A countermeasure of fake root key installation using one-time hash chain

Lee Younggyo, Ahn Jeonghee, Seung-Joo Kim, Won Dongho

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Adil Alsaid and Chris J. Mitchell proposed the possibility of fake root public key installation by an attacker in user's PC and showed its countermeasures in 2005. The root public keys are used to verify the certificates for applet providers. Therefore the insertion of false public keys allows arbitrary numbers of rogue application to be executed on a user's PC. We propose a protection method for installing fake root keys in a user's PC. The method uses the one-time hash chain based on NOVOMODO. In the proposal, as the computation costs and the storage amounts for hash chain are very small, the proposed method will not be a big load to the publisher of the browser, the applet provision agent and the user. The implementation of the method is simple and it offers convenient authentication of the root to the user. Therefore, the method can provide a intelligent and secure agent technique for the digital content distribution.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages1007-1016
Number of pages10
Volume4496 LNAI
Publication statusPublished - 2007 Dec 1
Externally publishedYes
Event1st KES International Symposium on Agent and Multi-Agent Systems - Technologies and Applications, KES-AMSTA 2007 - Wroclaw, Poland
Duration: 2007 May 312007 Jun 1

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4496 LNAI
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other1st KES International Symposium on Agent and Multi-Agent Systems - Technologies and Applications, KES-AMSTA 2007
CountryPoland
CityWroclaw
Period07/5/3107/6/1

    Fingerprint

Keywords

  • Applet distribution agent
  • Applet provider
  • Hash chain
  • Publisher of the browser
  • Root public key
  • Web browser

ASJC Scopus subject areas

  • Biochemistry, Genetics and Molecular Biology(all)
  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Younggyo, L., Jeonghee, A., Kim, S-J., & Dongho, W. (2007). A countermeasure of fake root key installation using one-time hash chain. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4496 LNAI, pp. 1007-1016). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4496 LNAI).