download0 view737
twitter facebook

공공누리This item is licensed Korea Open Government License

dc.contributor.author
이동춘
dc.contributor.author
김점구
dc.contributor.author
국윤주
dc.contributor.author
이문복
dc.contributor.author
이동엽
dc.contributor.author
나원식
dc.contributor.author
전은아
dc.contributor.author
이종구
dc.contributor.author
김태욱
dc.date.accessioned
2018-11-02T04:54:44Z
dc.date.available
2018-11-02T04:54:44Z
dc.date.issued
2003-12
dc.identifier.other
J4
dc.identifier.uri
https://repository.kisti.re.kr/handle/10580/10450
dc.identifier.uri
http://www.ndsl.kr/ndsl/search/detail/report/reportSearchResultDetail.do?cn=TRKO200500060136
dc.description
funder : 국무조정실
dc.description.abstract
- 신분확인의 정의 및 기존 기법들의 조사 및 이론적 분석
- 신분확인 기법들의 위협 요소와 다양한 공격 방법에 대한 분석
- UNIX 패스워드의 신분확인 기법 및 다양한 공격 방법 분석
- UNIX 패스워드 시스템의 신분확인 기능들의 평가 요소 도출 및 정립
- S/Key 패스워드의 신분확인 기법 및 다양한 공격 방법 분석
- 일방향 해쉬합수의 공격 방안 및 안정성 분석
- S/Key 시스템의 신분확인 기능의 평가 요소 도출 및 정립
- 시스템 통합 구현
dc.description.abstract
III. Content and Scope of The Study
- Construction of system configuration for system development.
- Analysis of system requirement.
- Propose of security policy for public infrastructure network.
- Coding of functional modules and implementation of the prototype
- Test of functional modules and real system.
- Encoding to have made IPsec of the RFC 2401 which advocated in IETF a basis and a way proposal to include authentication security capability in kernel.
- Forge a packet evaluation materials generation (let kernel include a forgery function.)
- In inspects integrity of data in a receipt side if it did not play with the case that it attacked in Gateway.
- It is good at an operation of information about a changed packet is read, and a user washing information about packet modulation with a box.
- It measures integrity with an acid time enemy and sets up a forgery position and the packet number of a packet to forge as dynamic through a user input.
- A way proposal it does not let you change a checksum price to must let a checksum of a transport layer going through if a packet was forged for integrity verification in an application layer, and to forge.
dc.publisher
한국과학기술정보연구원
dc.publisher
Korea Institute of Science and Technology Information
dc.title
공공기간망에서 정보보호 시스템 보안성의 통합 자동화분석 방법
dc.title.alternative
Automatical Integrated Analysis Scheme of Information Security System in Public Infrastructure Networks
dc.contributor.alternativeName
Lee, Dong-Choon
dc.contributor.alternativeName
Kim, Jum-Goo
dc.contributor.alternativeName
Guk, Yoon-Ju
dc.contributor.alternativeName
Lee, Moon-Bok
dc.contributor.alternativeName
Lee, Dong-Yeop
dc.contributor.alternativeName
Na, Won-Sik
dc.contributor.alternativeName
Jun, Eun-A
dc.contributor.alternativeName
Lee, Jong-Goo
dc.contributor.alternativeName
Kim, Tae-Wook
dc.identifier.localId
TRKO200500060136
dc.identifier.url
http://www.ndsl.kr/ndsl/commons/util/ndslOriginalView.do?dbt=TRKO&cn=TRKO200500060136
dc.subject.keyword
S/Key
dc.subject.keyword
패스워드
dc.subject.keyword
일방향 해쉬함수
dc.subject.keyword
시스템 통합 구현
dc.subject.keyword
S/Key Password
dc.subject.keyword
One-way Hashing Function
dc.subject.keyword
Integrated System Implementation
dc.identifier.koi
KISTI2.1015/RPT.TRKO200500060136
Appears in Collections:
7. KISTI 연구성과 > 연구보고서 > 2003
Files in This Item:
There are no files associated with this item.

Browse