Introduction of CIST - ISIT Web Index Page

Download Report

Transcript Introduction of CIST - ISIT Web Index Page

Introduction to
Center for Information Security Technologies
Korea University
Dean, Jongin Lim
[email protected]
Contents
 Introduction
 Feature of Center
 Goals and Objectives
 History
 Current Situation
 Organization
 Research Areas
 Members of CIST
 Publications
Introduction (1/2)
 CIST (Center for Information Security Technologies) was
established in August 1999.
 CIST has devoted itself to enhancing the security and
reliability of information circumstances.
 CIST is concentrating on producing specialists in the field
of Information Security.
 Through industrial-educational cooperation programs, and
cooperation programs with foreign agencies, CIST is trying
its best to be the one of the best cryptographic research
centers in the world
Introduction (2/2)
 CIST was selected in 2000 by the Ministry of Information
and Communication as an outstanding academic Institution
for Research in Cryptographic Technologies (ITRC)
 In September 2004, CIST placed first in an ITRC-ranked
evaluation for which it received a pledge of one million US
dollars annually in research support.
 CIST is one body with Korea university’s Graduate School
of Information Security.
Feature of Center (1/2)
 Research on the Cutting-edge Secret Key Cryptosystem
High
Technology
and Cryptographic Protocols
 Technology-oriented Solutions for the Socially-issued
Problems
 Evaluation Technology of Information System (CMVP)
 Information Hiding Technologies
Various
Members
 The Members Majored a Variety of Fields, such as
Mathematics, Computer Science, Electronics, Law…
Feature of Center (2/2)
Connection
with Graduate
School
Collaboration
with Companies
 Foundation of Graduate School of Information Security
in 2001
 Collaboration with about Twenty Governmental and
Private Research Centers last 3 years
Goals and Objectives
To develop core information security technology for the reliable information society
To promote research of security evaluation of the information system
To cultivate a workforce of information security professionals
To contribute to the information security industry through collaborative research
To enhance international competitiveness in the field of information security
History (1/5)
 1986.09 : Began Crypt Lab. of Dept. of Mathematics, Graduate
School, Korea University.
 1993.03 : Began Algorithm Lab. of Dept. of Computer Science,
Graduate School, Korea University
 1999.08 : Founded CIST incorporating Crypt Lab. of Dept. of
Mathematics and Algorithm Lab. of Dept. of Computer Science.
 1999.12 : Held International Conference on Information Security
and Cryptology (ICISC)’99
 2000.03 : Founded the Department of Information Security
 2000.04 : Held Multimedia Contents Information Security
Workshop
 2000.08 : Appointed as ITRC (Information Technology Research
Center)
 2001.03 : Founded the Graduate School of Information Security
History (2/5)
 2002.02 : Held KoreaCrypt ’01
 2002.12 : Held KoreaCrypt ’02
 2003.02 : Held the First Convocation Ceremony
 2003.08 ~ 2004.09 : Dispatched 2 Students to Cryptology
Research Centre at the Indian Statistical Institute in India
 2003.09 ~ 2004.08 : Dispatched 2 Students to International
Research Centers such as COSIC in Belgium
 2003.09 ~ 2004.09 : Dispatched a Student to Institute for
Infocomm Research in Singapore
 2003.10 : Made an agreement “MOU” with Institute for Infocomm
Research in Singapore
History (3/5)
 2003.12 : Held KoreaCrypt ’03
 2004.01 ~ 2005.02 : Dispatched 2 Students to Kyushu Univ. in
Japan
 2004.01 ~ 2005.02 : Dispatched 2 Students to Digital Technology
Center, Minnesota Univ. in USA
 2004.03 : Made an agreement “MOU” with Kyushu Univ. in Japan
 2004.03 ~ 2005.02 : Dispatched a Post. Doctor to International
Research Centers such as COSIC in Belgium
 2004.09 ~ 2005.08 : Dispatched a Post. Doctor to Maryland Univ.
in USA
History (4/5)
 2004.11 : Made an agreement “MOU” with the Kyoto College of
Graduate Studies for Informatics in Japan
 2004.11 : Made an agreement “MOU” with COSIC in Belgium
 2004.12 : Held ICISC ’04
 2005.03 ~ Now : Dispatched a Post. Doctor and a Student to
International Research Centers such as COSIC in Belgium
 2005.03 ~ Now : Dispatched a Post. Doctor to Future universityHakodate in Japan
 2005.03 : Made an agreement “MOU” with Jilin Institute of
Chemical Technology in China
History (5/5)
 2005.08 ~ Now : Dispatched a Student to Institute of
Experimental Physics, Univ. of Vienna in Austria
 2005.11 : Made an agreement “MOU” with Cryptography group,
Department of computer science, Columbia Univ. in USA
 2005.11 ~ Now : Dispatched 2 Students to Cryptography group,
Department of computer science, Columbia Univ. in USA
Current Situation - Organization
Dean
( President)
Management
Committee
Research
Committee
Editorial
Committee
Advisory
Committee
Theory
Laboratory
Symmetric
Key
Public
Key
Quantum
Cryptosystem
Application
Laboratory
Protocol
System
Security
Wireless
Mobile Security
Computer
Forensic
Information
Hiding
CMVP
Policy
Laboratory
PET
Cyber
Law
Symmetric Key Cryptography Lab (1/4)
Block Cipher : Design of secure and efficient block ciphers,
and analysis of the security for known block ciphers.

Plaintext
F
Plaintext
S
S
…
S
Permutation
F
S
S
…
S
…
…
Permutation
F
Ciphertext
< Feistel Structure >
S
S
…
S
Ciphertext
< SPN Structure >
Symmetric Key Cryptography Lab (2/4)
Mode of Operation : Analysis of the security for various
modes of operation, and design of secure modes of operation.

M1
M2
Counter
Counter
E
E
IV
E
E
M1
C1
C2
< CBC Mode >
M2
C1
C2
< CTR Mode >
Symmetric Key Cryptography Lab (3/4)
Stream Cipher : Analysis of the security for various stream
ciphers.

LFSR1
LFSR2
.
.
.
F
Keystream
LFSRn
< Non-linear combining generator >
Symmetric Key Cryptography Lab (4/4)
Hash Function : Study on provable secure hash functions, and
design of secure hash functions.

Pseudorandomness : Study on Pseudorandomness, and design
of pseudorandom functions.

M1
IV
M2
Compress
···
Compress
< Merkle-Damgård hash functions >
Hash value
Public Key Lab (1/2)
PKC related Design and Analysis
 Analysis on the existing cryptographic schemes
 Design of cryptographic schemes and protocols
 Side channel attack
 Development of efficient cryptographic algorithms
 Integer factoring algorithm (GNFS)
Public Key Lab (2/2)
Efficient Implementation
 Efficient cryptographic software library
 Design of efficient hardware architecture
 FPGA hardware implementation
 Efficient countermeasure for side channel attack
Quantum Cryptography Lab

Design and Security Analysis of Quantum Key Distribution Protocol

Design and Security Analysis of Quantum Signature Scheme

Entropy and Entanglement in Quantum Information Theory

Quantum Error Correction

Basic Problems of Quantum Information Theory and Related Topics

Design the Quantum Direct Communication Protocol

Design the Quantum Secret Sharing Protocol
Information Hiding Lab
Original Image
Stego-Image,
which has copyrights
information
Copyrights Information
 Information Hiding Theory
 Steganography, Digital Watermarking
 Digital Right Management
 Fingerprint, Authority Controller Robustly
 Information Hiding Technologies
 Copy-resistant technique of the printed digital file
 Secure steganographic scheme of the still digital images
Information Security Protocol Lab
 Efficient Broadcast Encryption
 Privacy-Enhancing Technologies
 Design and Security-Analysis for Authentication in
RFID Tags
 Authenticated Group Key Exchange (GKE)
 Password-based GKE
 ID-based GKE
 Electronic Payments and Voting
 Cryptographic Protocols using Weil-Pairing
Protocol Lab (1/3)
Electronic Payment
Financial Network
Issuer
Acquirer
Clearing
Flow of Trusted Third Party
money
Withdrawal
Deposit
Payment
Buyer
INTERNET
Seller
Protocol Lab (2/3)
Broadcasting
Contents
Broadcast
decryption key
GC
encryption
브로드캐스트
Broadcasting Message
메세지
s-Session key
E( s )
E(s)
Session block
Members
구성원
m-Contents
Contents
E s ( E(m)
m)
Encryption block
decryption
Protocol Lab (3/3)
Key Exchange
How to share a common session key ?
Insecure Channel
Research
1.Authenticated Key Exchange
- Public Key Setting
- Symmetric Setting
- Three party Setting
- Formal Treatment of security
2. Password-Authenticated Key Exchange
- Client to Client Authentication
- Multi-Server Authentication Model
- Formal Treatment of Security
System & Network Lab
 Neural Network, Pattern
Recognition - NIDS, Internet
Worm
 Network Security - TCP/IP,
Packet analysis
 System Security – Kernel analysis,
Automatic Patch Distribution
Wireless Mobile Security Lab
 Wireless and Mobile Communication Security
Mechanism Study and Development
 3GPP/3GPP2/4G Mobile Communication Security
 IEEE 802.11 WLAN security and Authentication Mechanism
 IEEE 802.15 WPAN (Bluetooth, UWB, Zigbee) Security
 IEEE 802.16 WiBro Security
 Sensor Network Security
 Home Network Access Authentication, Authority and Security
 3GPP-WLAN-WiBro Interworking Security
Secure Hardware Lab
Timing Attack Research about Hardware Module
Power Analysis Research about Hardware Module
Security Chip Design (VHDL Code)
Smart Card Operating System Development
EMV, K-CASH base Electronic Money Development
Forensic Lab


Technology of Acquiring Evidence
Technology of Evidence Analysis

Technology of Network information collection

Computer Forensic Process

Policy of Computer Crime

Data Forensic
Browsing
Imaging
Recover
Data
Forensic
Search
Convert
Repair
Finding
Decrypt
Information Security Policy Lab

Technology-Oriented Policy Development on
Socially-Issued Problems

Response to Spam and Spyware

Cybercrime, Cyber-terrorism and Cyber Forensics

E-Government

Privacy Protection in PKI

Security and Privacy in Ubicomp

Consultation of ISMS
Current Situation - Members of CIST
Ph.D
Profes s or
Doctor Cours e
Mas ter Cours e
40
35
30
25
20
15
10
5
0
Symmetric
Key
Public
Key
Infor.
Hiding
Quantum
Protocol
System
Security
Wireless Computer
Mobile Forensic
Security
Policy
Secure
Hardware
Current Situation - Members of CIST
 Student
Ph. D
Master
 Professor : 13
Course
Degree
awarded
42
103
35
13
 Post Doctor : 2
Completion
a Course
14
80
International Publications
2000~ 2005 Research Results
40
Internatio nal Paper
34
35
30
28
27
25
21
20
15
13
10
8
5
0
2000
2001
2002
2003
2004
2005
2000
2001
2002
2003
2004
2005
International
8
13
21
28
27
34
domestic
10
12
26
41
46
13
Recent Publications (2004 – 2005)

Public Key Cryptosystem (1/2)

Modified Power-Analysis Attacks on XTR and An Efficient
Countermeasure, ICICS'04

Cryptanalysis of the Countermeasures Using Randomized Binary
Signed Digits, ACNS'04

On security of XTR public key cryptosystems against Side
Channel Attacks, ACISP'04

Modified Sequential Normal Basis Multipliers for Type II
Optimal Normal Bases, ICCSA'05

Cryptanalysis of Ha-Moon's Countermeasure of Randomized
Signed Scalar Multiplication, IEICE'05

Side Channel Cryptanalysis on XTR Public Key Cryptosystem,
IEICE'05
Recent Publications (2004 – 2005)

Public Key Cryptosystem (2/2)

A Non-Redundant and Efficient Architecture for KaratsubaOfman Algorithm, ISC'05

An efficient public key cryptosystem with a privacy enhanced
double decryption mechanism, SAC'05

Modified Serial Multipliers for Type-IV Gaussian Normal Bases,
Indocrypt'05

A Fast Inversion Algorithm and Low-Complexity Architecture
over GF(2m), CIS'05
Recent Publications (2004 – 2005)

Symmetric Key Cryptosystem (1/4)

Related key differential attacks on 27 rounds of XTEA and full
rounds of GOST, FSE’04.

Related key differential cryptanalysis of full round SPECTR-H64
and CIKS-1, ACISP’04.

A generalization of PGV-hash functions and security analysis in
black-box model, ACISP’04.

Differential-linear type attacks on reduced rounds of SHACAL-2,
ACISP’04.

The related-key rectangle attack-application to SHACAL-1,
ACISP’04.
Recent Publications (2004 – 2005)

Symmetric Key Cryptosystem (2/4)

On the Pseudorandomness of a Modification of KASUMI type
Permutations , ICISC’04.

Padding Oracle Attacks on Multiple Modes of Operation ,
ICISC’04.

Impossibility of Construction of OWHF and UOWHF from PGV
Model Based on Block Cipher Secure Against ACPCA,
INDOCRYPT’04.

Related-Key Attacks on DDP Based Ciphers: CIKS-128 and
CIKS-128H, INDOCRYPT’04.

Related-Key Attacks on Reduced Rounds of SHACAL-2,
INDOCRYPT’04.
Recent Publications (2004 – 2005)

Symmetric Key Cryptosystem (3/4)

Higher Order Universal One-Way Hash Functions,
ASIACRYPT’04.

Related-Key Rectangle Attacks on Reduced Versions of
SHACAL-1 and AES-192 , FSE’05.

Related-Key Differential Attacks on Cobra-S128, Cobra-F64a,
and Cobra-F64b, MYCRYPT’05 .

A New 256-bit Hash Function DHA-256 – Enhancing the
Security of SHA-256, Cryptographic Hash Workshop by NIST.

A New Dedicated 256-bit Hash Function : Fork-256,
Cryptographic Hash Workshop by NIST.
Recent Publications (2004 – 2005)

Symmetric Key Cryptosystem (4/4)

Related-Key Differential Attacks on Cobra-H64 and Cobra-H128,
CCC’05.

On the Security of Encryption Modes of MD4, MD5 and HAVAL,
ICICS’05.

How to Construct Universal One-way Hash Functions of Order r,
Indocrypt’05.

Information Hiding (1/2)

International Workshop on digital Watermarking 2004.

Steganoraphic Scheme Using a Block Cipher,
International Workshop on digital Watermarking 2004.
Recent Publications (2004 – 2005)

Information Hiding (2/2)

On Security Notions for Steganalysis, ICISC 2004.

Color Cube Aanalysis for Detection of LSB Steganography in
RGB Color Images, ICCSA 2005, LNCS Vol. 3481

New Steganalysis Methodology: LR Cube Analysis for the
Detection of LSB Steganography, 7th Information Hiding
Workshop

Applying LR Cube Analysis to JSteg Detection,
9th IFIP TC-6 TC-11 Conference on Communications and
Multimedia Security

A new watermarking method using statistical property and
quantization, PDCAT 05
Recent Publications (2004 – 2005)

Protocol (1/3)

Constant-Round Authenticated Group Key Exchange for
Dynamic Groups, Asiacrypt 2004

SITIS: Scalable Intrusion Tolerance Middleware for Internet
Service Survivability, PCM 2004

A Dynamic Path Identification Mechanism to Defend Against
DDoS Attacks, ICON 2004

Matching Connection Pairs, PDCAT2004

Efficient Password-Based Group Key Exchange, TrustBus 2004

One-Round Protocols for Two-Party Authenticated Key
Exchange, ACNS 2004
Recent Publications (2004 – 2005)

Protocol (2/3)

Scalable key exchange transformation : from two-party to group
Efficient ID-based Group Key Agreement with Bilinear Maps,
Electronics Letters
Cryptanalysis of Lee-Kim-Yoo password-based key agreement
scheme, Applied Mathmatics and Computation(journal), ELSEVIER
A Key Management Scheme for Commodity Sensor
Networks, International Conference on AD-HOC Networks &
Wireless
Secure Password Pocket for Distributed Web Services, NPC 2005
Generic Transformation for Scalable Broadcast Encryption
Schemes, CRYPTO 2005
Efficient Member Revocation in Group Signature Schemes, TrustBus
05





Recent Publications (2004 – 2005)

Protocol (3/3)

N-party Encrypted Diffie-Hellman Key Exchange Using Different
Password, ACNS 2005
ID-based Authenticated Key Agreement for Low-Power Mobile
Devices, ACISP 2005
Efficient Revocation of Security Capability in Certificateless Public
Key Cryptography, ICNC'05-FSKD'05 special sessions
One-Way Chain Based Broadcast Encryption schemes, EuroCrypt
2005
Efficient Authentication for Low-Cost RFID systems, ICCSA 2005
Fine grained control of security capability and forward security in a
pairing based signature
Secure Index Search for Groups, TrustBus 05






Recent Publications (2004 – 2005)

System & Network (1/2)

A study of the skin contours as the marker of skin againg: Three
dimensional measurement using stereimage concept, 6th
Asia/Ocenia Regional Congress of Gerontology

A 2-D HMM Method for Off-line Handwritten Character
Recognition, International Journal of Pattern Recognition and
Artificial Intelligence

Automated Immunization Against Denial-of-Service

Attacks Featuring Stochastic Packet Inspection, GCC2005

SVM Approach with CTNT to Detect DDoS Attacks in Grid
Computing, GCC2005
Recent Publications (2004 – 2005)

System & Network (2/2)

Reduction method of threat phrases by classifying assetsCall
Tracking and location updating using DHS in mobile networks

Multi-level protection building for virus protection infrastructure

Improved location scheme using circle location register in mobile
networks

Authentication protocol providing user anonymity and
untraceability in wireless mobile systems, Computer Networks
Recent Publications (2004 – 2005)

Secure hardware

Detecting Trapdoors in Smart Cards Using Timing and Power
Analysis, TestCom2005

Computer Forensic

Digital evidence collection process in integrity and memory
information gathering, SADFE 2005

Digital Evidence Integrated Management System, A CNIFIC
2004
Recent Publications (2004 – 2005)

Quantum Cryptosystem

Quantum key distribution among three parties using GHZ states,
Journal of the Physical Society 2004.

Arbitrated quantum signature scheme with message recovery,
Physics Letters 2004.
Thank You!!