• Title/Summary/Keyword: PKI Certification

Search Result 76, Processing Time 0.026 seconds

Effective Authentication in Mobile Ad Hoc Networks (이동 Ad Hoc 네트워크에서의 효율적인 인증기법에 대한 연구)

  • Ma Yong-Jae;Lee Seung-Chan;Park Gun-Woo;Song Joo-Seok
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.670-673
    • /
    • 2006
  • PKI(Public Key Infrastructure)는 인증, 무결성, 기밀성, 부인봉쇄, 접근통제 등의 보안기능을 일관성 있게 제공해 주는 기술로서, 이동통신과 무선 인터넷의 급속한 성장에 따른 무선 환경에서도 무선 PKI가 보안기능을 제공할 궁극적인 대안으로 여겨지고 있다. 본 연구는 이동 Ad-hoc 네트워크에서 Threshold cryptography를 이용하여 PKI의 기능을 제공할 수 있도록 하였으며, 기존의 연구들과 유사한 수준의 보안성을 가지면서도 CR(Certification Responsible) 노드의 가용성을 높여 네트워크의 성능을 향상 시킬 수 있는 인증 기법을 제시한다.

  • PDF

The Mechanism of Certification Path Validation (PKI의 인증 경로 검증 기술)

  • Kim, Tae-Sung;Kim, Hee-Sun;Roh, Jong-Hyuk;Cho, Yeong-Sub;Jin, Seung-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.931-934
    • /
    • 2001
  • 정보보호 분야의 핵심 기술인 PKI는 전자정부 및 전자상거래 전반의 응용 환경에서 정보보호의 기반구조로서 그 활용의 폭을 더욱 넓혀가고 있다. 이러한 PKI를 기반으로 하는 정보보호 서비스를 수행하기 위하여 반드시 구현되어야 하는 중요 기술 중의 하나인 인증서 검증 기술은 필수 요소임과 동시에 구현 및 수행의 복잡성으로 인해 많은 논의점들이 제기 되어 왔다. 본 논문은 현재 IETF에서 제정한 RFC2459[1] 표준 문서 및 IETF Internet-Draft[2]를 중심으로 인증서 검증 기술에 대하여 살펴보고, 최근 제시된 핫이슈들을 검토하여 인증서검증 기술에 대한 문제점 및 이에 대한 확장 방안 및 응용에 대하여 기술한다.

  • PDF

Analysis of Certification Path Validation Algorithm Related with Policy (정책 관련 인증경로검증 알고리즘 분석)

  • 고규만;송주석
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.249-252
    • /
    • 2001
  • PKI 구축을 위한 노력이 전 세계적으로 진행되고 있는 가운데 PKI의 계층구조 유형에 따라 인증관리 정책, 인증서 형식 등의 서로 다른 PKI 구성요소를 가진 인증기관(CA)들이 각기 다른 곳에 분산되어 있다. 그러므로, 이러한 CA간의 상호인증 서비스를 어떻게 제공할 것인가를 고려해야 할 필요가 있다. 특히 상호인증 서비스를 제공하기 위한 인증정책, 정책매핑, 정책제한의 확장영역은 인증경로의 유효성을 검증할 때 검증의 성공과 실패에 중요한 영향을 미친다. 본 논문은 ITU-T X.509의 인증경로처리과정에서 정책과 관련된 부분을 살펴보고 ITU-T X.509 3rd Edition의 정책관련 문제점들이 ITU-T X.509 4th Edition에서 어떻게 개선되었는지 몇 가지 예를 통하여 제시하고 앞으로 인증경로처리과정이 어떠한 방향으로 확장되고 응용되어야 할지를 기술한다.

  • PDF

Development on the Operating Technique for Delta CRL (델타 CRL 운영 기술 개발)

  • 김락현;엄희정;염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.4
    • /
    • pp.15-27
    • /
    • 2002
  • The purpose of this paper is to present both the specification of delta-CRL and the polices for delta CRL in order to solve the problem involved in issuing and maintaining the certificate revocation lists for the mobile communication network. If the user request to revoke the certificate issued by certification authority, the certification should be revoked and listed up in the certificate revocation list. In general, the certificate revocation list is issued regularly. Therefore PKI application should download the CRL and prove the validity of CRL. The traffic size of the exchanged traffic should be reduced for the mobile communication environment. The result if this paper can be used for the mobile communication various environments to reduce the size of CRL.

A Design of Certificate Password Recovery Using Decentralized Identifier (DID를 사용한 인증서 암호 복구)

  • Kim, Hyeong-uk;Kim, Sang-jin;Kim, Tae-jin;Yu, Hyeong-geun
    • Journal of Venture Innovation
    • /
    • v.2 no.2
    • /
    • pp.21-29
    • /
    • 2019
  • In the public certificate technology commonly used in Korea, users have a cumbersome problem of always resetting when they forget their password. In this paper, as a solution to this problem, we propose a secure authentication certificate password recovery protocol using blockchain, PKI, and DID for distributed storage. DID is a schema for protecting block ID in blockchain system. The private key used in the PKI is configured as a user's biometric, for example, a fingerprint, so that it can completely replace the memory of the complex private key. To this end, based on the FIDO authentication technology that most users currently use on their smartphones, the process of authenticating a user to access data inside the block minimizes the risk of an attacker taking over the data.

Certificate-based SSO Protocol Complying with Web Standard (웹 표준을 준수하는 인증서기반 통합 인증 프로토콜)

  • Yun, Jong Pil;Kim, Jonghyun;Lee, Kwangsu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1466-1477
    • /
    • 2016
  • Public key infrastructure(PKI), principle technology of the certificate, is a security technology providing functions such as identification, non-repudiation, and anti-forgery of electronic documents on the Internet. Our government and financial organizations use PKI authentication using ActiveX to prevent security accident on the Internet service. However, like ActiveX, plug-in technology is vulnerable to security and inconvenience since it is only serviceable to certain browser. Therefore, the research on HTML5 authentication system has been conducted actively. Recently, domestic bank introduced PKI authentication complying with web standard for the first time. However, it still has inconvenience to register a certification on each website because of same origin policy of web storage. This paper proposes the certificate based SSO protocol that complying with web standard to provide user authentication using certificate on several sites by going around same origin policy and its security proof.

A Handover Mechanism for Authenticate Subscriber between inter-network in Mobile WiMAX Environment (Mobile WiMAX 환경에서 인터 네트워크간 가입자를 인증하기 위한 핸드오버 메커니즘)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Kim, Jae-Hong;Park, Gil-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.181-188
    • /
    • 2008
  • Nowadays, WiMAX which provides internet service with a middle and low speed serves more function and is wider than Wi-Fi. While they solve the security risks as subscribers do handover by subscriber's re-certification procedure as the Network range is getting wider, there are more security problems making the problems of electric-power consumption and delay. This paper suggests a handover mechanism which simplify the subscriber's re-certification procedure and prevents a security problem as doing handover for solving the problem of delay and the rate of processing. The mechanism can cooperate with PKI structure to increase flexibility and security and minimize network re-entry procedure or re-certification procedure by providing continual service. As a result. the mechanism's throughput as the number of subscribers is lower than IEEE 802.16e and the mechanism proves that it is secure from the attack of man-in-the-middle and reply as doing handover.

  • PDF

Broadcast Program Distribution System of PKI Certificate-based (PKI 인증서기반 방송 프로그램 유통시스템)

  • Park, Ki-Chul;Lee, Joo-Young;Nam, Je-Ho;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1760-1766
    • /
    • 2009
  • Digital broadcasting and digital CATV and IPTV will continue in the competition, regardless of how the content of the program was broadcast over the Internet distribution and the damage of piracy is also growing. Excellent quality of the content of the digital CATV sales of DVD and high-density storage media because there is no difference in content and quality is the problem of illegal distribution. However, users can record and reuse program in the position of the guaranteed rights, and the purpose of training in fair and illegal recording and distribution needs to be separate from it. In this paper using a digital certificate recorded by the user and the process to ensure the purpose of illegal distribution of pharmaceutical distribution system design and implementation of the program was broadcast.

Design and Implementation of EAI(Enterprise Application Integration) System for Privacy Information (개인정보 보호를 위한 EAI 시스템 설계 및 구현)

  • Kim, Yong Deok;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.1
    • /
    • pp.51-58
    • /
    • 2013
  • This paper describes the design and implementation of the PKI-based EAI system which is used for delivery of sensitive personal information between business systems. For this purpose, we propose a key exchange protocol with some key process : Diffie-Hellman Schema is used to provide forward secrecy, public key-based digital signature is used for EAI Server authentication, data integrity. In addition, in order to minimize the performance impact on the overall EAI systems. The EAI server was designed simply to be used only as a gateway. This paper shows the implementation of Korea public key authentication algorithm standard and a symmetric encryption algorithm for data encryption.

Mobile IP Registration Protocol Using PKI Certificates and CA (PKI 인증서와 CA를 이용한 Mobile IP 등록 프로토콜)

  • Park, Sang-Jun;Hong, Choong-Seon;Lee, Dae-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.863-866
    • /
    • 2001
  • Mobile IP는 호스트의 이동성을 제공하여주는 대표적인 프로토콜이다. 이러한 이동 네트워킹 환경에서 전자상거래를 비롯한 여러 가지 다양한 데이터 서비스가 원활하게 제공되기 위해서는 정보보호 문제가 선결되어야 한다. 본 논문에서는 Mobile IP에서 공개키 기반 인증서와 CA(Certification Authority)를 이용한 Mobile IP 등록 프로토콜을 제안한다. 제안된 프로토콜은 이동 노드(mobile node)의 등록 메시지 인증과 재사용 공격(replay attack)을 방지한 수 있으며, 무선 환경을 고려한 공개키 암호방식을 최소로 사용하도록 제안하였다. 또한, 인증서를 이용한 인증방식으로 에이전트(agent)들과 이동노드간의 직접적인 인증이 이루어지도록 하였다. 제안된 Mobile IP 등록 프로토콜은 시뮬레이션을 통하여 기존에 제안된 공개키 기반의 Mobile IP 등록 프로토콜보다 성능이 우수하다는 것을 확인할 수 있었다.

  • PDF