Mobile Network Security Technology Research Center Kyungpook National University



Similar documents
Table of Contents. Bibliografische Informationen digitalisiert durch

CRYPTOG NETWORK SECURITY

CRYPTOGRAPHY AND NETWORK SECURITY

EXAM questions for the course TTM Information Security May Part 1

Public Key Cryptography. Performance Comparison and Benchmarking

Information Security and Cryptography

Efficient Unlinkable Secret Handshakes for Anonymous Communications

Educational Requirement Analysis for Information Security Professionals in Korea

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Single Sign-On Secure Authentication Password Mechanism

Wireless Mobile Internet Security. 2nd Edition

e-code Academy Information Security Diploma Training Discerption

CS 5490/6490: Network Security Fall 2015

Remote Monitoring and Controlling System Based on ZigBee Networks

Lecture VII : Public Key Infrastructure (PKI)

Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor

Dept. of Financial Information Security

United States Trustee Program s Wireless LAN Security Checklist

A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications

Certificate Based Signature Schemes without Pairings or Random Oracles

Securing Internet Gateway Discovery Protocol in Ubiquitous Wireless Internet Access Networks

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme

Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security

Cryptography and Network Security Chapter 9

Mobile Office Security Requirements for the Mobile Office

The Journal of Systems and Software

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Fast Device Discovery for Remote Device Management in Lighting Control Networks

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Evaluation of Digital Signature Process

CRYPTOGRAPHY IN NETWORK SECURITY

Recommended Wireless Local Area Network Architecture

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks

CompTIA Network+ (Exam N10-005)

VALLIAMMAI ENGINEERING COLLEGE

CS 758: Cryptography / Network Security

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks

Design and Implementation of Automatic Attendance Check System Using BLE Beacon

Chapter 10. Network Security

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.

The Mathematics of the RSA Public-Key Cryptosystem

Wireless Technology Seminar

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION

What is a Smart Card?

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

Software Tool for Implementing RSA Algorithm

CIS 5371 Cryptography. 8. Encryption --

ETHERNET ENCRYPTION MODES TECHNICAL-PAPER

Cryptography. Debiao He. School of Mathematics and Statistics, Wuhan University, Wuhan, People s Republic of China. hedebiao@163.

C U R R I C U L U M V I T A E T R I V A N L E

CrypTool Claudia Eckert / Thorsten Clausius Bernd Esslinger / Jörg Schneider / Henrik Koy

Cryptography and Network Security

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

Anonymous ID-based Group Key Agreement for Wireless Networks

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Government Information Security System with ITS Product Pre-qualification

VoIP Security. Seminar: Cryptography and Security Michael Muncan

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder

Securing MANET Using Diffie Hellman Digital Signature Scheme

Core Courses Seminar (0-2) Non-credit Ph.D. Thesis (0-1) Non-credit Special Studies (8-0) Non-credit. Elective Courses

Strengthen RFID Tags Security Using New Data Structure

A New Security Protocol Using Hybrid Cryptography Algorithms

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

IT Networks & Security CERT Luncheon Series: Cryptography

Linux Access Point and IPSec Bridge

Bachelor of Information Technology (Network Security)

Build Your Own Security Lab

, ) I Transport Layer Security

Bit Chat: A Peer-to-Peer Instant Messenger

Cryptographic Hash Functions Message Authentication Digital Signatures

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

A Layered Signcryption Model for Secure Cloud System Communication

Secret Sharing based on XOR for Efficient Data Recovery in Cloud

A Road Map on Security Deliverables for Mobile Cloud Application

Cryptography and network security CNET4523

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Signature Amortization Technique for Authenticating Delay Sensitive Stream

Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10

Graduation Project Ideas Proposed By Faculty Members Department of Communication and Networks

Introduction to Cyber Security / Information Security

Secure SCTP against DoS Attacks in Wireless Internet

Home Gateway Enabling Evolution of Network Services

Foundation University, Islamabad, Pakistan

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Network Security Essentials:

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

Wireless Network Security Issues

A SOFTWARE COMPARISON OF RSA AND ECC

A Model-based Methodology for Developing Secure VoIP Systems

BUY ONLINE FROM:

Security design for a new local area Network AULWLAN

Weighted Total Mark. Weighted Exam Mark

Transcription:

The sprit of Truth, Pride, and Service Mobile Network Security Technology Research Center Kyungpook National University June 2006

History June, 2000 August, 2000 Applied for the University Information and Telecommunication Research Center (ITRC) Promotion and Support Project sponsored by the Ministry of Information and Communication. Selected as an information and telecommunication research center (ITRC) in the network. Named to Mobile Network Security Technology Research Center (MSRC) July, 2002 Presented the 2 nd research report to KIPA (Korean IT Industry Promotion Agency) Evaluated and approved as a competitive ITRC September, 2004 Selected as 2 nd stage ITRC and extension of the period of project 2/16

Organization of this center Director of the center (Prof. Moon) Project part 1 (KNU : Prof. Moon) Project part 2 (Postech : Prof. Lee) Project part 3 (KNU : Prof. Kim) Hybrid physical attack and countermeasures development for cryptographic algorithm Development of cryptographic mechanism for ad-hoc network and sensor network Development of security platform for interlocking with heterogeneous devices in ubiquitous network Development of key management authentication protocol in ubiquitous network Research for an ID based cryptosystem in small group Study of SCTP and development of security technology for mobile terminals Study of link cryptosystem with low-power and high-speed for sensor network Development of security foundation in ubiquitous environment Study of link cryptosystem with low-power and high-speed for sensor network 3/16

International, domestic and Industrial Collaboration 4/16

Research Facilities 9 rooms with 471.24m 2 in Kyungpook National University All rooms are equipped with 100Mbps LAN World-level environment for experiment 5/16

Participants Participant 2000.8 ~ 2003.7 Number (per year) 2003.8 ~2004.7 2004.9 ~ now Professor 11 12 11 Graduate MS 34 39 29 student Ph.D. 19 25 19 Total 64 76 59 6/16

Research Results 2000. 8 ~ 2003. 7 2004. 9 ~ now SCI 85 82 Paper Non SCI 66 33 Domestic 336 59 Applied 19(4) 10 Patent Registered (international) 18(1) 8(2) International Collaboration Industrial Collaboration 4 nations 14 company 5 nations 11 company 7/16

International Research - 1 Side-Channel Attack LCIS, NCU(National Central University), Taiwan Differential Power Analysis on Block Cipher ARIA, HPCC 2005 Power analysis by expoliting chosen message and internal collisions, Mycrypt 2005 Improvement on Ha-Moon randomized Exponentiation Algorithm, ICISC 2004 RSA speedup with chinese remainder theorem immune against Hardware Fault Cryptanalysis, IEEE, Trans. 2003... 8/16

International Research - 2 Stream Cipher (LILI-II) ISRI, QUT(Queensland University of Technology), Australia Dragon : A Fast Word Based Stream Cipher, ICISC 2004 Efficient & secure word based ciphers for mobile application, submitted to SAC 2004 through international collaboration... 9/16

International Research - 3 Digital signature and its applications ICSD, IIR (Institute for Infocomm Research), Singapore An Improved Double Auction Protocol against Fase Bids, TrustBus 2005 A Robust Double Auction Protocol based on a Hybrid Trust Model, ICISS 2005 Security Analysis of Two Signcryption Schemes, ICS 2004... 10/16

International Research - 4 Security Analysis and Design of Ubiquitous Network Security Protocol Xidian Univ., China On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan, ACNS 2006 Security extension for the Canetti-Krawczyk moddel in identitybased systems, Science in China, Series F... 11/16

Research Institute Collaboration ETRI (Electronics and Telecommunications Research Institute) Analysis of RFID system KISA (Korea Information Security Agency) Analysis of Side-channel attack NSRI (National Security Research Institute) Hybrid Analysis Attacks USB Interface 12/16

Industrial Collaboration Samsung Electronics Side-channel attack N-LINE SYSTEM Security solution through user certification (MaGer-PKI) REDGATE Secure OS CentaVision Intrusion Control System (FireWall + IPS +QOS) JEMI InterMediaTech Java Engineering for Multimedia NADSOFT Online-right protection solution DigitalHomenet Home network & Java application 13/16

Main publications (Recent two years) Project part 1 [Development of air-interface access security in ubiquitous network] IEICE Trans. Fundamental (2006) An Attack on the Identity based Key Agreement Protocols in Multiple PKG Environment MADNES 2005 How to Generate Universally Verifiable Signatures in Ad-Hoc Networks HPCC 2005 Differential Power Analysis on Block Cipher ARIA A CRT-Based RSA Countermeasure against Physical Cryptanalysis ICISC 2004 Improvement on Ha-Moon Randomized Exponentiation Algorithm Dragon : A Fast Word Based Stream Cipher ISC 2004 Security Analysis of Two Signcryption Schemes 14/16

Main publications (Recent two years) Project part 2 [Development network security technology for ubiquitous network] ISPEC 2006 Efficient Public Key Broadcast Encryption using Identifier of Receivers Applied Mathematics and Computation (2005) Supersingular hyperelliptic curves of genus 2 over finite fields Efficient identity- based authenticated key agreement protocol from pairings ICISC 2004 Separable Implicit Certificate Revocation New Power Analysis on the Ha-Moon Algorithm and the MIST algorithm ACISP 2004 Fast algorithms for securing elliptic scalar multiplication against side-channel attacks Generic Construction of Certificateless Signature TTS without Revocation Capability Secure against CCA2 15/16

Main publications (Recent two years) Project part 3 [Development of mobile terminal security management in ubiquitous network] IEICE Trans. Communications (2006) Cryptanalysis of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks IEE Proceeding- Circuits, Devices and Systems (2005) Low-power exponent architecture in finite fields Digital-serial AB2 Systolic architecture in GF (2 M ) EUC 2005 A Study on fast JCVM with new transaction mechanism and Caching-Buffer based on Java Card Objects with a high The research on how to reduce the number of EEPROM writing to improve speed of Java Card ICIC 2005 Performance Comparison of SCTP and TCP over Linux Platform Analysis of SCTP Handover by Movement Patterns 16/16