160 likes | 305 Views
Introduction of Information Security Research Division. 2005. 11. 16. Dowon Hong, Ph. D. Cryptography Research Team. Contents. Overview - Organization of ETRI - Secure u-IT KOREA - Global Partnership Information Security Research Division - Network Security Research Group
E N D
Introduction of Information Security Research Division 2005. 11. 16. Dowon Hong, Ph. D. Cryptography Research Team
Contents • Overview - Organization of ETRI - Secure u-IT KOREA - Global Partnership • Information Security Research Division - Network Security Research Group - Information Security Infrastructure • Research Group
Organization of ETRI • Established in 1976 • Korea’s largest government funded research facility in the fields of IT & Comm. • R&D Fields : Semiconductors, Mobile Communications, Networks, Security, etc.
Secure u-IT KOREA IT Soc Embedded S/W Digital Contents Next Generation Mobile Communications u-IT KOREA Telematics Security Intelligent Service Robot Digital TV Home Network Next Generation PC
ETRI R&D Global Partnership Simon Fraser U. (Canada) • JSC • LONIIS (Russia) Ericsson (Sweden) • TNO Tel • (Holland) • NICT • NTT • YRP • JSAT • CBOP • RITE • ATR-SLT • ISIT(Japan) • HHI • Siemens • Fhg-IIS • (Germany) • Wi-LAN • Motorola • SCO • Syracuse U. • NCGIA • Kasenna, Inc. • Agere Sys • (USA) PTIT (Vietnam) • Surf Communication • Runcom Technology • (Israel) • Tsinghna U. • Sountheast U. • Beijing U. Posts & • Telecommunications • Peking U. • NRSCC • CCSA • HIT (China) CPqD (Brazil) Telstra (AU) 16 Countries/40 Organization
Organization of ISRD Information Security Research Division Project Administration Team Network Security Research Group Information Security Infrastructure Research Group • Cryptography Research Team • Digital ID Security Research Team • RFID/USN Security Research Team • Biometrics Technology Research Team • Biometrics Chipset Research Team • Bio Sensor Research Team • Wireless Security Application Research Team • Network Security Architecture Team • Security Gateway System Team • Secure OS Research Team • Active Security Research Team • Privacy Protection Research Team • P2P Security Research Team • Home Network Security Research Team
R&D Areas of ISRD • 5 major research areas • Network Security, Ubiquitous Security, Bio Security, Security Chipset Tech. Privacy Enhancing Tech. 1. Network Security Tech. 3. Bio Security Tech. Safety/Reliability for Infra • 20Gbps Security System • BcN Security Management • IPv6 IDS/IPS Module • IPv6 P2P Security ID Service for e-gov./commerce • Biometrics Service System • Biometrics Service 4. Security Chipset Tech. Lightweight/Low power Solution 2. Ubiquitous Security Tech. • Lightweight encryption/ • authentication Module • Chipset Tech. for biometrics 5. Privacy Enhancing Tech. Device Intrusion Response • RFID/USN Security Tech. • HomeNetwork Security User Service Protection • e-ID Management • Harmful Contents Prevention Tech.
R&D Themes of Network Security Research Group(1) • Next Generation Security System Tech. • Security Gateway System • Secure Router System • Security Management System • Harmful Contents Detection and Filtering Tech.
R&D Themes of Network Security Research Group(2) • Network Security Tech. for P2P Overlay Networks over Wired/Wireless IPV6 Infrastructures • Authentication and Authorization Tech. for Home Networks
Research Areas of Information Security Infrastructure Group (1) • Cryptographic Algorithm and Protocol • Next Generation Cryptographic Algorithm Design & Analysis • High-speed Cryptographic Processor Design • Privacy Enhancing Technology
Provider ID Service User Discovery Service ID Database e-Government ID Information Providing Service Discovery Server e-Commerce ID Federation Bridge Service Single ID Management Service User Internet SSO Service Internet ID Server ID Federation Bridge Server User A Private Information Preserving Service Privacy Controller User B Research Areas of Information Security Infrastructure Group (2) • Digital ID Security • Internet ID Management Technology • Autonomous Identity Federation Bridging Technology
Research Areas of Information Security Infrastructure Group (3) • RFID/USN Security • Light-weight Crypto Algorithm for RFID & Sensor Network • Low Power & High Speed Processor • Security Mechanism for RFID/USN Environments
Standard based Application System such as Bio-API • User Register/Auth. Service Biometric Process Application Layer Application Program Authentication Register Management Bio-API Layer Biometric Application Platform Bio-API API Bio-API Framework Biometric Process Interface Data Processing Layer Processing Biometric Data Biometric Data Processing Module (CBEFF) Biometric Chip Reader Interface Module Biometric acquiring Module (Fingerprint/Face /Iris/Vein Pattern) Extracting Module (face/) 전처리 검증 분할 Device Layer Apparatus for Chip Sensor for Acquiring Face Sensor Iris Sensor Vein Pattern 생체인식 칩 Chip Reader Finger Print • Single/Multi-modal Processing • Within Biometric Data Research Areas of Information Security Infrastructure Group (4) • User Identification Technology Using Biometrics • Multi-modal Biometric & Searching Technology • Biometric Chipset & Bio Sensor Technology • Biometric Data Protection
Portable internet terminal USIM PKI WiBro Security for Terminal-client Terminal interworking 801.162/WiBro web 3G terminal UAGS USIM Authen. proxy 2G terminal 3G(IMT-2000)web Roaming server Authen. proxy Authen. proxy PKI Authen. proxy Triple-mode terminal 2G망 SIM Roaming server Roaming server CDMA Roaming server WCDMA PWLAN WLAN web WLAN terminal USIM Triple-mode terminal PKI USIM : Universal Subscriber Identity Module UAGS : USIM Access Gateway Subsystem Interworking between roaming server for Triple-mode terminal Research Areas of Information Security Infrastructure Group (5) • Development of Secure Platform for Wireless Network • Inter-working Security Technology for USIM based WCDMA, WiBro & WLAN Security Platform
Future R&D Plans in Information Security Infrastructure Group Powerful Initiative Information Security Privacy Preserving Tech. Next Generation Cryptography • PETs • Cryptographic Protocols High-level Service for Ubiquitous Environments • Efficient Digital ID Management • Wireless Network System • RFID/USN Service Conversion of BT & IT • Multi-modal Biometric Identification Tech. • Biosensor
Thank You for your Attention!