Introduction of Information Security Research Division Dowon Hong, Ph. D. Cryptography Research Team...

16
Introduction of Information Security Research Division Dowon Hong, Ph. D. Cryptography Research Team 2005. 11. 16.

Transcript of Introduction of Information Security Research Division Dowon Hong, Ph. D. Cryptography Research Team...

Introduction of Information Security Research Division

Dowon Hong, Ph. D.Cryptography Research Team

2005. 11. 16.

Proprietary 2 Joint Workshop

Contents

Overview - Organization of ETRI

- Secure u-IT KOREA

- Global Partnership

Information Security

Research Division - Network Security Research

Group

- - Information Security Information Security

InfrastructureInfrastructure Research GroupResearch Group

Proprietary 3 Joint Workshop

Established in 1976

Korea’s largest Korea’s largest

government funded government funded

research facility in the research facility in the

fields of IT & Comm.fields of IT & Comm.

R&D Fields : R&D Fields :

Semiconductors, Semiconductors,

Mobile Mobile

Communications, Communications,

Networks, Security, etc.Networks, Security, etc.

Organization of ETRI

Proprietary 4 Joint Workshop

Secure u-IT KOREA

IT Soc

Embedded S/W

Next Generation Mobile Communications

Digital TV

Digital Contents

Home Network Next Generation PC

Telematicsu-IT KOREAu-IT KOREA

Security Intelligent Service Robot

Proprietary 5 Joint Workshop

ETRI R&D Global Partnership

•Surf Communication•Runcom Technology(Israel)

Telstra (AU)

PTIT(Vietnam)

CPqD (Brazil)

Simon Fraser U.(Canada)

•NICT•NTT•YRP•JSAT•CBOP•RITE•ATR-SLT•ISIT(Japan)

•JSC•LONIIS (Russia)

Ericsson (Sweden)

• HHI• Siemens• Fhg-IIS (Germany)

• Tsinghna U.• Sountheast U.• Beijing U. Posts &

Telecommunications• Peking U.• NRSCC•CCSA• HIT (China)

• Wi-LAN• Motorola• SCO• Syracuse U.• NCGIA• Kasenna, Inc.• Agere Sys

(USA)

•TNO Tel(Holland)

16 Countries/40 Organization

Proprietary 6 Joint Workshop

Organization of ISRD

Information Security Research Division

Network Security

Research Group

Information Security

Infrastructure Research Group

Project AdministrationTeam

• Network Security Architecture Team

• Security Gateway System Team

• Secure OS Research Team

• Active Security Research Team

• Privacy Protection Research Team

• P2P Security Research Team

• Home Network Security Research

Team

• Cryptography Research Team

• Digital ID Security Research Team

• RFID/USN Security Research Team

• Biometrics Technology Research Team

• Biometrics Chipset Research Team

• Bio Sensor Research Team

• Wireless Security Application Research

Team

Proprietary 7 Joint Workshop

R&D Areas of ISRD

▣ 5 major research areas◈ Network Security, Ubiquitous Security, Bio Security, Security Chipset Tech. Privacy Enhancing Tech.

e-ID Management Harmful Contents Prevention Tech.

1. Network Security Tech.1. Network Security Tech.1. Network Security Tech.1. Network Security Tech. 3. Bio Security Tech.3. Bio Security Tech.3. Bio Security Tech.3. Bio Security Tech.

4. Security Chipset Tech.4. Security Chipset Tech.4. Security Chipset Tech.4. Security Chipset Tech.

20Gbps Security System BcN Security Management IPv6 IDS/IPS Module IPv6 P2P Security

Safety/Reliability for InfraSafety/Reliability for Infra

5. Privacy Enhancing Tech.5. Privacy Enhancing Tech.5. Privacy Enhancing Tech.5. Privacy Enhancing Tech.

User Service ProtectionUser Service Protection

2. Ubiquitous Security Tech.2. Ubiquitous Security Tech.2. Ubiquitous Security Tech.2. Ubiquitous Security Tech.

RFID/USN Security Tech. HomeNetwork Security

Device Intrusion Device Intrusion ResponseResponse

Lightweight encryption/ authentication Module

Chipset Tech. for biometrics

Lightweight/Low power Lightweight/Low power SolutionSolution

ID Service for e-gov./commerceID Service for e-gov./commerce

Biometrics Service System Biometrics Service

Proprietary 8 Joint Workshop

R&D Themes of Network Security Research Group(1)

Next Generation Security System Tech.

Security Gateway System

Secure Router System

Security Management System

Harmful Contents Detection and Filtering Tech.

Proprietary 9 Joint Workshop

R&D Themes of Network Security Research Group(2)

Network Security Tech. for P2P Overlay Networks over

Wired/Wireless IPV6 Infrastructures

Authentication and Authorization Tech. for Home Networks

Secure P2P overlay networkPhysical network virtual mapping

Secure routing signal delivery

Authenticate routing message

Secure P2P memberJ oin&Leave

Authenticate P2P control message

ReliableIPv6 addr, generation Confidential data

leakage prevention

Peer ID

Peer ID

Peer

PeerPeer

Peer

Reliable Node ID generation

Proprietary 10 Joint Workshop

Research Areas of Information Security Infrastructure Group (1)

Cryptographic Algorithm and ProtocolNext Generation Cryptographic Algorithm Design & Analysis

High-speed Cryptographic Processor Design

Privacy Enhancing Technology

Proprietary 11 Joint Workshop

Research Areas of Information Security Infrastructure Group (2)

Digital ID Security

Internet ID Management Technology

Autonomous Identity Federation Bridging Technology

Internet ID Server

PrivacyController

UserUser

Single ID ManagementService

Private InformationPreserving Service

ID Database

Provider ID ServiceProvider ID Service

UserUser

e-Government

e-CommerceID FederationBridge Service

User A

User B

ID InformationProviding Service

DiscoveryService

DiscoveryServer

Internet SSO ServiceID Federation

Bridge Server

Proprietary 12 Joint Workshop

Research Areas of Information Security Infrastructure Group (3)

RFID/USN SecurityLight-weight Crypto Algorithm for RFID & Sensor NetworkLow Power & High Speed ProcessorSecurity Mechanism for RFID/USN Environments

Proprietary 13 Joint Workshop

Research Areas of Information Security Infrastructure Group (4)

User Identification Technology Using Biometrics Multi-modal Biometric & Searching Technology

Biometric Chipset & Bio Sensor Technology

Biometric Data Protection

Biometric ProcessBiometric Process

• Single/Multi-modal Processing • Within Biometric Data

Application ProgramApplication ProgramApplication ProgramApplication ProgramAuthentication Register Management

Application Layer

Bio-APIBio-APIBio-APIBio-APIAPI

Bio-API Framework

Biometric Process Interface

Bio-API Layer

Processing Biometric DataProcessing Biometric DataProcessing Biometric DataProcessing Biometric DataBiometric Data Processing Module (CBEFF)

Data Processing Layer

Biometric Chip Reader Interface

Module

Biometric acquiring Module

(Fingerprint/Face /Iris/Vein

Pattern)

Extracting Module (face/)

검증분할전처리

Apparatus for ChipApparatus for ChipApparatus for ChipApparatus for Chip Sensor for AcquiringSensor for AcquiringSensor for AcquiringSensor for AcquiringDevice Layer

Finger Print

FaceSensor

IrisSensor

Vein

Pattern

생체인식 칩

Chip Reader

Bio

me

tric Ap

plica

tion

P

latfo

rm

• Standard based Application System such as Bio-API

• User Register/Auth. Service

Proprietary 14 Joint Workshop

Research Areas of Information Security Infrastructure Group (5)

Development of Secure Platform for Wireless Network

Inter-working Security Technology for USIM based WCDMA, WiBro & WLAN Security Platform

UAGSUAGS2G

terminal

3G terminal

Roaming server

Portable internet terminal

801.162/WiBroweb

3G(IMT-2000)web2G 망

Terminal interworking

PKITriple-mode

terminal

Triple-mode terminal

PKIUSIM

SIM

USIM

WLAN web

PKI

USIM

WLAN terminal

Interworking between roaming server

for Triple-mode terminal

Authen. proxy

USIM : Universal Subscriber Identity ModuleUAGS : USIM Access Gateway Subsystem

WCDMAWCDMACDMACDMA

WiBroWiBro

PPWWLLAANN

Roaming serverAuthen. proxy

Roaming serverAuthen. proxy

Roaming serverAuthen. proxy

Se

curity fo

r Te

rmin

al-clie

nt

Proprietary 15 Joint Workshop

Future R&D Plans in Information Security Infrastructure Group

Powerful InitiativePowerful Initiative

Information Security Privacy Preserving Tech.

Efficient Digital ID Management

Wireless Network System

RFID/USN Service

High-level Service for Ubiquitous Environments

Conversion of BT & IT

Multi-modal Biometric Identification Tech.

Biosensor

Next Generation Cryptography

PETs

Cryptographic Protocols

Proprietary 16 Joint Workshop

Thank Youfor your

Attention!