1 / 16

Introduction of Information Security Research Division

Introduction of Information Security Research Division. 2005. 11. 16. Dowon Hong, Ph. D. Cryptography Research Team. Contents. Overview - Organization of ETRI - Secure u-IT KOREA - Global Partnership Information Security Research Division - Network Security Research Group

moses
Download Presentation

Introduction of Information Security Research Division

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introduction of Information Security Research Division 2005. 11. 16. Dowon Hong, Ph. D. Cryptography Research Team

  2. Contents • Overview - Organization of ETRI - Secure u-IT KOREA - Global Partnership • Information Security Research Division - Network Security Research Group - Information Security Infrastructure • Research Group

  3. Organization of ETRI • Established in 1976 • Korea’s largest government funded research facility in the fields of IT & Comm. • R&D Fields : Semiconductors, Mobile Communications, Networks, Security, etc.

  4. Secure u-IT KOREA IT Soc Embedded S/W Digital Contents Next Generation Mobile Communications u-IT KOREA Telematics Security Intelligent Service Robot Digital TV Home Network Next Generation PC

  5. ETRI R&D Global Partnership Simon Fraser U. (Canada) • JSC • LONIIS (Russia) Ericsson (Sweden) • TNO Tel • (Holland) • NICT • NTT • YRP • JSAT • CBOP • RITE • ATR-SLT • ISIT(Japan) • HHI • Siemens • Fhg-IIS • (Germany) • Wi-LAN • Motorola • SCO • Syracuse U. • NCGIA • Kasenna, Inc. • Agere Sys • (USA) PTIT (Vietnam) • Surf Communication • Runcom Technology • (Israel) • Tsinghna U. • Sountheast U. • Beijing U. Posts & • Telecommunications • Peking U. • NRSCC • CCSA • HIT (China) CPqD (Brazil) Telstra (AU) 16 Countries/40 Organization

  6. Organization of ISRD Information Security Research Division Project Administration Team Network Security Research Group Information Security Infrastructure Research Group • Cryptography Research Team • Digital ID Security Research Team • RFID/USN Security Research Team • Biometrics Technology Research Team • Biometrics Chipset Research Team • Bio Sensor Research Team • Wireless Security Application Research Team • Network Security Architecture Team • Security Gateway System Team • Secure OS Research Team • Active Security Research Team • Privacy Protection Research Team • P2P Security Research Team • Home Network Security Research Team

  7. R&D Areas of ISRD • 5 major research areas • Network Security, Ubiquitous Security, Bio Security, Security Chipset Tech. Privacy Enhancing Tech. 1. Network Security Tech. 3. Bio Security Tech. Safety/Reliability for Infra • 20Gbps Security System • BcN Security Management • IPv6 IDS/IPS Module • IPv6 P2P Security ID Service for e-gov./commerce • Biometrics Service System • Biometrics Service 4. Security Chipset Tech. Lightweight/Low power Solution 2. Ubiquitous Security Tech. • Lightweight encryption/ • authentication Module • Chipset Tech. for biometrics 5. Privacy Enhancing Tech. Device Intrusion Response • RFID/USN Security Tech. • HomeNetwork Security User Service Protection • e-ID Management • Harmful Contents Prevention Tech.

  8. R&D Themes of Network Security Research Group(1) • Next Generation Security System Tech. • Security Gateway System • Secure Router System • Security Management System • Harmful Contents Detection and Filtering Tech.

  9. R&D Themes of Network Security Research Group(2) • Network Security Tech. for P2P Overlay Networks over Wired/Wireless IPV6 Infrastructures • Authentication and Authorization Tech. for Home Networks

  10. Research Areas of Information Security Infrastructure Group (1) • Cryptographic Algorithm and Protocol • Next Generation Cryptographic Algorithm Design & Analysis • High-speed Cryptographic Processor Design • Privacy Enhancing Technology

  11. Provider ID Service User Discovery Service ID Database e-Government ID Information Providing Service Discovery Server e-Commerce ID Federation Bridge Service Single ID Management Service User Internet SSO Service Internet ID Server ID Federation Bridge Server User A Private Information Preserving Service Privacy Controller User B Research Areas of Information Security Infrastructure Group (2) • Digital ID Security • Internet ID Management Technology • Autonomous Identity Federation Bridging Technology

  12. Research Areas of Information Security Infrastructure Group (3) • RFID/USN Security • Light-weight Crypto Algorithm for RFID & Sensor Network • Low Power & High Speed Processor • Security Mechanism for RFID/USN Environments

  13. Standard based Application System such as Bio-API • User Register/Auth. Service Biometric Process Application Layer Application Program Authentication Register Management Bio-API Layer Biometric Application Platform Bio-API API Bio-API Framework Biometric Process Interface Data Processing Layer Processing Biometric Data Biometric Data Processing Module (CBEFF) Biometric Chip Reader Interface Module Biometric acquiring Module (Fingerprint/Face /Iris/Vein Pattern) Extracting Module (face/) 전처리 검증 분할 Device Layer Apparatus for Chip Sensor for Acquiring Face Sensor Iris Sensor Vein Pattern 생체인식 칩 Chip Reader Finger Print • Single/Multi-modal Processing • Within Biometric Data Research Areas of Information Security Infrastructure Group (4) • User Identification Technology Using Biometrics • Multi-modal Biometric & Searching Technology • Biometric Chipset & Bio Sensor Technology • Biometric Data Protection

  14. Portable internet terminal USIM PKI WiBro Security for Terminal-client Terminal interworking 801.162/WiBro web 3G terminal UAGS USIM Authen. proxy 2G terminal 3G(IMT-2000)web Roaming server Authen. proxy Authen. proxy PKI Authen. proxy Triple-mode terminal 2G망 SIM Roaming server Roaming server CDMA Roaming server WCDMA PWLAN WLAN web WLAN terminal USIM Triple-mode terminal PKI USIM : Universal Subscriber Identity Module UAGS : USIM Access Gateway Subsystem Interworking between roaming server for Triple-mode terminal Research Areas of Information Security Infrastructure Group (5) • Development of Secure Platform for Wireless Network • Inter-working Security Technology for USIM based WCDMA, WiBro & WLAN Security Platform

  15. Future R&D Plans in Information Security Infrastructure Group Powerful Initiative Information Security Privacy Preserving Tech. Next Generation Cryptography • PETs • Cryptographic Protocols High-level Service for Ubiquitous Environments • Efficient Digital ID Management • Wireless Network System • RFID/USN Service Conversion of BT & IT • Multi-modal Biometric Identification Tech. • Biosensor

  16. Thank You for your Attention!

More Related