A countermeasure of fake root key installation using one-time hash chain

Lee Younggyo, Ahn Jeonghee, Kim Seungjoo, Won Dongho

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Adil Alsaid and Chris J. Mitchell proposed the possibility of fake root public key installation by an attacker in user's PC and showed its countermeasures in 2005. The root public keys are used to verify the certificates for applet providers. Therefore the insertion of false public keys allows arbitrary numbers of rogue application to be executed on a user's PC. We propose a protection method for installing fake root keys in a user's PC. The method uses the one-time hash chain based on NOVOMODO. In the proposal, as the computation costs and the storage amounts for hash chain are very small, the proposed method will not be a big load to the publisher of the browser, the applet provision agent and the user. The implementation of the method is simple and it offers convenient authentication of the root to the user. Therefore, the method can provide a intelligent and secure agent technique for the digital content distribution.

Original languageEnglish
Title of host publicationAgent and Multi-Agent Systems
Subtitle of host publicationTechnologies and Applications - First KES International Symposium, KES-AMSTA 2007, Proceedings
Pages1007-1016
Number of pages10
Publication statusPublished - 2007
Event1st KES International Symposium on Agent and Multi-Agent Systems - Technologies and Applications, KES-AMSTA 2007 - Wroclaw, Poland
Duration: 2007 May 312007 Jun 1

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4496 LNAI
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other1st KES International Symposium on Agent and Multi-Agent Systems - Technologies and Applications, KES-AMSTA 2007
CountryPoland
CityWroclaw
Period07/5/3107/6/1

Keywords

  • Applet distribution agent
  • Applet provider
  • Hash chain
  • Publisher of the browser
  • Root public key
  • Web browser

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'A countermeasure of fake root key installation using one-time hash chain'. Together they form a unique fingerprint.

  • Cite this

    Younggyo, L., Jeonghee, A., Seungjoo, K., & Dongho, W. (2007). A countermeasure of fake root key installation using one-time hash chain. In Agent and Multi-Agent Systems: Technologies and Applications - First KES International Symposium, KES-AMSTA 2007, Proceedings (pp. 1007-1016). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4496 LNAI).