Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kyo Il Chung is active.

Publication


Featured researches published by Kyo Il Chung.


international conference on computational science and its applications | 2006

New security problem in RFID systems “tag killing”

Dong-Guk Han; Tsuyoshi Takagi; Howon Kim; Kyo Il Chung

Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Using cryptographic primitives to thwart RFID security problems is an approach which has been explored for several years. In this paper, we introduce a new security problem called as Tag Killing which aims to wipe out the functioning of the system, e.g., denial of service attacks. We analyze several well-known RFID protocols which are considered as good solutions with Tag Killing adversary model and we show that most of them have weaknesses and are vulnerable to it.


autonomic and trusted computing | 2007

SPA countermeasure based on unsigned left-to-right recodings

Sung Kyoung Kim; Dong Guk Han; Howon Kim; Kyo Il Chung; Jongin Lim

Vuillaume-Okeya presented unsigned recoding methods for protecting modular exponentiations against side channel attacks, which are suitable for tamper-resistant implementations of RSA or DSA which does not benefit from cheap inversions. This paper describes new recoding methods for producing SPA-resistant unsigned representations which are scanned from left to right (i.e., from the most significant digit to the least significant digit) contrary to the previous ones. Our contributions are as follows; (1) SPAresistant unsigned left-to-right recoding with general width-w, (2) special case when w = 1, i.e., unsigned binary representation using the digit set {1, 2}. These methods reduce the memory required to perform the modular exponentiation gk.


information security practice and experience | 2007

Secure signed radix-r recoding methods for constrained-embedded devices

Dong Guk Han; Sung Kyoung Kim; Howon Kim; Kyo Il Chung; Jongin Lim

This paper presents two recoding methods for a radix-r representation of a secret scalar which are resistant to SPA. These recoding methods are left-to-right so they can be interleaved with a left-to-right scalar multiplication, removing the need to store both a scalar and its recoding. Next, we show the ideas of left-to-right recoding for a radix-r representation lead to simplified recoding methods for a binary representation. In general our proposed algorithms asymptotically require additional (w + 1)-digit and w-bit of RAM in the case of width-w radix-r representation and a special case when r = 2, respectively, which is independent from the digit (bit) size n of the scalar and considerably reduces the required space comparing with previous methods which require n-digit (bit) of RAM additional memory to store the recoded scalar. Consequently, thanks to its left-to-right nature, the scalar multiplication based on it is by far more convenient with respect to memory consumption.


international conference on advanced communication technology | 2006

Implementation of 10 Giga VPN accelerator board

Kihyun Kim; Jang-Hee Yoo; Kyo Il Chung

This paper proposes a VPN accelerator board (VPN-AB), a virtual private network (VPN) protocol designed for trust channel security system (TCSS). The TCSS supports safety communication channel between security nodes in Internet. It furnishes authentication, confidentiality, integrity, and access control to the security node to transmit data packets with IPsec protocol. TCSS consists of Internet key exchange block, and security association block, IPsec engine block. The Internet key exchange block negotiates crypto algorithm and key used in IPsec engine block. Security association blocks setting-up and manages security association information. IPsec engine block treats IPsec packets and consists of networking functions for communication. The IPsec engine block should be embodied by HAV and in-line mode transaction for high speed IPsec processing. Our VPN-AB is implemented with high speed security processor that supports many cryptographic algorithms and in-line mode. We evaluate a small TCSS communication environment, and measure a performance of VPN-AB in the environment. The experiment results show that VPN-AB gets a performance throughput of maximum 15.645 Gbps when we set the IPsec protocol with 3DES-HMAC-MD5 tunnel mode


embedded and ubiquitous computing | 2005

Collision attack on XTR and a countermeasure with a fixed pattern

Dong-Guk Han; Tsuyoshi Takagi; Tae-Hyun Kim; Howon Kim; Kyo Il Chung

Recently, XTR is considered as one of good candidates for more energy efficient cryptosystems. Among the family of XTR algorithms, the Improved XTR Single Exponentiation (XTR-ISE) is the most efficient one suitable for ubiquitous computer. Even though the security of such devices against side channel attacks is very dangerous, there are few works on side channel attacks against XTR-ISE. In this paper we propose a new collision attack on XTR-ISE. The analysis complexity of the proposed one is about 240 where the key size is 160-bit, which is 55% improvement from the previously best known analysis of Page-Stam. We also propose a novel countermeasure using a fixed pattern which is secure against SPA. In the sense of both efficiency and security the proposed countermeasure is the best one among the previous countermeasures- it is about 30% faster.


multimedia and ubiquitous engineering | 2008

IPS/UMS/WNGS/MUS 2008 Workshop Message from the Workshop Organizers MUE 2008

Sang-Soo Yeo; Jong Hyuk Park; Laurence T. Yang; Sajid Hussain; Deok Gyu Lee; Kyo Il Chung; Hyoung Joong Kim; Stefanos Gritzalis; Tai-hoon Kim; Jianhua Ma; Ching-Hsien Hsu; Hai Jin; Shu Ching Chen; Han-Chieh Chao; Zhiwen Yu; Hangbae Chang; Chao-Tung Yang; Abdallah Mhamed; Alessio Botta; Andry Rakotonirainy; Antonio Coronato; Antonio Pescapé; Arek Dadej; Bessam Abdulrazak; Bin Lu; Bo Chao Cheng; Byoung Soo Koh; Dong Myung Shin; Eung Nam Ko; Eun Sun Jung

It is a great pleasure to welcome you to the 2008 IPS/UMS/WNGS/MUS workshop held in conjunction with the International Conference on Multimedia and Ubiquitous Engineering (MUE2008), Hanwha Resort Haeundae, Busan, Korea. The workshop covers topics on ubiquitous multimedia services and security in ubiquitous multimedia systems. All the submitted papers have undergone rigorous review process by the technical program committee members and external reviewers. We have selected 17 best papers for presentation and publication in the conference proceedings.


Archive | 2005

Intrusion detection sensor detecting attacks against wireless network and system and method of detecting wireless network intrusion

Sok Joon Lee; Kyung Hee Oh; Sin Hyo Kim; Young Hwan Ham; Byung Ho Chung; Kyo Il Chung


Archive | 2006

Method and apparatus for providing XML signature service in wireless environment

Jae Seung Lee; Soo Hyung Kim; Ki Young Moon; Kyo Il Chung; Sung Won Sohn


Etri Journal | 2006

An Efficient Selective Encryption of Fingerprint Images for Embedded Processors

Daesung Moon; Yongwha Chung; Sung Bum Pan; Kiyoung Moon; Kyo Il Chung


Archive | 2006

Electronic tag including privacy level information and privacy protection apparatus and method using RFID tag

Byung Gil Lee; Doo Ho Choi; Howon Kim; Kyo Il Chung

Collaboration


Dive into the Kyo Il Chung's collaboration.

Top Co-Authors

Avatar

Howon Kim

Pusan National University

View shared research outputs
Top Co-Authors

Avatar

Deok Gyu Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Geon Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Ki Young Moon

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Doo Ho Choi

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jang Hee Yoo

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jong Soo Jang

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jong Wook Han

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yun Kyung Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge