Internet Security

As the Internet utilized as a new commercial infrastructure, meeting security requirements of diverse applications becomes imminent. Furthermore, the Web and browsers bring have brought the Internet to homes of average people, creating not only a surge in use of the Internet but also a risk to their privacy. Internet security aims to ensure confidentiality, authentication, integrity, and nonreputiation of the ‘‘information’’ carried over a collection of interconnected, heterogeneous networks via messages. Confidentiality or privacy prevents unauthorized parties from accessing the message. Authentication requires that source of a message has correct and verifiable identity. Integrity protection of information ensures that unauthorized parties cannot modify the information. Nonreputiation of information requires that the sender and receiver of the information cannot deny the transmission of the message. In general, the security attacks can be grouped into several classes:

[1]  H. Feistel Cryptography and Computer Privacy , 1973 .

[2]  Michel Raynal,et al.  Distributed algorithms and protocols , 1988 .

[3]  Steven M. Bellovin,et al.  Problem Areas for the IP Security Protocols , 1996, USENIX Security Symposium.

[4]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and CRL Profile , 1999, RFC.

[5]  S. M. Bellovin,et al.  Security problems in the TCP/IP protocol suite , 1989, CCRV.

[6]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[7]  Matthew J. Weiner,et al.  Efficient DES Key Search , 1994 .

[8]  Bruce Schneier,et al.  Analysis of the SSL 3.0 protocol , 1996 .

[9]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.

[10]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[11]  Hugh Harney,et al.  Group Key Management Protocol (GKMP) Architecture , 1997, RFC.

[12]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[13]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[14]  Xu Mei Internet Key Exchange , 2003 .

[15]  G. L. Collected Papers , 1912, Nature.

[16]  Stephen T. Kent,et al.  Secure Border Gateway Protocol (S-BGP) , 2000, IEEE Journal on Selected Areas in Communications.

[17]  Simon S. Lam,et al.  Digital signatures for flows and multicasts , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).

[18]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[19]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[20]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[21]  Hugh Harney,et al.  Group Key Management Protocol (GKMP) Specification , 1997, RFC.

[22]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[23]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[24]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.