Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö ÄÄÇ»ÅÍ ¹× Åë½Å½Ã½ºÅÛ
Current Result Document :
ÇѱÛÁ¦¸ñ(Korean Title) |
SRTP, MIKEY, CMS, IPSec, TLS, IPTV¿¡ ´ëÇÑ Æеù ¿À¶óŬ °ø°Ý °¡´É¼º ºÐ¼® |
¿µ¹®Á¦¸ñ(English Title) |
Analysis of Padding Oracle Attack Possibility about Application Environment; SRTP, MIKEY, CMS, IPSec, TLS, IPTV |
ÀúÀÚ(Author) |
Ȳ¼ºÁø
¹Ú¸í¼
¹®´öÀç
°Çüö
±èÁ¾¼º
ÀÌâÈÆ
Seongjin Hwang
Myungseo Park
Dukjae Moon
HyungChul Kang
Jongsung Kim
Changhoon Lee
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 04 NO. 02 PP. 0073 ~ 0080 (2015. 02) |
Çѱ۳»¿ë (Korean Abstract) |
ÀÎÅͳݻóÀÇ ´Ù¾çÇÑ ÀÀ¿ëȯ°æ¿¡¼´Â °³ÀÎÁ¤º¸ ¹× ¹Î°¨ÇÑ Á¤º¸¸¦ º¸È£Çϱâ À§Çؼ ¾ÈÀü¼ºÀÌ °ËÁõµÈ ¾ÏÈ£ ¾Ë°í¸®ÁòÀ» »ç¿ëÇÑ´Ù. ÇÏÁö¸¸ ¾ÈÀü¼ºÀÌ °ËÁõµÈ ¾ÏÈ£ ¾Ë°í¸®ÁòÀ» »ç¿ëÇÏ¿©µµ ÁÖ¾îÁø ¾ÏÈ£ ¾Ë°í¸®ÁòÀ» Àû¿ëÇÏ´Â ¹æ½ÄÀÌ ¿Ã¹Ù¸£Áö ¸øÇÏ¸é º¸È£ÇÏ°íÀÚ ÇÏ´Â Á¤º¸µéÀÌ ´©ÃâµÉ ¼ö ÀÖ´Ù´Â ¿¬±¸ °á°ú¿Í °ø°Ý±â¹ýµéÀÌ ¼Ò°³µÇ°í ÀÖ´Ù. ÀÌ °ø°Ý¹æ¹ýµé Áß ´ëÇ¥ÀûÀÎ »ç·Ê°¡ Æеù ¿À¶óŬ °ø°ÝÀÌ´Ù. º» ³í¹®¿¡¼´Â ºí·Ï ¾ÏÈ£ ±â¹Ý CBC ¿î¿µ¸ðµå¿Í CBC Æеù ¹æ¹ýÀ» Àû¿ëÇÏ´Â ÀÀ¿ëȯ°æÀÎ STRP, MIKEY, CMS, IPSec, TLS, IPTV¿¡ ´ëÇØ Æеù ¿À¶óŬ °ø°ÝÀ» Àû¿ëÇÏ°í, Æеù ¿À¶óŬ °ø°Ý¿¡ ´ëÇÑ °ø°Ý °¡´É ¿©ºÎ ¹× Ãë¾àÁ¡¿¡ °üÇÏ¿© ¿¬±¸ÇÏ¿´´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
In the various application environments on the internet, we use verified cipher algorithm to protect personal information. Even so, if an application method isn¡¯t proper, the information you want to keep can be intercepted. One of the representative examples of it is a PADDING ORACLE ATTACK. This thesis studied about STRP, MIKEY, CMS, IPSec, TLS, IPTV, an application environment which apply CBC operational mode based on block cipher and CBC padding method, and about whether we can attack against the Padding Oracle Attack as well as the vulnerable points.
|
Å°¿öµå(Keyword) |
ºí·Ï ¾ÏÈ£
Æеù
Æеù ¿À¶óŬ °ø°Ý
Block Cipher
Padding
Padding Oracle Attack
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|