• Title/Summary/Keyword: KCMVP

Search Result 6, Processing Time 0.022 seconds

An Implement TLS Library for KCMVP (KCMVP를 준수하는 TLS Library의 구현)

  • Park, J.P
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.331-334
    • /
    • 2019
  • 본 논문에서는 국내 암호 알고리즘 검증제도(KCMVP)를 준수하는 TLS 1.2 응용 개발 툴(C Libaray)을 개발한다. 국내 암호응용 네트워크 장비들이 암호화용 대칭키를 교환하는 방법으로 대부분 TLS프로토콜을 사용하고 있으나 RFC표준에 국내알고리즘들이 등제 되지 않아 TLS 프로토콜을 사용 할 경우 알고리즘 검증제도를 준수하고 있지 못한 실정이다. 이에 본 논문에서는 TLS 1.2 표준의 cipher spec extension을 이용하여 국산 암호화 알고리즘의 TLS 적용을 구현한다.

  • PDF

Consideration for Including PQC Algorithms in KCMVP Certification (KCMVP 인증 상의 PQC 알고리즘 도입 고려사항)

  • Jimin Park;Sokjoon Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.1189-1190
    • /
    • 2023
  • 양자 컴퓨터가 발전함에 따라 RSA, ECC 등 기존 공개키 암호 알고리즘의 해독 가능성이 점점 커지고 있으며, 이러한 양자 위협에 대응하기 위해 양자 내성을 갖는 암호, 즉 PQC에 관한 연구가 활발하게 이루어지고 있다. 국가·공공기관에서 도입하는 보안 제품에서 암호 기능을 사용시 검증필 암호 모듈 탑재가 필요하지만, 현재 NIST는 표준화 대상 알고리즘만 선정하였을 뿐 국내외 모두 표준화가 완료되지 않아 PQC는 KCMVP 검증대상 암호로 포함되어 있지 않다. 본 논문에서는 KCMVP(국내 암호 모듈 검증 체계)와 PQC의 최근 동향을 알아보고 KCMVP에 PQC알고리즘을 도입할 때의 고려 사항에 대해 분석한다.

Implementation and Analysis Performance of CCM, GCM based ARIA Block CIpher for Korea CMVP. (KCMVP를 위한 MICOM 환경에서의 ARIA-CCM, ARIA-GCM 구현 및 성능분석 비교)

  • Lee, Jae-Hoon;Park, Minha;Hwang, Nu-Ri;Yi, Okyeon;Kim, Kiheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.267-270
    • /
    • 2014
  • As Smart Device research processes, the needs of information security in light devices is increasing. For example, Zigbee provide Information Security by applying $AES-CCM^*$ defined IEEE 802.15.4 standard. However, according to information security law in Korea, only devices with KCMVP certification can be used in government organization and facilities. Therefore, this paper provide a solution to apply ARIA-CCM and ARIA-GCM for KCMVP in reserved field of IEEE 802.15.4 standard. For analyzing performance, we provide the speed test result of ARIA-CCM and ARIA-GCM comparing with $AES-CCM^*$.

  • PDF

Application of C Language Based Cryptographic Module with KCMVP in Java Environment (C언어로 개발된 검증필 암호모듈을 자바환경에서 활용하기 위한 방안)

  • Choi, Hyunduk;Lee, Jaehoon;Yi, Okyeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.398-401
    • /
    • 2014
  • Due to recent arise of cybercrime, importance of cyber security is highlighted more than ever. Korean government has been running Korea Cryptographic Module Validation Program, namely KCMVP, to validate security level of cryptographic modules for public organizations: indeed, many are achieving the validation. According to the program, operating environments for any specific cryptographic module are fixed. In other words, running validated module in other software environment is strictly prohibited. However, this paper asserts that it is possible for a C language based module to operate in Java based environment as long as the module is running on a validated environment. We expect this paper to help saving great amount of money and time for developing another cryptographic modules for the same operating environment. Also, this method will provide an idea for developing faster modules.

  • PDF

Study on the Association between Personal Information Protection Legislation and Information Security Product (개인정보보호 관련 법령의 내용과 보안제품 분포간의 연관성 분석)

  • Kim, Min-Jeong;Lee, Jung Won;Yoo, Jinho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1549-1560
    • /
    • 2015
  • For the past few years, personal information breach incidents, great and small, occurred constantly. Accordingly, the Personal Information Protection related Ordinances are enacted and amended persistently, and the information security products also keep advancing and developing in the same way. There are the certification systems such as Common Criteria Evaluation and Validation(CC) and Korea Cryptographic Module Validation Program(KCMVP) for the information security products. These are also strictly carried out. This paper analyzes and categorizes the 5 Personal Information Protection related Ordinances in the aspects of technical protection measures by using key words. Here are the 5 related ordinances; 'the Personal Information Protection Act', 'the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc', 'the Act on the Protection, Use, Etc, of Location Information', 'the Use and Protection of Credit Information Act', and 'the Electronic Financial Transactions Act.' Moreover, this study analyzes the association between the technical protection measures in the 5 relevant laws and the information security products that are obtaining the CC Evaluation & Validation(CC) and the products that are now produced at KISIA's member companies.

Design and Implementation of High-Speed Software Cryptographic Modules Using GPU (GPU를 활용한 고속 소프트웨어 암호모듈 설계 및 구현)

  • Song, JinGyo;An, SangWoo;Seo, Seog Chung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1279-1289
    • /
    • 2020
  • To securely protect users' sensitive information and national secrets, the importance of cryptographic modules has been emphasized. Currently, many companies and national organizations are actively using cryptographic modules. In Korea, To ensure the security of these cryptographic modules, the cryptographic module has been verified through the Korea Certificate Module Validation Program(KCMVP). Most of the domestic cryptographic modules are CPU-based software (S/W). However, CPU-based cryptographic modules are difficult to use in servers that need to process large amounts of data. In this paper, we propose an S/W cryptographic module that provides a high-speed operation using GPU. We describe the configuration and operation of the S/W cryptographic module using GPU and present the changes in the cryptographic module security requirements by using GPU. In addition, we present the performance improvement compared to the existing CPU S/W cryptographic module. The results of this paper can be used for cryptographic modules that provide cryptography in servers that manage IoT (Internet of Things) or provide cloud computing.