Introduction of CIST - ISIT Web Index Page
Download
Report
Transcript Introduction of CIST - ISIT Web Index Page
Introduction to
Center for Information Security Technologies
Korea University
Dean, Jongin Lim
[email protected]
Contents
Introduction
Feature of Center
Goals and Objectives
History
Current Situation
Organization
Research Areas
Members of CIST
Publications
Introduction (1/2)
CIST (Center for Information Security Technologies) was
established in August 1999.
CIST has devoted itself to enhancing the security and
reliability of information circumstances.
CIST is concentrating on producing specialists in the field
of Information Security.
Through industrial-educational cooperation programs, and
cooperation programs with foreign agencies, CIST is trying
its best to be the one of the best cryptographic research
centers in the world
Introduction (2/2)
CIST was selected in 2000 by the Ministry of Information
and Communication as an outstanding academic Institution
for Research in Cryptographic Technologies (ITRC)
In September 2004, CIST placed first in an ITRC-ranked
evaluation for which it received a pledge of one million US
dollars annually in research support.
CIST is one body with Korea university’s Graduate School
of Information Security.
Feature of Center (1/2)
Research on the Cutting-edge Secret Key Cryptosystem
High
Technology
and Cryptographic Protocols
Technology-oriented Solutions for the Socially-issued
Problems
Evaluation Technology of Information System (CMVP)
Information Hiding Technologies
Various
Members
The Members Majored a Variety of Fields, such as
Mathematics, Computer Science, Electronics, Law…
Feature of Center (2/2)
Connection
with Graduate
School
Collaboration
with Companies
Foundation of Graduate School of Information Security
in 2001
Collaboration with about Twenty Governmental and
Private Research Centers last 3 years
Goals and Objectives
To develop core information security technology for the reliable information society
To promote research of security evaluation of the information system
To cultivate a workforce of information security professionals
To contribute to the information security industry through collaborative research
To enhance international competitiveness in the field of information security
History (1/5)
1986.09 : Began Crypt Lab. of Dept. of Mathematics, Graduate
School, Korea University.
1993.03 : Began Algorithm Lab. of Dept. of Computer Science,
Graduate School, Korea University
1999.08 : Founded CIST incorporating Crypt Lab. of Dept. of
Mathematics and Algorithm Lab. of Dept. of Computer Science.
1999.12 : Held International Conference on Information Security
and Cryptology (ICISC)’99
2000.03 : Founded the Department of Information Security
2000.04 : Held Multimedia Contents Information Security
Workshop
2000.08 : Appointed as ITRC (Information Technology Research
Center)
2001.03 : Founded the Graduate School of Information Security
History (2/5)
2002.02 : Held KoreaCrypt ’01
2002.12 : Held KoreaCrypt ’02
2003.02 : Held the First Convocation Ceremony
2003.08 ~ 2004.09 : Dispatched 2 Students to Cryptology
Research Centre at the Indian Statistical Institute in India
2003.09 ~ 2004.08 : Dispatched 2 Students to International
Research Centers such as COSIC in Belgium
2003.09 ~ 2004.09 : Dispatched a Student to Institute for
Infocomm Research in Singapore
2003.10 : Made an agreement “MOU” with Institute for Infocomm
Research in Singapore
History (3/5)
2003.12 : Held KoreaCrypt ’03
2004.01 ~ 2005.02 : Dispatched 2 Students to Kyushu Univ. in
Japan
2004.01 ~ 2005.02 : Dispatched 2 Students to Digital Technology
Center, Minnesota Univ. in USA
2004.03 : Made an agreement “MOU” with Kyushu Univ. in Japan
2004.03 ~ 2005.02 : Dispatched a Post. Doctor to International
Research Centers such as COSIC in Belgium
2004.09 ~ 2005.08 : Dispatched a Post. Doctor to Maryland Univ.
in USA
History (4/5)
2004.11 : Made an agreement “MOU” with the Kyoto College of
Graduate Studies for Informatics in Japan
2004.11 : Made an agreement “MOU” with COSIC in Belgium
2004.12 : Held ICISC ’04
2005.03 ~ Now : Dispatched a Post. Doctor and a Student to
International Research Centers such as COSIC in Belgium
2005.03 ~ Now : Dispatched a Post. Doctor to Future universityHakodate in Japan
2005.03 : Made an agreement “MOU” with Jilin Institute of
Chemical Technology in China
History (5/5)
2005.08 ~ Now : Dispatched a Student to Institute of
Experimental Physics, Univ. of Vienna in Austria
2005.11 : Made an agreement “MOU” with Cryptography group,
Department of computer science, Columbia Univ. in USA
2005.11 ~ Now : Dispatched 2 Students to Cryptography group,
Department of computer science, Columbia Univ. in USA
Current Situation - Organization
Dean
( President)
Management
Committee
Research
Committee
Editorial
Committee
Advisory
Committee
Theory
Laboratory
Symmetric
Key
Public
Key
Quantum
Cryptosystem
Application
Laboratory
Protocol
System
Security
Wireless
Mobile Security
Computer
Forensic
Information
Hiding
CMVP
Policy
Laboratory
PET
Cyber
Law
Symmetric Key Cryptography Lab (1/4)
Block Cipher : Design of secure and efficient block ciphers,
and analysis of the security for known block ciphers.
Plaintext
F
Plaintext
S
S
…
S
Permutation
F
S
S
…
S
…
…
Permutation
F
Ciphertext
< Feistel Structure >
S
S
…
S
Ciphertext
< SPN Structure >
Symmetric Key Cryptography Lab (2/4)
Mode of Operation : Analysis of the security for various
modes of operation, and design of secure modes of operation.
M1
M2
Counter
Counter
E
E
IV
E
E
M1
C1
C2
< CBC Mode >
M2
C1
C2
< CTR Mode >
Symmetric Key Cryptography Lab (3/4)
Stream Cipher : Analysis of the security for various stream
ciphers.
LFSR1
LFSR2
.
.
.
F
Keystream
LFSRn
< Non-linear combining generator >
Symmetric Key Cryptography Lab (4/4)
Hash Function : Study on provable secure hash functions, and
design of secure hash functions.
Pseudorandomness : Study on Pseudorandomness, and design
of pseudorandom functions.
M1
IV
M2
Compress
···
Compress
< Merkle-Damgård hash functions >
Hash value
Public Key Lab (1/2)
PKC related Design and Analysis
Analysis on the existing cryptographic schemes
Design of cryptographic schemes and protocols
Side channel attack
Development of efficient cryptographic algorithms
Integer factoring algorithm (GNFS)
Public Key Lab (2/2)
Efficient Implementation
Efficient cryptographic software library
Design of efficient hardware architecture
FPGA hardware implementation
Efficient countermeasure for side channel attack
Quantum Cryptography Lab
Design and Security Analysis of Quantum Key Distribution Protocol
Design and Security Analysis of Quantum Signature Scheme
Entropy and Entanglement in Quantum Information Theory
Quantum Error Correction
Basic Problems of Quantum Information Theory and Related Topics
Design the Quantum Direct Communication Protocol
Design the Quantum Secret Sharing Protocol
Information Hiding Lab
Original Image
Stego-Image,
which has copyrights
information
Copyrights Information
Information Hiding Theory
Steganography, Digital Watermarking
Digital Right Management
Fingerprint, Authority Controller Robustly
Information Hiding Technologies
Copy-resistant technique of the printed digital file
Secure steganographic scheme of the still digital images
Information Security Protocol Lab
Efficient Broadcast Encryption
Privacy-Enhancing Technologies
Design and Security-Analysis for Authentication in
RFID Tags
Authenticated Group Key Exchange (GKE)
Password-based GKE
ID-based GKE
Electronic Payments and Voting
Cryptographic Protocols using Weil-Pairing
Protocol Lab (1/3)
Electronic Payment
Financial Network
Issuer
Acquirer
Clearing
Flow of Trusted Third Party
money
Withdrawal
Deposit
Payment
Buyer
INTERNET
Seller
Protocol Lab (2/3)
Broadcasting
Contents
Broadcast
decryption key
GC
encryption
브로드캐스트
Broadcasting Message
메세지
s-Session key
E( s )
E(s)
Session block
Members
구성원
m-Contents
Contents
E s ( E(m)
m)
Encryption block
decryption
Protocol Lab (3/3)
Key Exchange
How to share a common session key ?
Insecure Channel
Research
1.Authenticated Key Exchange
- Public Key Setting
- Symmetric Setting
- Three party Setting
- Formal Treatment of security
2. Password-Authenticated Key Exchange
- Client to Client Authentication
- Multi-Server Authentication Model
- Formal Treatment of Security
System & Network Lab
Neural Network, Pattern
Recognition - NIDS, Internet
Worm
Network Security - TCP/IP,
Packet analysis
System Security – Kernel analysis,
Automatic Patch Distribution
Wireless Mobile Security Lab
Wireless and Mobile Communication Security
Mechanism Study and Development
3GPP/3GPP2/4G Mobile Communication Security
IEEE 802.11 WLAN security and Authentication Mechanism
IEEE 802.15 WPAN (Bluetooth, UWB, Zigbee) Security
IEEE 802.16 WiBro Security
Sensor Network Security
Home Network Access Authentication, Authority and Security
3GPP-WLAN-WiBro Interworking Security
Secure Hardware Lab
Timing Attack Research about Hardware Module
Power Analysis Research about Hardware Module
Security Chip Design (VHDL Code)
Smart Card Operating System Development
EMV, K-CASH base Electronic Money Development
Forensic Lab
Technology of Acquiring Evidence
Technology of Evidence Analysis
Technology of Network information collection
Computer Forensic Process
Policy of Computer Crime
Data Forensic
Browsing
Imaging
Recover
Data
Forensic
Search
Convert
Repair
Finding
Decrypt
Information Security Policy Lab
Technology-Oriented Policy Development on
Socially-Issued Problems
Response to Spam and Spyware
Cybercrime, Cyber-terrorism and Cyber Forensics
E-Government
Privacy Protection in PKI
Security and Privacy in Ubicomp
Consultation of ISMS
Current Situation - Members of CIST
Ph.D
Profes s or
Doctor Cours e
Mas ter Cours e
40
35
30
25
20
15
10
5
0
Symmetric
Key
Public
Key
Infor.
Hiding
Quantum
Protocol
System
Security
Wireless Computer
Mobile Forensic
Security
Policy
Secure
Hardware
Current Situation - Members of CIST
Student
Ph. D
Master
Professor : 13
Course
Degree
awarded
42
103
35
13
Post Doctor : 2
Completion
a Course
14
80
International Publications
2000~ 2005 Research Results
40
Internatio nal Paper
34
35
30
28
27
25
21
20
15
13
10
8
5
0
2000
2001
2002
2003
2004
2005
2000
2001
2002
2003
2004
2005
International
8
13
21
28
27
34
domestic
10
12
26
41
46
13
Recent Publications (2004 – 2005)
Public Key Cryptosystem (1/2)
Modified Power-Analysis Attacks on XTR and An Efficient
Countermeasure, ICICS'04
Cryptanalysis of the Countermeasures Using Randomized Binary
Signed Digits, ACNS'04
On security of XTR public key cryptosystems against Side
Channel Attacks, ACISP'04
Modified Sequential Normal Basis Multipliers for Type II
Optimal Normal Bases, ICCSA'05
Cryptanalysis of Ha-Moon's Countermeasure of Randomized
Signed Scalar Multiplication, IEICE'05
Side Channel Cryptanalysis on XTR Public Key Cryptosystem,
IEICE'05
Recent Publications (2004 – 2005)
Public Key Cryptosystem (2/2)
A Non-Redundant and Efficient Architecture for KaratsubaOfman Algorithm, ISC'05
An efficient public key cryptosystem with a privacy enhanced
double decryption mechanism, SAC'05
Modified Serial Multipliers for Type-IV Gaussian Normal Bases,
Indocrypt'05
A Fast Inversion Algorithm and Low-Complexity Architecture
over GF(2m), CIS'05
Recent Publications (2004 – 2005)
Symmetric Key Cryptosystem (1/4)
Related key differential attacks on 27 rounds of XTEA and full
rounds of GOST, FSE’04.
Related key differential cryptanalysis of full round SPECTR-H64
and CIKS-1, ACISP’04.
A generalization of PGV-hash functions and security analysis in
black-box model, ACISP’04.
Differential-linear type attacks on reduced rounds of SHACAL-2,
ACISP’04.
The related-key rectangle attack-application to SHACAL-1,
ACISP’04.
Recent Publications (2004 – 2005)
Symmetric Key Cryptosystem (2/4)
On the Pseudorandomness of a Modification of KASUMI type
Permutations , ICISC’04.
Padding Oracle Attacks on Multiple Modes of Operation ,
ICISC’04.
Impossibility of Construction of OWHF and UOWHF from PGV
Model Based on Block Cipher Secure Against ACPCA,
INDOCRYPT’04.
Related-Key Attacks on DDP Based Ciphers: CIKS-128 and
CIKS-128H, INDOCRYPT’04.
Related-Key Attacks on Reduced Rounds of SHACAL-2,
INDOCRYPT’04.
Recent Publications (2004 – 2005)
Symmetric Key Cryptosystem (3/4)
Higher Order Universal One-Way Hash Functions,
ASIACRYPT’04.
Related-Key Rectangle Attacks on Reduced Versions of
SHACAL-1 and AES-192 , FSE’05.
Related-Key Differential Attacks on Cobra-S128, Cobra-F64a,
and Cobra-F64b, MYCRYPT’05 .
A New 256-bit Hash Function DHA-256 – Enhancing the
Security of SHA-256, Cryptographic Hash Workshop by NIST.
A New Dedicated 256-bit Hash Function : Fork-256,
Cryptographic Hash Workshop by NIST.
Recent Publications (2004 – 2005)
Symmetric Key Cryptosystem (4/4)
Related-Key Differential Attacks on Cobra-H64 and Cobra-H128,
CCC’05.
On the Security of Encryption Modes of MD4, MD5 and HAVAL,
ICICS’05.
How to Construct Universal One-way Hash Functions of Order r,
Indocrypt’05.
Information Hiding (1/2)
International Workshop on digital Watermarking 2004.
Steganoraphic Scheme Using a Block Cipher,
International Workshop on digital Watermarking 2004.
Recent Publications (2004 – 2005)
Information Hiding (2/2)
On Security Notions for Steganalysis, ICISC 2004.
Color Cube Aanalysis for Detection of LSB Steganography in
RGB Color Images, ICCSA 2005, LNCS Vol. 3481
New Steganalysis Methodology: LR Cube Analysis for the
Detection of LSB Steganography, 7th Information Hiding
Workshop
Applying LR Cube Analysis to JSteg Detection,
9th IFIP TC-6 TC-11 Conference on Communications and
Multimedia Security
A new watermarking method using statistical property and
quantization, PDCAT 05
Recent Publications (2004 – 2005)
Protocol (1/3)
Constant-Round Authenticated Group Key Exchange for
Dynamic Groups, Asiacrypt 2004
SITIS: Scalable Intrusion Tolerance Middleware for Internet
Service Survivability, PCM 2004
A Dynamic Path Identification Mechanism to Defend Against
DDoS Attacks, ICON 2004
Matching Connection Pairs, PDCAT2004
Efficient Password-Based Group Key Exchange, TrustBus 2004
One-Round Protocols for Two-Party Authenticated Key
Exchange, ACNS 2004
Recent Publications (2004 – 2005)
Protocol (2/3)
Scalable key exchange transformation : from two-party to group
Efficient ID-based Group Key Agreement with Bilinear Maps,
Electronics Letters
Cryptanalysis of Lee-Kim-Yoo password-based key agreement
scheme, Applied Mathmatics and Computation(journal), ELSEVIER
A Key Management Scheme for Commodity Sensor
Networks, International Conference on AD-HOC Networks &
Wireless
Secure Password Pocket for Distributed Web Services, NPC 2005
Generic Transformation for Scalable Broadcast Encryption
Schemes, CRYPTO 2005
Efficient Member Revocation in Group Signature Schemes, TrustBus
05
Recent Publications (2004 – 2005)
Protocol (3/3)
N-party Encrypted Diffie-Hellman Key Exchange Using Different
Password, ACNS 2005
ID-based Authenticated Key Agreement for Low-Power Mobile
Devices, ACISP 2005
Efficient Revocation of Security Capability in Certificateless Public
Key Cryptography, ICNC'05-FSKD'05 special sessions
One-Way Chain Based Broadcast Encryption schemes, EuroCrypt
2005
Efficient Authentication for Low-Cost RFID systems, ICCSA 2005
Fine grained control of security capability and forward security in a
pairing based signature
Secure Index Search for Groups, TrustBus 05
Recent Publications (2004 – 2005)
System & Network (1/2)
A study of the skin contours as the marker of skin againg: Three
dimensional measurement using stereimage concept, 6th
Asia/Ocenia Regional Congress of Gerontology
A 2-D HMM Method for Off-line Handwritten Character
Recognition, International Journal of Pattern Recognition and
Artificial Intelligence
Automated Immunization Against Denial-of-Service
Attacks Featuring Stochastic Packet Inspection, GCC2005
SVM Approach with CTNT to Detect DDoS Attacks in Grid
Computing, GCC2005
Recent Publications (2004 – 2005)
System & Network (2/2)
Reduction method of threat phrases by classifying assetsCall
Tracking and location updating using DHS in mobile networks
Multi-level protection building for virus protection infrastructure
Improved location scheme using circle location register in mobile
networks
Authentication protocol providing user anonymity and
untraceability in wireless mobile systems, Computer Networks
Recent Publications (2004 – 2005)
Secure hardware
Detecting Trapdoors in Smart Cards Using Timing and Power
Analysis, TestCom2005
Computer Forensic
Digital evidence collection process in integrity and memory
information gathering, SADFE 2005
Digital Evidence Integrated Management System, A CNIFIC
2004
Recent Publications (2004 – 2005)
Quantum Cryptosystem
Quantum key distribution among three parties using GHZ states,
Journal of the Physical Society 2004.
Arbitrated quantum signature scheme with message recovery,
Physics Letters 2004.
Thank You!!