DOI QR코드

DOI QR Code

Public Key Authentication using Secret Sharing and ECC for Tactical Communication Networks

군 전술통신네트워크를 위한 비밀분산 및 ECC 기반의 공개키 인증 기법

  • Lim, Dong-Hyun (Dept. Computer Science & Engineering, Korea National Defense University) ;
  • Lee, Soo-Jin (Dept. Computer Science & Engineering, Korea National Defense University)
  • Received : 2016.11.15
  • Accepted : 2016.12.02
  • Published : 2016.12.31

Abstract

Military tactical communication environment that have a resource constraint characteristics limited to applying the public key based user authentication by the Certificate Authority(CA). In this paper, we propose a certificate-less public key based user authentication scheme by applying the secret sharing scheme in order to solve such problems. Our approach applied a Shamir's (t, n) threshold secret sharing scheme and transformed share is designed to be able to ensure the safety of the network although some tactical nodes were held by a malicious attacker. In addition, we also apply the elliptic curve cryptosystem to ensure the resource efficiency of the node and establish the reliability and enhanced security required in Military tactical communication environment.

군 전술통신환경은 자원제약적인 특성을 가지기 때문에 기존 네트워크에 적용하는 인증기관에 의한 공개키 기반 사용자 인증을 적용하기가 제한된다. 본 논문에서는 이러한 문제점을 해결하기 위하여 비밀분산기법을 적용하여 인증기관이 없는 공개키 기반 사용자 인증체계를 제안하였다. 이 기법은 Shamir의 (t, n) 임계치 기법과 지수 분산정보를 적용하여 전술 단말기가 악의적인 공격자에 의해 탈취되더라도 네트워크의 안전성을 보장하도록 설계하였다. 추가적으로 타원곡선 암호시스템을 적용하여 단말기의 자원 효율성을 보장하고, 군 전술통신환경에 요구되는 보안성과 신뢰성을 확립하였다.

Keywords

References

  1. A. Shamir, How to Share a Secret. Commun. ACM. (1979), vol.22, pp.612-613. https://doi.org/10.1145/359168.359176
  2. L. Zhou and Z. J. Haas, Securing Ad Hoc Networks. IEEE Network Mag. (1999), vol.13, no.6, pp.24-30.
  3. Y. G. Desmedt, Threshold Cryptography. European Transactions on Telecommunication. (1994), vol.5, no.4, pp.449-457. https://doi.org/10.1002/ett.4460050407
  4. S. Yi and R. Kravets, MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks. Report No. UIUCDCS-R-2004-2502, UILU-ENG-2004-1805, University of Illinois at Urbana-Champaign, (2002).
  5. B. Wu, Jie Wu and Eduardo B. Fernandez, Secure and Efficient Key Management in Mobile Ad Hoc Networks. Proc. IPDPS'05. (2005).
  6. J. Kong, Petros Zerfos, Haiyun Luo, Songwu Lu and Lixia Zhang, Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. Proc. 9th Int'l. Conf. Network Protocols(ICNP'01). (2001), pp.251-260.
  7. D. Joshi, K. Namuduri, and P. Pendse, Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks : An Analysis. EURASIP J. Wireless Commun. and Net. (2005), vol.5, no.4, pp.579-589.
  8. B. Zhu, Feng Bao, Robert H. Deng, Mohan S. Kankanhalli and Guilin Wang, Efficient and Robust Key Management for Large Mobile Ad Hoc Networks. Computer Networks. (2005), vol.48, no.4, pp.657-682. https://doi.org/10.1016/j.comnet.2004.11.023
  9. Jun-Yop Kim, Public Key Authentication using (t, n) Threshold Scheme in WSN. KNDU(Korea National Defense University). (2009), pp.17-26.
  10. T. El Gamal, A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms. IEEE Trans. Inform. Theory. (1985), pp.469-472.
  11. Alfred J. Menezes, Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers. (1993), pp.35-42.
  12. W. Diffie and M. E. Hellman, New Directions in Cryptography. IEEE Trans. Inform. Theory, IT-22(6). (1976), pp.644-654.
  13. R.L., Rivest, A. Shamir, and L.A. Adleman, A method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM. (1978), vol.21, no.2, pp.120-126. https://doi.org/10.1145/359340.359342
  14. Min-Sop Lee, Number Theory and Cryptology. Kyowoo. (2008), pp.165-172.
  15. Neal Koblitz, Elliptic Curve Cryptosystems. Mathematics of Computation. (1987), vol.48, no.177, pp.203-209. https://doi.org/10.1090/S0025-5718-1987-0866109-5
  16. Taeg-Hee Lee, Chang-Ho Seo, Young-Cheol Kim, Tae-Hun Lee and Bo-Hyun Yun, Elliptic Curve Cryptography Algorithms for IC Card. Journal of KIISE : Computing Practices and Letters. (2004), vol.10, no.4, pp.319-327.