• 검색 결과가 없습니다.

MANET 환경에서 강인한 OTP-EKE 인증기법

N/A
N/A
Protected

Academic year: 2022

Share "MANET 환경에서 강인한 OTP-EKE 인증기법"

Copied!
110
0
0

로드 중.... (전체 텍스트 보기)

전체 글

(1)

2008년 2월 박사학위 논문

MANET 환경에서 강인한 OTP-EKE 인증기법

조선대학교 대학원

컴 퓨 터 공 학 과

이 철 승

(2)

MANET 환경에서 강인한 OTP-EKE 인증기법

A RobustOTP-EKE AuthenticationScheme inMANET Environments

2008년 2월 일

조선대학교 대학원

컴 퓨 터 공 학 과

이 철 승

(3)

MANET 환경에서 강인한 OTP-EKE 인증기법

지도교수 :이 준

이 논문을 공학 박사 학위신청 논문으로 제출함

2007년 11월 일

조선대학교 대학원

컴 퓨 터 공 학 과

이 철 승

(4)
(5)

목 목 목 차 차 차 L

L

Li i is s st t to o of f fT T Ti i it t tl l le e es s s

표 목 차

·················································································································································································································································································································································································iiiiiiiii

도 목 차

·················································································································································································································································································································································································iiivvv

약 어

·················································································································································································································································································································································································vvviii

ABSTRACT

·······································································································································································································································································································································vvviiiiiiiii

Ⅰ. . .서 서 서 론 론 론

····························································································································································································································································································································································111

Ⅱ. . .M M MA A AN N NE E ET T T 보 보 보안 안 안 환 환 환경 경 경 및 및 및 인 인 인증 증 증기 기 기법 법 법

······························································································································333

A A

A...AAAOOODDDVVV 라라라우우우팅팅팅 프프프로로로토토토콜콜콜·····················································································································································································································555 B

B

B...위위위협협협과과과 공공공격격격유유유형형형···········································································································································································································································································111000 C

C

C...MMMAAAEEENNNTTT 인인인증증증기기기법법법····························································································································································································································································111222

1 1 1. . .O O OT T TP P P를 를 를 이 이 이용 용 용한 한 한 인 인 인증 증 증기 기 기법 법 법

···············································································································································································································111444

2 2 2. . .O O OT T TP P P를 를 를 이 이 이용 용 용한 한 한 인 인 인증 증 증기 기 기법 법 법의 의 의 문 문 문제 제 제점 점 점

··········································································································································222333

Ⅲ. . .패 패 패스 스 스워 워 워드 드 드 기 기 기반 반 반 키 키 키 교 교 교환 환 환 프 프 프로 로 로토 토 토콜 콜 콜

························································································································222666

A A

A...패패패스스스워워워드드드 암암암호호호화화화를를를 위위위한한한 세세세션션션키키키 생생생성성성············································································································222777 B

B

B...세세세션션션키키키를를를 이이이용용용한한한 인인인증증증키키키 교교교환환환 프프프로로로토토토콜콜콜·····························································································333000

1 1 1. . .E E EK K KE E E 프 프 프로 로 로토 토 토콜 콜 콜

·······················································································································································································································································································333222

2 2 2. . .D D DH H H- - -E E EK K KE E E 프 프 프로 로 로토 토 토콜 콜 콜

···················································································································································································································································333555

참조

관련 문서

• 사용자의 인지나 허락없이 실행되도록 하기 위해 다른 소프트웨어나 데이터 파일에 첨부시키는 악성 소프트웨어

Cloud ID는 IDaaS(Identity as a Service) 및 엔터프라이즈 모바일 관리(EMM) 제품 G Suite에서 사용할 수 있는 독립형 제품으로 ID 서비스 및 엔드포인트 관리

앱과 사용자의 빠른 직접 연결, 보안 블랙홀 제거 150 데이터센터를 통한 보안.

기존까지 미국방성 으로부터 유일하게 인정받은 보안 기술을 가진 솔라리스를 무상으로 사용하게 됨에 따라서 전체적으로 혹은 선택적으로 솔라리스 기반의 강력한 보안

차세대 방화벽 보안 웹 게이트웨이 ATP: 지능형 위협 방어 클라우드 및 모바일 보안 Cloud 최적화. WAN 최적화 Global Route 최적화

• 모든 데이터 암호화, 보안 패치 자동 적용. • 자동

사물인터넷 상에서 동작하는 각 장치들이 안전한 보안 연산 환경을 보장하기 위해서는 처음 스위치가 켜 졌을 때 펌웨어에 대한 인증 값을 검증하여 무결성을 확인할 수

공격에 대한 신속한 식별 및 대응이 가능한 지능화된 접근 제어모델을 위해 본 논문에서는 전력시스템에 가해지는 보안 취약점 및 공격 상황을 분석하고, 상황 인 식을