introduction of information security research division dowon hong, ph. d. cryptography research team...
TRANSCRIPT
Introduction of Information Security Research Division
Dowon Hong, Ph. D.Cryptography Research Team
2005. 11. 16.
Proprietary 2 Joint Workshop
Contents
Overview - Organization of ETRI
- Secure u-IT KOREA
- Global Partnership
Information Security
Research Division - Network Security Research
Group
- - Information Security Information Security
InfrastructureInfrastructure Research GroupResearch Group
Proprietary 3 Joint Workshop
Established in 1976
Korea’s largest Korea’s largest
government funded government funded
research facility in the research facility in the
fields of IT & Comm.fields of IT & Comm.
R&D Fields : R&D Fields :
Semiconductors, Semiconductors,
Mobile Mobile
Communications, Communications,
Networks, Security, etc.Networks, Security, etc.
Organization of ETRI
Proprietary 4 Joint Workshop
Secure u-IT KOREA
IT Soc
Embedded S/W
Next Generation Mobile Communications
Digital TV
Digital Contents
Home Network Next Generation PC
Telematicsu-IT KOREAu-IT KOREA
Security Intelligent Service Robot
Proprietary 5 Joint Workshop
ETRI R&D Global Partnership
•Surf Communication•Runcom Technology(Israel)
Telstra (AU)
PTIT(Vietnam)
CPqD (Brazil)
Simon Fraser U.(Canada)
•NICT•NTT•YRP•JSAT•CBOP•RITE•ATR-SLT•ISIT(Japan)
•JSC•LONIIS (Russia)
Ericsson (Sweden)
• HHI• Siemens• Fhg-IIS (Germany)
• Tsinghna U.• Sountheast U.• Beijing U. Posts &
Telecommunications• Peking U.• NRSCC•CCSA• HIT (China)
• Wi-LAN• Motorola• SCO• Syracuse U.• NCGIA• Kasenna, Inc.• Agere Sys
(USA)
•TNO Tel(Holland)
16 Countries/40 Organization
Proprietary 6 Joint Workshop
Organization of ISRD
Information Security Research Division
Network Security
Research Group
Information Security
Infrastructure Research Group
Project AdministrationTeam
• Network Security Architecture Team
• Security Gateway System Team
• Secure OS Research Team
• Active Security Research Team
• Privacy Protection Research Team
• P2P Security Research Team
• Home Network Security Research
Team
• Cryptography Research Team
• Digital ID Security Research Team
• RFID/USN Security Research Team
• Biometrics Technology Research Team
• Biometrics Chipset Research Team
• Bio Sensor Research Team
• Wireless Security Application Research
Team
Proprietary 7 Joint Workshop
R&D Areas of ISRD
▣ 5 major research areas◈ Network Security, Ubiquitous Security, Bio Security, Security Chipset Tech. Privacy Enhancing Tech.
e-ID Management Harmful Contents Prevention Tech.
1. Network Security Tech.1. Network Security Tech.1. Network Security Tech.1. Network Security Tech. 3. Bio Security Tech.3. Bio Security Tech.3. Bio Security Tech.3. Bio Security Tech.
4. Security Chipset Tech.4. Security Chipset Tech.4. Security Chipset Tech.4. Security Chipset Tech.
20Gbps Security System BcN Security Management IPv6 IDS/IPS Module IPv6 P2P Security
Safety/Reliability for InfraSafety/Reliability for Infra
5. Privacy Enhancing Tech.5. Privacy Enhancing Tech.5. Privacy Enhancing Tech.5. Privacy Enhancing Tech.
User Service ProtectionUser Service Protection
2. Ubiquitous Security Tech.2. Ubiquitous Security Tech.2. Ubiquitous Security Tech.2. Ubiquitous Security Tech.
RFID/USN Security Tech. HomeNetwork Security
Device Intrusion Device Intrusion ResponseResponse
Lightweight encryption/ authentication Module
Chipset Tech. for biometrics
Lightweight/Low power Lightweight/Low power SolutionSolution
ID Service for e-gov./commerceID Service for e-gov./commerce
Biometrics Service System Biometrics Service
Proprietary 8 Joint Workshop
R&D Themes of Network Security Research Group(1)
Next Generation Security System Tech.
Security Gateway System
Secure Router System
Security Management System
Harmful Contents Detection and Filtering Tech.
Proprietary 9 Joint Workshop
R&D Themes of Network Security Research Group(2)
Network Security Tech. for P2P Overlay Networks over
Wired/Wireless IPV6 Infrastructures
Authentication and Authorization Tech. for Home Networks
Secure P2P overlay networkPhysical network virtual mapping
Secure routing signal delivery
Authenticate routing message
Secure P2P memberJ oin&Leave
Authenticate P2P control message
ReliableIPv6 addr, generation Confidential data
leakage prevention
Peer ID
Peer ID
Peer
PeerPeer
Peer
Reliable Node ID generation
Proprietary 10 Joint Workshop
Research Areas of Information Security Infrastructure Group (1)
Cryptographic Algorithm and ProtocolNext Generation Cryptographic Algorithm Design & Analysis
High-speed Cryptographic Processor Design
Privacy Enhancing Technology
Proprietary 11 Joint Workshop
Research Areas of Information Security Infrastructure Group (2)
Digital ID Security
Internet ID Management Technology
Autonomous Identity Federation Bridging Technology
Internet ID Server
PrivacyController
UserUser
Single ID ManagementService
Private InformationPreserving Service
ID Database
Provider ID ServiceProvider ID Service
UserUser
e-Government
e-CommerceID FederationBridge Service
User A
User B
ID InformationProviding Service
DiscoveryService
DiscoveryServer
Internet SSO ServiceID Federation
Bridge Server
Proprietary 12 Joint Workshop
Research Areas of Information Security Infrastructure Group (3)
RFID/USN SecurityLight-weight Crypto Algorithm for RFID & Sensor NetworkLow Power & High Speed ProcessorSecurity Mechanism for RFID/USN Environments
Proprietary 13 Joint Workshop
Research Areas of Information Security Infrastructure Group (4)
User Identification Technology Using Biometrics Multi-modal Biometric & Searching Technology
Biometric Chipset & Bio Sensor Technology
Biometric Data Protection
Biometric ProcessBiometric Process
• Single/Multi-modal Processing • Within Biometric Data
Application ProgramApplication ProgramApplication ProgramApplication ProgramAuthentication Register Management
Application Layer
Bio-APIBio-APIBio-APIBio-APIAPI
Bio-API Framework
Biometric Process Interface
Bio-API Layer
Processing Biometric DataProcessing Biometric DataProcessing Biometric DataProcessing Biometric DataBiometric Data Processing Module (CBEFF)
Data Processing Layer
Biometric Chip Reader Interface
Module
Biometric acquiring Module
(Fingerprint/Face /Iris/Vein
Pattern)
Extracting Module (face/)
검증분할전처리
Apparatus for ChipApparatus for ChipApparatus for ChipApparatus for Chip Sensor for AcquiringSensor for AcquiringSensor for AcquiringSensor for AcquiringDevice Layer
Finger Print
FaceSensor
IrisSensor
Vein
Pattern
생체인식 칩
Chip Reader
Bio
me
tric Ap
plica
tion
P
latfo
rm
• Standard based Application System such as Bio-API
• User Register/Auth. Service
Proprietary 14 Joint Workshop
Research Areas of Information Security Infrastructure Group (5)
Development of Secure Platform for Wireless Network
Inter-working Security Technology for USIM based WCDMA, WiBro & WLAN Security Platform
UAGSUAGS2G
terminal
3G terminal
Roaming server
Portable internet terminal
801.162/WiBroweb
3G(IMT-2000)web2G 망
Terminal interworking
PKITriple-mode
terminal
Triple-mode terminal
PKIUSIM
SIM
USIM
WLAN web
PKI
USIM
WLAN terminal
Interworking between roaming server
for Triple-mode terminal
Authen. proxy
USIM : Universal Subscriber Identity ModuleUAGS : USIM Access Gateway Subsystem
WCDMAWCDMACDMACDMA
WiBroWiBro
PPWWLLAANN
Roaming serverAuthen. proxy
Roaming serverAuthen. proxy
Roaming serverAuthen. proxy
Se
curity fo
r Te
rmin
al-clie
nt
Proprietary 15 Joint Workshop
Future R&D Plans in Information Security Infrastructure Group
Powerful InitiativePowerful Initiative
Information Security Privacy Preserving Tech.
Efficient Digital ID Management
Wireless Network System
RFID/USN Service
High-level Service for Ubiquitous Environments
Conversion of BT & IT
Multi-modal Biometric Identification Tech.
Biosensor
Next Generation Cryptography
PETs
Cryptographic Protocols