Introduction to - PowerPoint PPT Presentation

1 / 48
About This Presentation
Title:

Introduction to

Description:

Doctor to Future university-Hakodate in Japan ... Response to Spam and Spyware. Cybercrime, Cyber-terrorism and Cyber Forensics. E-Government ... – PowerPoint PPT presentation

Number of Views:287
Avg rating:3.0/5.0
Slides: 49
Provided by: deukj
Category:

less

Transcript and Presenter's Notes

Title: Introduction to


1
Introduction to Center for Information Security
Technologies Korea University
Dean, Jongin Lim jilim_at_cist.korea.ac.kr
2
Contents
  • Introduction
  • Feature of Center
  • Goals and Objectives
  • History
  • Current Situation
  • Organization
  • Research Areas
  • Members of CIST
  • Publications

3
Introduction (1/2)
  • CIST (Center for Information Security
    Technologies) was established in August 1999.
  • CIST has devoted itself to enhancing the security
    and reliability of information circumstances.
  • CIST is concentrating on producing specialists in
    the field of Information Security.
  • Through industrial-educational cooperation
    programs, and cooperation programs with foreign
    agencies, CIST is trying its best to be the one
    of the best cryptographic research centers in the
    world

4
Introduction (2/2)
  • CIST was selected in 2000 by the Ministry of
    Information and Communication as an outstanding
    academic Institution for Research in
    Cryptographic Technologies (ITRC) 
  • In September 2004, CIST placed first in an
    ITRC-ranked evaluation for which it received a
    pledge of one million US dollars annually in
    research support.
  • CIST is one body with Korea universitys Graduate
    School of Information Security.

5
Feature of Center (1/2)
  • Research on the Cutting-edge Secret Key
    Cryptosystem
  • and Cryptographic Protocols
  • Technology-oriented Solutions for the
    Socially-issued
  • Problems
  • Evaluation Technology of Information System
    (CMVP)
  • Information Hiding Technologies

High Technology
Various Members
  • The Members Majored a Variety of Fields, such as
  • Mathematics, Computer Science, Electronics,
    Law

6
Feature of Center (2/2)
Connection with Graduate School
  • Foundation of Graduate School of Information
    Security
  • in 2001
  • Collaboration with about Twenty Governmental and
  • Private Research Centers last 3 years

Collaboration with Companies
7
Goals and Objectives
To develop core information security technology
for the reliable information society
To promote research of security evaluation of
the information system
To cultivate a workforce of information security
professionals
To contribute to the information security
industry through collaborative research
To enhance international competitiveness in the
field of information security
8
History (1/5)
  • 1986.09 Began Crypt Lab. of Dept. of
    Mathematics, Graduate School, Korea University.
  • 1993.03 Began Algorithm Lab. of Dept. of
    Computer Science, Graduate School, Korea
    University
  • 1999.08 Founded CIST incorporating Crypt Lab.
    of Dept. of Mathematics and Algorithm Lab. of
    Dept. of Computer Science.
  • 1999.12 Held International Conference on
    Information Security and Cryptology (ICISC)99
  • 2000.03 Founded the Department of Information
    Security
  • 2000.04 Held Multimedia Contents Information
    Security Workshop
  • 2000.08 Appointed as ITRC (Information
    Technology Research Center)
  • 2001.03 Founded the Graduate School of
    Information Security

9
History (2/5)
  • 2002.02 Held KoreaCrypt 01
  • 2002.12 Held KoreaCrypt 02
  • 2003.02 Held the First Convocation Ceremony
  • 2003.08 2004.09 Dispatched 2 Students to
    Cryptology Research Centre at the Indian
    Statistical Institute in India
  • 2003.09 2004.08 Dispatched 2 Students to
    International Research Centers such as COSIC in
    Belgium
  • 2003.09 2004.09 Dispatched a Student to
    Institute for Infocomm Research in Singapore
  • 2003.10 Made an agreement MOU with Institute
    for Infocomm Research in Singapore

10
History (3/5)
  • 2003.12 Held KoreaCrypt 03
  • 2004.01 2005.02 Dispatched 2 Students to
    Kyushu Univ. in Japan
  • 2004.01 2005.02 Dispatched 2 Students to
    Digital Technology Center, Minnesota Univ. in USA
  • 2004.03 Made an agreement MOU with Kyushu
    Univ. in Japan
  • 2004.03 2005.02 Dispatched a Post. Doctor to
    International Research Centers such as COSIC in
    Belgium
  • 2004.09 2005.08 Dispatched a Post. Doctor to
    Maryland Univ. in USA

11
History (4/5)
  • 2004.11 Made an agreement MOU with the Kyoto
    College of Graduate Studies for Informatics in
    Japan
  • 2004.11 Made an agreement MOU with COSIC in
    Belgium
  • 2004.12 Held ICISC 04
  • 2005.03 Now Dispatched a Post. Doctor and a
    Student to International Research Centers such as
    COSIC in Belgium
  • 2005.03 Now Dispatched a Post. Doctor to
    Future university-Hakodate in Japan
  • 2005.03 Made an agreement MOU with Jilin
    Institute of Chemical Technology in China

12
History (5/5)
  • 2005.08 Now Dispatched a Student to
    Institute of Experimental Physics, Univ. of
    Vienna in Austria
  • 2005.11 Made an agreement MOU with
    Cryptography group, Department of computer
    science, Columbia Univ. in USA
  • 2005.11 Now Dispatched 2 Students to
    Cryptography group, Department of computer
    science, Columbia Univ. in USA

13
Current Situation - Organization
14
Symmetric Key Cryptography Lab (1/4)
  • Block Cipher Design of secure and efficient
    block ciphers, and analysis of the security for
    known block ciphers.

lt Feistel Structure gt
lt SPN Structure gt
15
Symmetric Key Cryptography Lab (2/4)
  • Mode of Operation Analysis of the security
    for various modes of operation, and design of
    secure modes of operation.

16
Symmetric Key Cryptography Lab (3/4)
  • Stream Cipher Analysis of the security for
    various stream ciphers.

17
Symmetric Key Cryptography Lab (4/4)
  • Hash Function Study on provable secure hash
    functions, and design of secure hash functions.
  • Pseudorandomness Study on Pseudorandomness,
    and design of pseudorandom functions.

18
Public Key Lab (1/2)
PKC related Design and Analysis
  • Analysis on the existing cryptographic schemes
  • Design of cryptographic schemes and protocols
  • Side channel attack
  • Development of efficient cryptographic algorithms
  • Integer factoring algorithm (GNFS)

19
Public Key Lab (2/2)
Efficient Implementation
  • Efficient cryptographic software library
  • Design of efficient hardware architecture
  • FPGA hardware implementation
  • Efficient countermeasure for side channel attack

20
Quantum Cryptography Lab
  • Design and Security Analysis of Quantum Key
    Distribution Protocol
  • Design and Security Analysis of Quantum Signature
    Scheme
  • Entropy and Entanglement in Quantum Information
    Theory
  • Quantum Error Correction
  • Basic Problems of Quantum Information Theory and
    Related Topics
  • Design the Quantum Direct Communication Protocol
  • Design the Quantum Secret Sharing Protocol

21
Information Hiding Lab
  • Information Hiding Theory
  • Steganography, Digital Watermarking
  • Digital Right Management
  • Fingerprint, Authority Controller Robustly
  • Information Hiding Technologies
  • Copy-resistant technique of the printed digital
    file
  • Secure steganographic scheme of the still digital
    images

22
Information Security Protocol Lab
  • Efficient Broadcast Encryption
  • Privacy-Enhancing Technologies
  • Design and Security-Analysis for Authentication
    in RFID Tags
  • Authenticated Group Key Exchange (GKE)
  • Password-based GKE
  • ID-based GKE
  • Electronic Payments and Voting
  • Cryptographic Protocols using Weil-Pairing

23
Protocol Lab (1/3)
Electronic Payment
24
Protocol Lab (2/3)
Broadcasting
25
Protocol Lab (3/3)
Key Exchange
26
System Network Lab
  • Neural Network, Pattern Recognition - NIDS,
    Internet Worm
  • Network Security - TCP/IP, Packet analysis
  • System Security Kernel analysis, Automatic
    Patch Distribution

27
Wireless Mobile Security Lab
  • Wireless and Mobile Communication Security
    Mechanism Study and Development
  • 3GPP/3GPP2/4G Mobile Communication Security
  • IEEE 802.11 WLAN security and Authentication
    Mechanism
  • IEEE 802.15 WPAN (Bluetooth, UWB, Zigbee)
    Security
  • IEEE 802.16 WiBro Security
  • Sensor Network Security
  • Home Network Access Authentication, Authority
    and Security
  • 3GPP-WLAN-WiBro Interworking Security

28
Secure Hardware Lab
Timing Attack Research about Hardware Module
Power Analysis Research about Hardware Module
Security Chip Design (VHDL Code)
Smart Card Operating System Development
EMV, K-CASH base Electronic Money Development
29
Forensic Lab
  • Technology of Acquiring Evidence
  • Technology of Evidence Analysis
  • Technology of Network information collection
  • Computer Forensic Process
  • Policy of Computer Crime
  • Data Forensic

30
Information Security Policy Lab
  • Technology-Oriented Policy Development on
    Socially-Issued Problems
  • Response to Spam and Spyware
  • Cybercrime, Cyber-terrorism and Cyber Forensics
  • E-Government
  • Privacy Protection in PKI
  • Security and Privacy in Ubicomp
  • Consultation of ISMS

31
Current Situation - Members of CIST
Symmetric Public Infor.
Quantum Protocol System Wireless
Computer Policy Secure Key
Key Hiding
Security Mobile Forensic
Hardware

Security
32
Current Situation - Members of CIST
  • Student
  • Post Doctor 2
  • Professor 13

33
International Publications
34
Recent Publications (2004 2005)
  • Public Key Cryptosystem (1/2)
  • Modified Power-Analysis Attacks on XTR and An
    Efficient Countermeasure, ICICS'04
  • Cryptanalysis of the Countermeasures Using
    Randomized Binary Signed Digits, ACNS'04
  • On security of XTR public key cryptosystems
    against Side Channel Attacks, ACISP'04
  • Modified Sequential Normal Basis Multipliers for
    Type II Optimal Normal Bases, ICCSA'05
  • Cryptanalysis of Ha-Moon's Countermeasure of
    Randomized Signed Scalar Multiplication, IEICE'05
  • Side Channel Cryptanalysis on XTR Public Key
    Cryptosystem, IEICE'05

35
Recent Publications (2004 2005)
  • Public Key Cryptosystem (2/2)
  • A Non-Redundant and Efficient Architecture for
    Karatsuba-Ofman Algorithm, ISC'05
  • An efficient public key cryptosystem with a
    privacy enhanced double decryption mechanism,
    SAC'05
  • Modified Serial Multipliers for Type-IV Gaussian
    Normal Bases, Indocrypt'05
  • A Fast Inversion Algorithm and Low-Complexity
    Architecture over GF(2m), CIS'05

36
Recent Publications (2004 2005)
  • Symmetric Key Cryptosystem (1/4)
  • Related key differential attacks on 27 rounds of
    XTEA and full rounds of GOST, FSE04.
  • Related key differential cryptanalysis of full
    round SPECTR-H64 and CIKS-1, ACISP04.
  • A generalization of PGV-hash functions and
    security analysis in black-box model, ACISP04.
  • Differential-linear type attacks on reduced
    rounds of SHACAL-2, ACISP04.
  • The related-key rectangle attack-application to
    SHACAL-1, ACISP04.

37
Recent Publications (2004 2005)
  • Symmetric Key Cryptosystem (2/4)
  • On the Pseudorandomness of a Modification of
    KASUMI type Permutations , ICISC04.
  • Padding Oracle Attacks on Multiple Modes of
    Operation , ICISC04.
  • Impossibility of Construction of OWHF and UOWHF
    from PGV Model Based on Block Cipher Secure
    Against ACPCA, INDOCRYPT04.
  • Related-Key Attacks on DDP Based Ciphers
    CIKS-128 and CIKS-128H, INDOCRYPT04.
  • Related-Key Attacks on Reduced Rounds of
    SHACAL-2, INDOCRYPT04.

38
Recent Publications (2004 2005)
  • Symmetric Key Cryptosystem (3/4)
  • Higher Order Universal One-Way Hash Functions,
    ASIACRYPT04.
  • Related-Key Rectangle Attacks on Reduced Versions
    of SHACAL-1 and AES-192 , FSE05.
  • Related-Key Differential Attacks on Cobra-S128,
    Cobra-F64a, and Cobra-F64b, MYCRYPT05 .
  • A New 256-bit Hash Function DHA-256 Enhancing
    the Security of SHA-256, Cryptographic Hash
    Workshop by NIST.
  • A New Dedicated 256-bit Hash Function Fork-256,
    Cryptographic Hash Workshop by NIST.

39
Recent Publications (2004 2005)
  • Symmetric Key Cryptosystem (4/4)
  • Related-Key Differential Attacks on Cobra-H64 and
    Cobra-H128, CCC05.
  • On the Security of Encryption Modes of MD4, MD5
    and HAVAL, ICICS05.
  • How to Construct Universal One-way Hash Functions
    of Order r, Indocrypt05.
  • Information Hiding (1/2)
  • International Workshop on digital Watermarking
    2004.
  • Steganoraphic Scheme Using a Block
    Cipher,International Workshop on digital
    Watermarking 2004.

40
Recent Publications (2004 2005)
  • Information Hiding (2/2)
  • On Security Notions for Steganalysis, ICISC 2004.
  • Color Cube Aanalysis for Detection of LSB
    Steganography in RGB Color Images, ICCSA 2005,
    LNCS Vol. 3481
  • New Steganalysis Methodology LR Cube Analysis
    for the Detection of LSB Steganography, 7th
    Information Hiding Workshop
  • Applying LR Cube Analysis to JSteg Detection,
    9th IFIP TC-6 TC-11 Conference on Communications
    and Multimedia Security
  • A new watermarking method using statistical
    property and quantization, PDCAT 05

41
Recent Publications (2004 2005)
  • Protocol (1/3)
  • Constant-Round Authenticated Group Key Exchange
    for Dynamic Groups, Asiacrypt 2004
  • SITIS Scalable Intrusion Tolerance Middleware
    for Internet Service Survivability,  PCM 2004
  • A Dynamic Path Identification Mechanism to Defend
    Against DDoS Attacks,  ICON 2004
  • Matching Connection Pairs, PDCAT2004
  • Efficient Password-Based Group Key Exchange,
    TrustBus 2004
  • One-Round Protocols for Two-Party Authenticated
    Key Exchange,  ACNS 2004

42
Recent Publications (2004 2005)
  • Protocol (2/3)
  • Scalable key exchange transformation from
    two-party to group Efficient ID-based Group Key
    Agreement with Bilinear Maps, Electronics Letters
  • Cryptanalysis of Lee-Kim-Yoo password-based key
    agreement scheme, Applied Mathmatics and
    Computation(journal), ELSEVIER
  • A Key Management Scheme for Commodity Sensor
    Networks, International Conference on AD-HOC
    Networks Wireless
  • Secure Password Pocket for Distributed Web
    Services,  NPC 2005
  • Generic Transformation for Scalable Broadcast
    Encryption Schemes,  CRYPTO 2005
  • Efficient Member Revocation in Group Signature
    Schemes, TrustBus 05

43
Recent Publications (2004 2005)
  • Protocol (3/3)
  • N-party Encrypted Diffie-Hellman Key Exchange
    Using Different Password, ACNS 2005
  • ID-based Authenticated Key Agreement for
    Low-Power Mobile Devices,  ACISP 2005
  • Efficient Revocation of Security Capability in
    Certificateless Public Key Cryptography,
    ICNC'05-FSKD'05 special sessions
  • One-Way Chain Based Broadcast Encryption schemes,
     EuroCrypt 2005
  • Efficient Authentication for Low-Cost RFID
    systems,  ICCSA 2005
  • Fine grained control of security capability and
    forward security in a pairing based signature
  • Secure Index Search for Groups, TrustBus 05

44
Recent Publications (2004 2005)
  • System Network (1/2)
  • A study of the skin contours as the marker of
    skin againg Three dimensional measurement using
    stereimage concept, 6th Asia/Ocenia Regional
    Congress of Gerontology
  • A 2-D HMM Method for Off-line Handwritten
    Character Recognition, International Journal of
    Pattern Recognition and Artificial Intelligence
  • Automated Immunization Against Denial-of-Service
  • Attacks Featuring Stochastic Packet Inspection,
    GCC2005
  • SVM Approach with CTNT to Detect DDoS Attacks in
    Grid Computing, GCC2005

45
Recent Publications (2004 2005)
  • System Network (2/2)
  • Reduction method of threat phrases by classifying
    assetsCall Tracking and location updating using
    DHS in mobile networks
  • Multi-level protection building for virus
    protection infrastructure
  • Improved location scheme using circle location
    register in mobile networks
  • Authentication protocol providing user anonymity
    and untraceability in wireless mobile systems,
    Computer Networks

46
Recent Publications (2004 2005)
  • Secure hardware
  • Detecting Trapdoors in Smart Cards Using Timing
    and Power Analysis, TestCom2005
  • Computer Forensic
  • Digital evidence collection process in integrity
    and memory information gathering, SADFE 2005
  • Digital Evidence Integrated Management System, A
    CNIFIC 2004

47
Recent Publications (2004 2005)
  • Quantum Cryptosystem
  • Quantum key distribution among three parties
    using GHZ states, Journal of the Physical Society
    2004.
  • Arbitrated quantum signature scheme with message
    recovery, Physics Letters 2004.

48
  • Thank You!!
Write a Comment
User Comments (0)
About PowerShow.com