Title: Introduction to
1Introduction to Center for Information Security
Technologies Korea University
Dean, Jongin Lim jilim_at_cist.korea.ac.kr
2Contents
- Introduction
- Feature of Center
- Goals and Objectives
- History
- Current Situation
- Organization
- Research Areas
- Members of CIST
- Publications
3Introduction (1/2)
- CIST (Center for Information Security
Technologies) was established in August 1999. - CIST has devoted itself to enhancing the security
and reliability of information circumstances. - CIST is concentrating on producing specialists in
the field of Information Security. - Through industrial-educational cooperation
programs, and cooperation programs with foreign
agencies, CIST is trying its best to be the one
of the best cryptographic research centers in the
world
4Introduction (2/2)
- CIST was selected in 2000 by the Ministry of
Information and Communication as an outstanding
academic Institution for Research in
Cryptographic Technologies (ITRC) - In September 2004, CIST placed first in an
ITRC-ranked evaluation for which it received a
pledge of one million US dollars annually in
research support. - CIST is one body with Korea universitys Graduate
School of Information Security.
5Feature of Center (1/2)
- Research on the Cutting-edge Secret Key
Cryptosystem - and Cryptographic Protocols
- Technology-oriented Solutions for the
Socially-issued - Problems
- Evaluation Technology of Information System
(CMVP) - Information Hiding Technologies
High Technology
Various Members
- The Members Majored a Variety of Fields, such as
- Mathematics, Computer Science, Electronics,
Law
6Feature of Center (2/2)
Connection with Graduate School
- Foundation of Graduate School of Information
Security - in 2001
- Collaboration with about Twenty Governmental and
- Private Research Centers last 3 years
Collaboration with Companies
7Goals and Objectives
To develop core information security technology
for the reliable information society
To promote research of security evaluation of
the information system
To cultivate a workforce of information security
professionals
To contribute to the information security
industry through collaborative research
To enhance international competitiveness in the
field of information security
8History (1/5)
- 1986.09 Began Crypt Lab. of Dept. of
Mathematics, Graduate School, Korea University. - 1993.03 Began Algorithm Lab. of Dept. of
Computer Science, Graduate School, Korea
University - 1999.08 Founded CIST incorporating Crypt Lab.
of Dept. of Mathematics and Algorithm Lab. of
Dept. of Computer Science. - 1999.12 Held International Conference on
Information Security and Cryptology (ICISC)99 - 2000.03 Founded the Department of Information
Security - 2000.04 Held Multimedia Contents Information
Security Workshop - 2000.08 Appointed as ITRC (Information
Technology Research Center) - 2001.03 Founded the Graduate School of
Information Security
9History (2/5)
- 2002.02 Held KoreaCrypt 01
- 2002.12 Held KoreaCrypt 02
- 2003.02 Held the First Convocation Ceremony
- 2003.08 2004.09 Dispatched 2 Students to
Cryptology Research Centre at the Indian
Statistical Institute in India - 2003.09 2004.08 Dispatched 2 Students to
International Research Centers such as COSIC in
Belgium - 2003.09 2004.09 Dispatched a Student to
Institute for Infocomm Research in Singapore - 2003.10 Made an agreement MOU with Institute
for Infocomm Research in Singapore
10History (3/5)
- 2003.12 Held KoreaCrypt 03
- 2004.01 2005.02 Dispatched 2 Students to
Kyushu Univ. in Japan - 2004.01 2005.02 Dispatched 2 Students to
Digital Technology Center, Minnesota Univ. in USA - 2004.03 Made an agreement MOU with Kyushu
Univ. in Japan - 2004.03 2005.02 Dispatched a Post. Doctor to
International Research Centers such as COSIC in
Belgium - 2004.09 2005.08 Dispatched a Post. Doctor to
Maryland Univ. in USA
11History (4/5)
- 2004.11 Made an agreement MOU with the Kyoto
College of Graduate Studies for Informatics in
Japan - 2004.11 Made an agreement MOU with COSIC in
Belgium - 2004.12 Held ICISC 04
- 2005.03 Now Dispatched a Post. Doctor and a
Student to International Research Centers such as
COSIC in Belgium - 2005.03 Now Dispatched a Post. Doctor to
Future university-Hakodate in Japan - 2005.03 Made an agreement MOU with Jilin
Institute of Chemical Technology in China
12History (5/5)
- 2005.08 Now Dispatched a Student to
Institute of Experimental Physics, Univ. of
Vienna in Austria - 2005.11 Made an agreement MOU with
Cryptography group, Department of computer
science, Columbia Univ. in USA - 2005.11 Now Dispatched 2 Students to
Cryptography group, Department of computer
science, Columbia Univ. in USA
13Current Situation - Organization
14Symmetric Key Cryptography Lab (1/4)
- Block Cipher Design of secure and efficient
block ciphers, and analysis of the security for
known block ciphers.
lt Feistel Structure gt
lt SPN Structure gt
15Symmetric Key Cryptography Lab (2/4)
- Mode of Operation Analysis of the security
for various modes of operation, and design of
secure modes of operation.
16Symmetric Key Cryptography Lab (3/4)
- Stream Cipher Analysis of the security for
various stream ciphers.
17Symmetric Key Cryptography Lab (4/4)
- Hash Function Study on provable secure hash
functions, and design of secure hash functions. - Pseudorandomness Study on Pseudorandomness,
and design of pseudorandom functions.
18Public Key Lab (1/2)
PKC related Design and Analysis
- Analysis on the existing cryptographic schemes
- Design of cryptographic schemes and protocols
- Side channel attack
- Development of efficient cryptographic algorithms
- Integer factoring algorithm (GNFS)
19Public Key Lab (2/2)
Efficient Implementation
- Efficient cryptographic software library
- Design of efficient hardware architecture
- FPGA hardware implementation
- Efficient countermeasure for side channel attack
20Quantum Cryptography Lab
- Design and Security Analysis of Quantum Key
Distribution Protocol - Design and Security Analysis of Quantum Signature
Scheme - Entropy and Entanglement in Quantum Information
Theory - Quantum Error Correction
- Basic Problems of Quantum Information Theory and
Related Topics - Design the Quantum Direct Communication Protocol
- Design the Quantum Secret Sharing Protocol
21Information Hiding Lab
- Information Hiding Theory
- Steganography, Digital Watermarking
- Digital Right Management
- Fingerprint, Authority Controller Robustly
- Information Hiding Technologies
- Copy-resistant technique of the printed digital
file - Secure steganographic scheme of the still digital
images
22Information Security Protocol Lab
- Efficient Broadcast Encryption
- Privacy-Enhancing Technologies
- Design and Security-Analysis for Authentication
in RFID Tags - Authenticated Group Key Exchange (GKE)
- Password-based GKE
- ID-based GKE
- Electronic Payments and Voting
- Cryptographic Protocols using Weil-Pairing
23Protocol Lab (1/3)
Electronic Payment
24Protocol Lab (2/3)
Broadcasting
25Protocol Lab (3/3)
Key Exchange
26System Network Lab
- Neural Network, Pattern Recognition - NIDS,
Internet Worm - Network Security - TCP/IP, Packet analysis
- System Security Kernel analysis, Automatic
Patch Distribution
27Wireless Mobile Security Lab
- Wireless and Mobile Communication Security
Mechanism Study and Development - 3GPP/3GPP2/4G Mobile Communication Security
- IEEE 802.11 WLAN security and Authentication
Mechanism - IEEE 802.15 WPAN (Bluetooth, UWB, Zigbee)
Security - IEEE 802.16 WiBro Security
- Sensor Network Security
- Home Network Access Authentication, Authority
and Security - 3GPP-WLAN-WiBro Interworking Security
28Secure Hardware Lab
Timing Attack Research about Hardware Module
Power Analysis Research about Hardware Module
Security Chip Design (VHDL Code)
Smart Card Operating System Development
EMV, K-CASH base Electronic Money Development
29Forensic Lab
- Technology of Acquiring Evidence
- Technology of Evidence Analysis
- Technology of Network information collection
- Computer Forensic Process
- Policy of Computer Crime
- Data Forensic
30Information Security Policy Lab
- Technology-Oriented Policy Development on
Socially-Issued Problems - Response to Spam and Spyware
- Cybercrime, Cyber-terrorism and Cyber Forensics
- E-Government
- Privacy Protection in PKI
- Security and Privacy in Ubicomp
- Consultation of ISMS
31Current Situation - Members of CIST
Symmetric Public Infor.
Quantum Protocol System Wireless
Computer Policy Secure Key
Key Hiding
Security Mobile Forensic
Hardware
Security
32Current Situation - Members of CIST
33International Publications
34Recent Publications (2004 2005)
- Public Key Cryptosystem (1/2)
- Modified Power-Analysis Attacks on XTR and An
Efficient Countermeasure, ICICS'04 - Cryptanalysis of the Countermeasures Using
Randomized Binary Signed Digits, ACNS'04 - On security of XTR public key cryptosystems
against Side Channel Attacks, ACISP'04 - Modified Sequential Normal Basis Multipliers for
Type II Optimal Normal Bases, ICCSA'05 - Cryptanalysis of Ha-Moon's Countermeasure of
Randomized Signed Scalar Multiplication, IEICE'05 - Side Channel Cryptanalysis on XTR Public Key
Cryptosystem, IEICE'05
35Recent Publications (2004 2005)
- Public Key Cryptosystem (2/2)
- A Non-Redundant and Efficient Architecture for
Karatsuba-Ofman Algorithm, ISC'05 - An efficient public key cryptosystem with a
privacy enhanced double decryption mechanism,
SAC'05 - Modified Serial Multipliers for Type-IV Gaussian
Normal Bases, Indocrypt'05 - A Fast Inversion Algorithm and Low-Complexity
Architecture over GF(2m), CIS'05
36Recent Publications (2004 2005)
- Symmetric Key Cryptosystem (1/4)
- Related key differential attacks on 27 rounds of
XTEA and full rounds of GOST, FSE04. - Related key differential cryptanalysis of full
round SPECTR-H64 and CIKS-1, ACISP04. - A generalization of PGV-hash functions and
security analysis in black-box model, ACISP04. - Differential-linear type attacks on reduced
rounds of SHACAL-2, ACISP04. - The related-key rectangle attack-application to
SHACAL-1, ACISP04.
37Recent Publications (2004 2005)
- Symmetric Key Cryptosystem (2/4)
- On the Pseudorandomness of a Modification of
KASUMI type Permutations , ICISC04. - Padding Oracle Attacks on Multiple Modes of
Operation , ICISC04. - Impossibility of Construction of OWHF and UOWHF
from PGV Model Based on Block Cipher Secure
Against ACPCA, INDOCRYPT04. - Related-Key Attacks on DDP Based Ciphers
CIKS-128 and CIKS-128H, INDOCRYPT04. - Related-Key Attacks on Reduced Rounds of
SHACAL-2, INDOCRYPT04.
38Recent Publications (2004 2005)
- Symmetric Key Cryptosystem (3/4)
- Higher Order Universal One-Way Hash Functions,
ASIACRYPT04. - Related-Key Rectangle Attacks on Reduced Versions
of SHACAL-1 and AES-192 , FSE05. - Related-Key Differential Attacks on Cobra-S128,
Cobra-F64a, and Cobra-F64b, MYCRYPT05 . - A New 256-bit Hash Function DHA-256 Enhancing
the Security of SHA-256, Cryptographic Hash
Workshop by NIST. - A New Dedicated 256-bit Hash Function Fork-256,
Cryptographic Hash Workshop by NIST.
39Recent Publications (2004 2005)
- Symmetric Key Cryptosystem (4/4)
- Related-Key Differential Attacks on Cobra-H64 and
Cobra-H128, CCC05. - On the Security of Encryption Modes of MD4, MD5
and HAVAL, ICICS05. - How to Construct Universal One-way Hash Functions
of Order r, Indocrypt05. - Information Hiding (1/2)
- International Workshop on digital Watermarking
2004. - Steganoraphic Scheme Using a Block
Cipher,International Workshop on digital
Watermarking 2004.
40Recent Publications (2004 2005)
- Information Hiding (2/2)
- On Security Notions for Steganalysis, ICISC 2004.
- Color Cube Aanalysis for Detection of LSB
Steganography in RGB Color Images, ICCSA 2005,
LNCS Vol. 3481 - New Steganalysis Methodology LR Cube Analysis
for the Detection of LSB Steganography, 7th
Information Hiding Workshop - Applying LR Cube Analysis to JSteg Detection,
9th IFIP TC-6 TC-11 Conference on Communications
and Multimedia Security - A new watermarking method using statistical
property and quantization, PDCAT 05
41Recent Publications (2004 2005)
- Protocol (1/3)
- Constant-Round Authenticated Group Key Exchange
for Dynamic Groups, Asiacrypt 2004 - SITIS Scalable Intrusion Tolerance Middleware
for Internet Service Survivability, PCM 2004 - A Dynamic Path Identification Mechanism to Defend
Against DDoS Attacks, ICON 2004 - Matching Connection Pairs, PDCAT2004
- Efficient Password-Based Group Key Exchange,
TrustBus 2004 - One-Round Protocols for Two-Party Authenticated
Key Exchange, ACNS 2004
42Recent Publications (2004 2005)
- Protocol (2/3)
- Scalable key exchange transformation from
two-party to group Efficient ID-based Group Key
Agreement with Bilinear Maps, Electronics Letters - Cryptanalysis of Lee-Kim-Yoo password-based key
agreement scheme, Applied Mathmatics and
Computation(journal), ELSEVIER - A Key Management Scheme for Commodity Sensor
Networks, International Conference on AD-HOC
Networks Wireless - Secure Password Pocket for Distributed Web
Services, NPC 2005 - Generic Transformation for Scalable Broadcast
Encryption Schemes, CRYPTO 2005 - Efficient Member Revocation in Group Signature
Schemes, TrustBus 05
43Recent Publications (2004 2005)
- Protocol (3/3)
- N-party Encrypted Diffie-Hellman Key Exchange
Using Different Password, ACNS 2005 - ID-based Authenticated Key Agreement for
Low-Power Mobile Devices, ACISP 2005 - Efficient Revocation of Security Capability in
Certificateless Public Key Cryptography,
ICNC'05-FSKD'05 special sessions - One-Way Chain Based Broadcast Encryption schemes,
EuroCrypt 2005 - Efficient Authentication for Low-Cost RFID
systems, ICCSA 2005 - Fine grained control of security capability and
forward security in a pairing based signature - Secure Index Search for Groups, TrustBus 05
44Recent Publications (2004 2005)
- System Network (1/2)
- A study of the skin contours as the marker of
skin againg Three dimensional measurement using
stereimage concept, 6th Asia/Ocenia Regional
Congress of Gerontology - A 2-D HMM Method for Off-line Handwritten
Character Recognition, International Journal of
Pattern Recognition and Artificial Intelligence - Automated Immunization Against Denial-of-Service
- Attacks Featuring Stochastic Packet Inspection,
GCC2005 - SVM Approach with CTNT to Detect DDoS Attacks in
Grid Computing, GCC2005
45Recent Publications (2004 2005)
- System Network (2/2)
- Reduction method of threat phrases by classifying
assetsCall Tracking and location updating using
DHS in mobile networks - Multi-level protection building for virus
protection infrastructure - Improved location scheme using circle location
register in mobile networks - Authentication protocol providing user anonymity
and untraceability in wireless mobile systems,
Computer Networks
46Recent Publications (2004 2005)
- Secure hardware
- Detecting Trapdoors in Smart Cards Using Timing
and Power Analysis, TestCom2005 - Computer Forensic
- Digital evidence collection process in integrity
and memory information gathering, SADFE 2005 - Digital Evidence Integrated Management System, A
CNIFIC 2004
47Recent Publications (2004 2005)
- Quantum Cryptosystem
- Quantum key distribution among three parties
using GHZ states, Journal of the Physical Society
2004. - Arbitrated quantum signature scheme with message
recovery, Physics Letters 2004.
48