Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAS.KO-10.0278 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2007-12-26 | ÃÑÆäÀÌÁö | 33 |
ÇѱÛÇ¥Áظí | Â÷¼¼´ë PC ¿ë ¹Ìµé¿þ¾î ÇÁ·¹ÀÓ¿öÅ©¸¦ À§ÇÑ ¾ÏÈ£È ¹× ÀÎÁõ ÄÄÆ÷³ÍÆ® | ||
¿µ¹®Ç¥Áظí | (Cipher and Authentication Component in Middleware Framework for Next Generation PCs) | ||
Çѱ۳»¿ë¿ä¾à | ¿þ¾î·¯ºí ÄÄÇ»ÅÍ È¯°æ¿¡¼´Â »ç¿ëÀÚ À̵¿À¸·Î ÀÎÇÑ Á¤º¸ ³ëÃâ ¹®Á¦¿Í ¿þ¾î·¯ºí ÄÄÇ»ÅÍ
´ëºÎºÐ ¹«¼± ÀÎÅÍÆäÀ̽º¸¦ »ç¿ëÇÔ¿¡ µû¶ó ½Å·Ú¼º Àִ ä³ÎÀ» È®º¸ ÇØ¾ß ÇÏ´Â ¹®Á¦Á¡À» °®°í ÀÖ´Ù. µû¶ó¼ ¿þ¾î·¯ºí ÄÄÇ»ÅÍ »óÀÇ µ¥ÀÌÅÍ¿¡ ´ëÇÑ ±â¹Ð¼ºÀ» º¸ÀåÇϱâ À§ÇØ ¾ÏÈ£È ¹æ½ÄÀÌ Á¦°øµÇ¾î¾ß Çϸç, ¾ÈÀüÇÏÁö ¾ÊÀº ä³ÎÀ» ÅëÇÏ¿© ¼ö½ÅµÇ¾úÀ» °æ¿ì µ¥ÀÌÅÍ º¯Á¶ °¡´É¼ºÀ» Á¦°ÅÇؾ߸¸ ÇÑ´Ù. ¾ÏÈ£´Â ¸Þ½ÃÁöÀÇ ±â¹Ð(Confidentiality) À¯Áö¸¦ À§ÇØ Áï, ±âº»ÀûÀ¸·Î Çã°¡µÈ »ç¶÷ ÀÌ¿Ü¿¡´Â ±× ³»¿ëÀ» ¾Ë¾Æ º¼ ¼ö ¾øµµ·Ï Çϱâ À§ÇØ »ç¿ëµÇ°í ÀÖ´Ù. Æò¹®(Plaintext)À» »ç¿ëÀÚÀÇ ¾ÏÈ£ÈÅ° (Encryption Key: Àá±Ý ¿¼è)¸¦ »ç¿ëÇÏ¿© ¾ÏÈ£¹®(Ciphertext)À¸·Î º¯È¯ÇÏ´Â °úÁ¤À» ¾Ïȣȶó Çϸç, ¾ÏÈ£¹®À¸·ÎºÎÅÍ º¹È£ÈÅ°(Decryption Key: Ç®¸² ¿¼è)¸¦ »ç¿ëÇÏ¿© ¿ø·¡ÀÇ Æò¹®À¸·Î º¯ ȯÇÏ´Â °úÁ¤Àº º¹È£È(Decryption)¶ó°í ÇÑ´Ù. ÀÎÁõ(Authentication)À̶õ Á¤º¸ÀÇ ÁÖü°¡ µÇ´Â ¼Û½ÅÀÚ¿Í ¼ö½ÅÀÚ °£¿¡ ±³·ùµÇ´Â Á¤µµÀÇ ³» ¿ëÀÌ º¯Á¶ ¶Ç´Â »èÁ¦µÇÁö ¾Ê¾Ò´ÂÁö, ±×¸®°í ÁÖü°¡ µÇ´Â ¼Û․ ¼ö½ÅÀÚ°¡ Á¤´çÇÑÁö¸¦ È®ÀÎÇÏ´Â ¹æ¹ýÀ» ¸»ÇÑ´Ù. º¸Åë ÀÎÁõÀ̶ó ÇÏ¸é »ç¿ëÀÚ ÀÎÁõ°ú ¸Þ½ÃÁö ÀÎÁõÀ¸·Î ±¸ºÐµÈ´Ù. Â÷¼¼´ë PC ¿Í °°Àº °æ·® ȯ°æ¿¡ ÀûÇÕÇÑ ÀÎÁõ ¹æ¹ýÀº Çؽ¬(Hash)¾Ë°í¸®ÁòÀ» ÀÌ¿ëÇÏ´Â ¹æ¹ýÀÌ´Ù. º» Ç¥ÁØÀº µ¥ÀÌÅÍ ±â¹Ð¼ºÀ» º¸ÀåÇϱâ À§ÇÑ ¾ÏÈ£È ¹æ½ÄÀ» ÀÌ¿ëÇϱâ À§ÇÑ ÀÀ¿ë ÇÁ·Î±×·¥ ÀÎ ÅÍÆäÀ̽º(API : Application Program Interface)±Ô°Ý°ú µ¥ÀÌÅÍ ¹«°á¼ºÀ» º¸ÀåÇϱâ À§ÇØ ¸Þ½Ã Áö ÀÎÁõ ¹æ½ÄÀ» Á¦°øÇÏ´Â ÀÀ¿ë ÇÁ·Î±×·¥ ÀÎÅÍÆäÀ̽º ±Ô°ÝÀ» Á¤ÀÇÇÑ´Ù. ¾ÏÈ£È ¹× ÀÎÁõ ¹Ìµé¿þ¾î ÄÄÆ÷³ÍÆ®´Â µ¥ÀÌÅ͸¦ ¾ÏÈ£È?º¹È£È ÇÏ´Â ¾ÏÈ£È(Encryption) ÄÄÆ÷³ÍÆ®¿Í µ¥ÀÌÅÍ Àü¼Û ÈÄ ¼ö½Å ¹ÞÀº µ¥ÀÌÅÍ°¡ ¿Ã¹Ù¸¥Áö È®ÀÎÇϱâ À§ÇÑ ÀÎÁõ(Authentication) ÄÄÆ÷³ÍÆ®·Î ±¸ºÐµÈ´Ù. °¢ ÄÄÆ÷³ÍÆ®´Â ÀÀ¿ë ÇÁ·Î±×·¥ÀÇ ¿ä±¸¿¡ µû¶ó °¢°¢ È£ÃâµÇ¾î »ç¿ëµÇ¸ç, µÎ ÄÄÆ÷³ÍÆ®¸¦ ÇÔ²² »ç¿ëÇÒ ¼öµµ ÀÖ´Ù. |
||
¿µ¹®³»¿ë¿ä¾à | There are some problems that the information of wearable computer users is exposed
and wearable computers do not provide secure communication channels because almost ones use the wireless interface. Therefore, next generation PCs can provide the cipher function to gurantee the confidentiality of user data, and prevent the modification of the received data through the unsecure channels. |
||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAS_KO-10_0278_[1].zip |