인증 암호화 기술 분석

  • 발행 : 2017.01.31

초록

키워드

참고문헌

  1. William Stallings, "Cryptography and Network Security", PEARSON, Fifth edn, pp. 383-384, Feb. 2011.
  2. ISO (International Organization for Standardization), "Information technology - Security techniques -Authenticated Encryption", ISO/IEC 19772:2009, pp. 3-4, Feb. 2009
  3. IETF(Internet Engineering Task Force), "The Secure Shell (SSH) Authentication Protocol", RFC 4252, pp. 4-7, Jan. 2006
  4. IETF, "The Transport Layer Security (TLS)Protocol Version 1.2", RFC 5246, pp. 15-19, Aug. 2008
  5. NIST(National Institute of Standards and Technology), "Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Encryption", NIST SP 800-38C, pp 9-10, May. 2004
  6. NIST, "Recommendation for Block Cipher Modes of Operations: Galois/Counter Mode (GCM) and GMAC", NIST SP 800-38D, pp 10-13, Nov. 2007
  7. NIST Computer Security Resource Center, "MODES DEVELOPMENT - Authenticated Encryption Modes", http://csrc.nist.gov/groups/ST/toolkit/BCM/modes_development.html
  8. TTA (Telecommunications Technology Association), "Modes of Operation of 128-bit Block Cipher for Confidentiality and Message Authentication", pp. 3-7, Oct, 2010
  9. Elena Andreeva, Andrey Bogdanov, Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi, Elmar Tischhauser, Kan Yasuda, "COLM vi", 3-Round Candidate of CAESAR Competition, pp. 9-11, Sep. 2016
  10. Hongjun Wu, Tao Huang, "The JAMBU Lightweight Authentication Encryption Mode (v2.1)", 3-Round Candidate of CAESAR Competition, pp. 9-16, Sep. 2016
  11. Tetsh Iwata, Yasuda. K, "BTM: A Single-Key Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption", InL Jr., M.J.J., Rijmen, V., Safavi-Naini, R. (eds.) Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 5867, pp. 313-330. Springer (2009)
  12. Kazuhiko Minematsu, "AES-OTR v3.1", 3-Round Candidate of CAESAR Competition, pp. 7-11, Sep. 2016
  13. Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka, Eita Kobayashi, "CLOC and SILC", 3-Round Candidate of CAESAR Competition, pp. 11-17, Sep. 2016
  14. Jeremy Jean, Ivica Nikolic, Thomas Peyrin, Yannick Seurin, "Deoxys v1.4", 3-Round Candidate of CAESAR Competition, pp 17-24, Sep. 2016
  15. Ted Krovetz, Phillip Rogaway, "OCB (v1.1)", 3-Round Candidate of CAESAR Competition, pp. 2-3, Sep. 2016
  16. Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche, "KECCAK sponge function family mail document", SHA-3 Submission of NIST, pp 17-23, Jun. 2010
  17. Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche, Ronny Van Keer, "CAESAR submission: Ketje v2", 3-Round Candidate of CAESAR Competition, pp. 4-9, 13-14, Sep. 2016
  18. Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche, Ronny Van Keer, "CAESAR submission: Keyak v2", 3-Round Candidate of CAESAR Competition, pp. 24-29 Sep. 2016
  19. Jean Philippe Aumasson, Philipp Jovanovic, Samuel Neves, "NORX v3.0", 3-Round Candidate of CAESAR Competition, pp. 16-30, Sep, 2016
  20. Hongjun Wu, "ACORN: A Lightweight Authenticated Cipher (v3)", 3-Round Candidate of CAESAR Competition, pp. 8-17, Sep. 2016
  21. lRTF(Intemet Research Task Force), "The OCB Authenticated-Encryption Algorithm", RFC 7254, May. 2014
  22. Viet Tung Hoang, Ted Krovetz, Philip Rogaway, "AEZ v4.2: Authenticated Encryption by Enciphering", 3-Round Candidate of CAESAR Competition, Sep 2016.