ICE1212 Introduction to Information Security
Tuesday and Thursday, 9:00 ~ 12:00 / L301, Lecture Wing, KAIST-ICC
Click here to download a syllabus file. It includes a course description, references, grading procedure, and course schedule.
Instructor: Prof. Kwangjo Kim (Instructor's webpage)
Teaching Assistant: Zeen Kim (zeenkim@gmail.com)
- Office hour: Thursday 13:00-14:00 (Room R503, Research Wing) or by an appointment
Final Exam: 2009³â 8¿ù 3ÀÏ ¿ù¿äÀÏ ¿ÀÈÄ 1½Ã, °Àǵ¿ L301È£
Quiz (¾Æ·¡ÀÇ ÄûÁî ¹®Á¦¸¸(!) Âü°íÇϽÿÀ)
- Describe why authentication is necessary in RFID system? (RFID/WSN ½½¶óÀ̵å Âü°í)
- RFID ±â¼ú¿¡ ´ëÇØ º¸¾ÈÀÌ Àû¿ëµÇ¾î¾ß ÇÏ´Â ÀÌÀ¯´Â ´ÙÀ½ ±×¸²À» º½À¸·Î½á üũÇغ¼ ¼ö ÀÖ½À´Ï´Ù.
- ±×¸²ÀÇ ÆĶõ ¾çº¹À» ÀÔ°í ÀÖ´Â »ç¶÷À» º¸¸é RFID űװ¡ ºÙ¾î ÀÖ´Â ¸¹Àº ¾ÆÀÌÅÛÀ» ¼ÒÀ¯ÇÏ°í ÀÖ½À´Ï´Ù.
- ¿¹¸¦ µé¾î ÀÌ »ç¶÷ÀÇ °¡¹ß, Ç°¼ÓÀÇ Áö°©, °¡¹æ ¾ÈÀÇ Ã¥ µî¿¡´Â RFID űװ¡ ºÙ¾î ÀÖ¾î RFID ¸®´õ°¡ ÀÌ »ç¶÷À» ¸®µùÇÑ´Ù¸é ÀÌ »ç¶÷Àº ´ë¸Ó¸®ÀÌ°í °¡¹æ ¾ÈÀÇ Ã¥Àº ÀÚº» ¹× °ø»êÁÖÀÇÀÌ°í ¼îÇÎ¹é ¾È¿¡´Â 30¿© Á¡ÀÇ ¶õÁ¦¸®°¡ ´ã°ÜÀÖ´Ù´Â °ÍÀ» ¾Ë ¼ö ÀÖ½À´Ï´Ù. ÀÌ ±×¸²¿¡¼ º¼ ¼ö ÀÖµíÀÌ RFID ±â¼úÀº ù ¹ø° º¸¾È ¹®Á¦Á¡Àº Ä¡¸íÀûÀÎ ÇÁ¶óÀ̹ö½Ã ¹®Á¦ÀÔ´Ï´Ù.
- µÑ°·Î ű×ÀÇ ÀÎÁõÀÌ Áß¿äÇÑ º¸¾È À̽´ÀÔ´Ï´Ù. ÆĶõ ¾çº¹ÀÇ »ç¶÷ÀÌ °¡Áö°í ÀÖ´Â 500 À¯·Î ¶ÇÇÑ RFID ű׷ΠűëµÇ¾î »ç¿ëµÇ°Ô µË´Ï´Ù. ÇÏÁö¸¸ ±×°¡ 500À¯·Î¶ó´Â Á¤º¸¸¦ ´ãÀº ű׸¦ À§Á¶ÇÏ¿© ¼ö¹é, ¼öõ À¯·ÎÀÇ Á¤º¸¸¦ °¡Áö°í Àִ ű׸¦ ¸¸µé¾î ³½´Ù¸é ½É°¢ÇÑ º¸¾È ¹®Á¦°¡ ¹ß»ýÇÏ°Ô µÇ°ÚÁÒ? ±×°¡ ¸¸µé¾î ³½ À§Á¶ űװ¡ Á¤´çÇÑ Å±װ¡ ¾Æ´Ï¶ó°í È®ÀÎÇÏ´Â °úÁ¤ÀÌ ÀÎÁõ °úÁ¤ÀÌ µÇ°Ú½À´Ï´Ù. ÀÎÁõÀº űװ¡ óÀ½ Á¦À۵ǾúÀ» ¶§ ¹é¿£µå ¼¹ö¿Í űװ¡ °øÀ¯ÇÏ´Â Á¤º¸¸¦ ÀÌ¿ëÇÏ¿© ¹Ù¸¥ ű׶ó´Â °ÍÀ» È®ÀÎÇÏ´Â °úÁ¤ÀÔ´Ï´Ù. À§Á¶·Î ¸¸µé¾îÁø º¹Á¦ ű״ ÀÌ·¯ÇÑ Á¤º¸¸¦ °¡Áö°í ÀÖÁö ¾Ê±â ¶§¹®¿¡ Á¤´çÇÏ°Ô ÀÎÁõ ¹ÞÀ» ¼ö ¾ø°ÚÁÒ. ÀÌ¿Ü¿¡µµ ¼¼ºÎÀûÀ¸·Î º¸¸é µµÃ», ¹°¸®Àû °ø°Ý, µ¥ÀÌÅÍ ¼Õ½Ç °ø°Ý µî ¸¹Àº º¸¾È Ãë¾àÁ¡ µéÀÌ Á¸ÀçÇÏ°í ÀÖ½À´Ï´Ù.
- State three security requirements mentioned in this lecture and describe briefly why those requirements should be fulfilled (RFID/WSN ½½¶óÀ̵å Âü°í)
- ¼ö¹é ¼öõ °³ÀÇ ¼¾¼ ³ëµåµéÀÌ ¸ð´ÏÅ͸µÇÏ°íÀÚ ÇÏ´Â ¸ñÇ¥Áö¿¡ ¹èÄ¡µÇ°í, ±âÁö±¹Àº ¼¾¼ ³ëµåµéÀÇ Åë½ÅÀ» ÅëÇÏ¿© ȯ°æ Á¤º¸¸¦ ¸ð´ÏÅ͸µÇÏ°íÀÚ ÇÒ¶§ ù°·Î ¿ä±¸µÇ¾îÁö´Â º¸¾È »çÇ×Àº ±â¹Ð¼ºÀÔ´Ï´Ù. ¼¾¼µéÀÌ ¸ð´ÏÅ͸µÇÑ µ¥ÀÌÅ͵éÀº ¿ÜºÎÀÇ °ø°ÝÀڵ鿡 ÀÇÇØ µµÃ» ´çÇÏ¿© ±×´ë·Î »©¾Ñ±æ ¼ö ÀÖ´Ù. ±×·¸±â ¶§¹®¿¡ ¾ÏÈ£È µîÀÇ ¹æ¹ýÀ» ÅëÇÏ¿© ±â¹Ð¼ºÀÌ º¸ÀåµÇ¾î¾ß ÇÑ´Ù. µÑ°·Î µ¥ÀÌÅÍÀÇ ¹«°á¼ºÀÌ º¸ÀåµÇ¾î¾ß ÇÕ´Ï´Ù. ¼¾¼µé¿¡ ÀÇÇØ ¼öÁýµÈ µ¥ÀÌÅÍ´Â °ø°ÝÀÚ¿¡ ÀÇÇØ º¯Á¶µÇÁö ¾Ê¾Ò´Ù´Â °ÍÀ» º¸Àå ¹Þ¾Æ¾ß ÇÕ´Ï´Ù. ¼Â°·Î ¼¾¼´Â Ç×»ó Á¤»óÀûÀ¸·Î ÀÛµ¿ÇØ¾ß ÇϹǷΠ°¡¿ë¼ºÀÌ º¸ÀåµÇ¾î¾ß ÇÕ´Ï´Ù. ±×¿Ü¿¡µµ ¼ºñ½º °ÅºÎ °ø°Ý, Sybil attack, Hello flood attackµîÀÇ ¼¾¼ ³×Æ®¿öÅ©¿¡ ´ëÇÑ ´Ù¾çÇÑ °ø°ÝµéÀÌ Á¸ÀçÇÏ°í À̸¦ ¸·´Â °ÍÀÌ ¼¾¼ ³×Æ®¿öÅ© º¸¾ÈÀÇ ¸ñÇ¥°¡ µÇ°Ú½À´Ï´Ù.
- Context-aware / invisibility / heterogeneous ¸¦ È°¿ëÇØ Ubiquitous ÄÄÇ»Æà ȯ°æ¿¡ ´ëÇØ Á¤ÀÇÇϽÿÀ.
- À¯ºñÄõÅͽº´Â »ç¶÷ Áß½ÉÀÇ ÄÄÇ»Æà ȯ°æÀ» ÀÌ·ç±â À§ÇØ invisibility°¡ Á¦°øµÇ¾î¾ß Çϸç, À̸¦ À§Çؼ´Â »ç¿ëÀÚÀÇ »óȲ¿¡ ¸Â°Ô ÀûÀýÇÑ ¼ºñ½º¸¦ Á¦°øÇØ ÁÖ´Â context-aware°¡ ÇÊ¿äÇÏ´Ù. ¶ÇÇÑ, ´Ù¾çÇÑ ´Ü¸»ÀÌ »ç¿ëµÇ±â ¶§¹®¿¡ heterogeneous°¡ Á¦°øµÈ´Ù.
- Ubiquitous ÄÄÇ»Æà ȯ°æ¿¡¼ ÀÎÁõ¼¹ö ¹× directory´Â ¿Ö ÇÊ¿äÇÑ°¡?
- ÀÎÁõ¼¹ö´Â »ç¿ëÀÚÀÇ ÇÁ¶óÀ̹ö½Ã¸¦ Á¦°øÇØ Áָ鼵µ ¼ºñ½º Á¦°øÀÚ¿¡°Ô °³º° »ç¿ëÀÚ¸¦ ÀÎÁõÇØ ÁÖ±â À§ÇØ ÇÊ¿äÇÏ´Ù.
- Directory ¼¹ö´Â Service Discovery Protocol¿¡¼ È®À强 ¹× trust management¸¦ ¿ëÀÌÇÏ°Ô ÇØÁØ´Ù.
- ºñ¹ÐÅ° ¾ÏÈ£¿¡¼ °ø°³Å° ¾ÏÈ£·Î, °ø°³Å° ¾ÏÈ£¿¡¼ ID ±â¹Ý ¾ÏÈ£¸¦ »ý°¢ÇÏ°Ô µÈ ±î´ßÀº?
- ºñ¹ÐÅ° ¾ÏÈ£´Â Åë½Å»ç¿ëÀÚ°£ »çÀü¿¡ ¾ÈÀüÇÏ°Ô °øÀ¯µÈ Å°°¡ Á¸ÀçÇØ¾ß ÇÑ´Ù. »ç¿ëÀÚ°¡ ´Ã¾î³²¿¡ µû¶ó ÀÌ·¯ÇÑ Å°ÀÇ °¡Áö¼ö´Â ¸Å¿ì Ä¿Áø´Ù. (n C 2 °³) À̵鿡 ´ëÇÑ È¿°úÀû °ü¸®¸¦ À§ÇØ °ø°³Å° ¾ÏÈ£¸¦ ¼³°èÇÏ°Ô µÇ¾ú´Ù.
- °ø°³Å° ¾ÏÈ£´Â ºñ¹ÐÅ° ¾ÏÈ£ÀÇ Å°°ü¸® ¹®Á¦¸¦ È¿°úÀûÀ¸·Î ÇØ°áÇßÀ¸³ª, ÀÎÁõ±â°ü¿¡ ´ëÇÑ ½Å·Ú¹®Á¦, ÀÎÁõ±¸Á¶ ¹× ÀÎÁõ¼ °ü¸®¿¡ ¸·´ëÇÑ ºñ¿ëÀÌ µé¾î°£´Ù. À̸¦ ±Øº¹Çϱâ À§ÇØ ÀÎÁõ¼°¡ ÇÊ¿ä¾ø´Â ID±â¹Ý ¾ÏÈ£¸¦ »ý°¢ÇÏ°Ô µÇ¾ú´Ù.
- ¿Ö Áõ¸í°¡´É ¾ÈÀü¼ºÀÌ Áß¿äÇÑ°¡?
- ¾ÏÈ£´Â ¼³°è-°ø°Ý-º¸¿Ï-°ø°Ý µîÀ» °è¼ÓÇؼ °ÅÄ£´Ù. ¸¸¾à ¾ÏÈ£ÀÇ ¾ÈÀü¼º¿¡ ´ëÇÑ ³í¸®Àû Áõ¸íÀÌ °á¿©µÇ¾î ÀÖ´Ù¸é, °ø°Ý´çÇÏÁö ¾ÊÀº ¾ÏÈ£ÀÇ ¾ÈÀü¼ºÀÌ ÁÁ´Ù´Â °ÍÀ» º¸ÀåÇÒ ¾î¶² ±Ù°Åµµ ¾ø´Ù. ´Ù¸¸, ÇØ´ç ¾ÏÈ£´Â ¾ÆÁ÷±îÁö °ø°ÝµÈ ¹Ù°¡ ¾øÀ» »ÓÀÎ °ÍÀÌ´Ù. Çö´ëÀÇ ¾ÏÈ£´Â ÀÌ·¯ÇÑ ¾ÏÈ£½Ã½ºÅÛÀÇ ¾ÈÀü¼ºÀ» º¹ÀâµµÀ̷аú °è»êÀÌ·ÐÀÇ ¹æ½ÄÀ» È°¿ëÇÏ¿© ¾ÈÀü¼ºÀ» Áõ¸íÇÏ°í ÀÖ´Ù.
- USIMÀÇ ÁÖ¿ä 2°¡Áö Ư¡Àº?
- (¾ÈÀüÇÑ) ÀúÀå °ø°£
- (È¿À²Àû) ¿¬»ê ´É·Â
- ¹Ì·¡ À̵¿Åë½Å ȯ°æÀÇ ÁÖ¿ä º¯È 3°¡Áö´Â?
- ½º¸¶Æ®Æù µµÀÔ
- FMC (À¯¹«¼± À¶ÇÕ) ȯ°æ
- ¾Û ½ºÅä¾î µµÀÔ
Course Schedule:
2009-06-16 |
|
Overview, Basic Number Theory (Slide)
|
2009-06-18 |
|
Classical Ciphers (Slides)
|
2009-06-23 |
|
Encryptions (Slides)
|
2009-06-25 |
|
Digital Signatures (Slides)
|
2009-06-30 |
|
Hash Functions (Slides)
|
2009-07-02 |
|
Other Cryptographic Primitives (Slides)
|
2009-07-14 |
|
Special Talk : RFID/WSN Security (Slides)
|
2009-07-16 |
|
Special Talk : Ubiquitous computing environment and its security (Slides)
|
2009-07-21 |
|
Special Talk : ID based cryptography and Provable Security (Slides)
|
2009-07-23 |
|
Special Talk : Mobile Phone Security (Slides)
|
2009-07-28 |
|
Special Talk : ÀüÀÚÁ¤ºÎ º¸¾È°ú Á¤º¸º¸È£ 5°³³â °èȹ
|
2009-07-30 |
|
Special Talk : ÀÎÅÍ³Ý Ä§ÇØ»ç°í ´ëÀÀ
|