원문정보
초록
영어
In the daily-real systems, protecting the data only is far less enough. The process about the generation, distribution, storage, and the revocation of the key is the core problem in the system-security consideration. If the management of the key is insecure, attackers could easily get the key used in the encryption steps to the context, leading to useless processing in the encryption no matter how secure the system be. Unlike the period of validity for the different key, the key can easily be attacked by various methods due to its distribution through the complex net links, which would bring about the threatening of the security. In this paper, we analyze three models of the key distribution, associated with the actual applications for the encryption in the hypermedia video stream. Besides, we raise up a new protocol based on the IKEV2 distribution protocol and evaluate the stability when it suffer the Man-in –the-Middle Attacks, DoS and Replay attacks.
목차
1. Introduction
2. Three Key Distribution Models
3. Proposed Protocols
3.1. KEP Protocol
3.2. KDP Protocol
4. Ability Against the Three Attacks
Acknowledgement
References