관한 연구

A Study on Hybird Authentication Algorithm for Security Channel Retention

  • 이선근 (원광대학교 전기전자및정보공학부) ;
  • 김환용 (원광대학교 전기전자및정보공학부)
  • Lee Seon-Keun (Department of Electrical Electronic and Information Engineering, Won-kwang University) ;
  • Kim Hwan-Yong (Department of Electrical Electronic and Information Engineering, Won-kwang University)
  • 발행 : 2006.02.01

초록

대칭형 암호알고리즘은 고속의 데이터 처리 및 구현상의 용이성 둥의 장점에도 불구하고 인증기능의 부재로 인하여 네트워크 환경에는 부적합하다. 그러므로 대칭형 암호알고리즘이 인증기능을 수행할 수 있도록 MAC와 MDC를 이용한 혼합형 인증알고리즘을 제안하였다. 제안된 알고리즘은 대칭형 암호알고리즘과 별개로 동작하는 것이 아니라 암호알고리즘 자체에 인증기능을 수행할 수 있도록 함으로서 보안이 확보된 통신채널의 범위를 넓힐 수 있도록 하였다.

Symmetric cryptographic algorithm is incongruent in network environment by absence of authencation in spite of advantage of easy etc. on data processing and implementation of high speed. Therefore, proposed merging style authentication algorithm that use MAC and MDC so that symmetric cryptographic algorithm can achieve authentication. Proposed algorithm made security can wide of secure communication channel as to achieve authentication to cryptographic algerian itself not that act independently of symmetric cryptographic algorithm.

키워드

참고문헌

  1. R. Anderson, 'The classification of hash functions', P. G. Farrell, editor, Codes and Cyphers: Cryptography and Coding IV, Institute of Mathematics & Its Applications, pp. 83-93, 1995
  2. I. B. Damgard, 'Collision free hash functions and public key signature schemes', Advances in Cryptology-EUROCRYPT'87, LNCS, vol. 304, pp. 203-216, 1988
  3. B. Preneel, 'Cryptographic hash functions', European Transactions on Telecommunications, vol. 5, pp. 431-448, 1994 https://doi.org/10.1002/ett.4460050406
  4. R. C. Merkle, 'One way hash functions and DES', Advances in Cryptology-CRYPTO'89, LNCS, Vol. 435, pp. 428-446, 1990
  5. H. Dobbertin, 'Cryptanalysis of MD-4', D. Gollmann, editor, Fast Software Encryption, Third International Workshop, LNCS, vol. 1039, pp. 71-82, Springer-Verlag, 1996
  6. M. J. Bach, 'The design of the UNIX operating system', ISBN 0-13-201799-7 or ISBN 0-13201757-1 (international ed.). Prentice-Hall 1986.
  7. J. J. Bae and T. Suda, 'Survey of Traffic Control Schemes and Protocols in ATM Networks', IEEE vol. 79, no. 2. February 1991 https://doi.org/10.1109/5.64405
  8. Colella, Callon, Gardner & Rekhter, 'Guidelines for OSI NSAP Allocation in the Internet', RFC 1629, IETF May 1994
  9. ATM Forum, 'LAN Emulation Over ATM Version 1.0', af-lane-0021.000, January 1995
  10. ATM Forum, 'ATM User Network Interface (UNI) Specification Version 3.1', ISBN 0-13393828-X, Prentice Hall, Englewood Cliffs, NJ, June 1995
  11. M. W. Garrett, 'A Service Architecture for ATM: From Applications to Scheduling', IEEE Network May/June 1996 https://doi.org/10.1109/65.494557
  12. G. C. Sacket and C. Y. Metz, 'ATM and Multiprotocol Networking', ISBN 0-07-057724-2, McGraw-Hill 1997