DOI QR코드

DOI QR Code

A Study on the design of mixed block crypto-system using subordinate relationship of plaintext and key

평문과 키의 종속관계를 이용한 혼합형 블록 암호시스템 설계에 관한 연구

  • Lee, Seon-Keun (Dept. of IT Applied System Engineering, Chonbuk national University)
  • 이선근 (전북대학교 IT응용시스템공학과)
  • Received : 2010.05.28
  • Accepted : 2010.11.03
  • Published : 2011.01.31

Abstract

Plaintext and key are independent in the existing block cipher. Also, encryption/decryption is performed by using structural features. Therefore, the external environment of suggested mixed cryptographic algorithm is identical with the existing ones, but internally, features of the existing block cipher were meant to be removed by making plaintext and key into dependent functions. Also, to decrease the loads on the authentication process, authentication add-on with dependent characteristic was included to increase the use of symmetric cryptographic algorithm. Through the simulation where the proposed cryptosystem was implemented in the chip level, we show that our system using the shorter key length than the length of the plaintext is two times faster than the existing systems.

기존 블록 암호알고리즘은 평문과 키가 독립적이다. 또한 구조적인 특징을 이용하여 암/복호화를 수행한다. 이러한 특징은 해킹의 근거자료로 활용된다. 그러므로 제안된 혼합형 암호알고리즘은 외부환경은 기존과 동일하지만 내부적으로 평문과 키를 종속함수로 만들어 기존 블록암호알고리즘의 특징을 없애고자 하였다. 또한 인증처리에 대한 부하를 줄이기 위하여, 종속특징을 가진 인증 부가기능을 포함시켜 대칭형 암호알고리즘 활용을 증대시키고자 하였다. 제안된 혼합형 암호시스템을 칩 레벨로 구현하여 모의실험을 수행한 결과, 기존 시스템에 비하여 키 길이는 평문보다 작지만, 처리속도는 2배 높은 특징을 확인하였다.

Keywords

References

  1. E. Biham, "On the Applicability of Differential Cryptanalysis to Hash Functions," Lecture at EIES Workshop on Cryptographic Hash Functions, Mar. 1992.
  2. E. Biham, "On Matsui's Linear Cryptanalysis," Advances in Cryptology- EURO-CRYPT'94 Proceedings, Springer- Verlag, pp. 398-412, 1995.
  3. A. G. Broscius and J. M. Smith, "Exploiting Parallelism in Hardware Implementation of the DES," Advances in Cryptology- CRYPTO'91 Proceeding, Springer-verlag, pp. 367-376, 1992
  4. E. Biham, A. Shamir, "Differential Cryptanalysis of DES-like Cryptosystems," Advances in Cryptology-CRYPTO'90 Proceeding, Springer-verlag, pp. 2-21, 1991.
  5. Nicolas T. Courtois and Gregory V. Bard, "Algebraic Cryptanalysis of the Data Encryption Standard," In Steven D. Galbraith, editor, Cryptography and Coding -11th IMA International Conference, volume 4887 of Lecture Notes in Computer Science, pp. 152-169, Berlin Heidelberg New York, Springer-Verlag, 2007.
  6. Meiqin Wang, "Differential Cryptanalysis of reduced-round PRESENT," In Serge Vaudenay, editor, Africacrypt 2008, volume 5023 of Lecture Notes in Computer Science, pp. 40-49, Springer- Verlag, 2008.
  7. http://opencores.org/project,3des_vhdl
  8. http://service2.nis.go.kr/pw_certified/seed.jsp
  9. Carlos Cid, Sean Murphy, and Matthew Robshaw, "Algebraic Aspects of the Advanced Encryption Standard," Springer-Verlag, 2006.
  10. http://www.design-reuse.com/articles/13981/fpga-implementation-of-aes-encryption-and-decryption.html(FPGA Implementation of AES Encryption and Decryption)