Browse > Article
http://dx.doi.org/10.9708/jksci.2010.15.2.199

SEED and Stream cipher algorithm comparison and analysis on the communication  

Ahn, In-Soo (Kyungin Women's College)
Abstract
Society of digital information becomes gradually advancement, and it is a situation offered various service, but it is exposed to a serious security threat by a fast development of communication such as the internet and a network. There is required a research of technical encryption to protect more safely important information. And we require research for application of security technology in environment or a field to be based on a characteristics of market of an information security. The symmetric key cipher algorithm has same encryption key and decryption key. It is categorized to Block and Stream cipher algorithm according to conversion ways. This study inspects safety and reliability of proposed SEED, Stream cipher algorithm. And it confirms possibility of application on the communication environments. This can contribute to transact information safely by application of suitable cipher algorithm along various communication environmental conditions.
Keywords
Stream Cipher Algorithm; Block Cipher Algorithm; SEED; LFSR;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 A. Kanso, "Clock-Controlled. Genemtors," Ph.D. Thesis, Royal Holloway and Bedford New College University of London, 1999.
2 M. Hermelin, "Cryptographic Properties of the Bluetooth Combination Generator," Helsinki University of Technology Department of Engineering Physics and Mathematics, 28th Feb. 2000.
3 안인수, "통신시스템을 위한 암호 알고리즘에 관한 연구," 대한전지공학회논문지, 제 43권, 제 2호 16-21쪽, 2006년 6월.   과학기술학회마을
4 Chi-Chun Lo and Yu-Jen Chen, "Stream ciphers for GSM Networks," IEEE International Conference on Communications(ICC) 2000, Vol. 1, No. 18-22, pp. 80-84, Jun. 2000.
5 "128 비트 블록 암호 알고리즘(SEED) 개발 및 분석 보고서," 한국정보보호센터, 1998년 12월.
6 R. Nichols and P. Leakkas, "Wireless Secuity Models, Threats, and Solutions," McGraw Hill, 2002.
7 김종엽, 김환용, "PRN을 이용한 키 스케쥴러 블록암호시스템 설계에 관한 연구," 한국컴퓨터정보학회논문지, 제 8권, 제 2호 114쪽, 2003년 6월   과학기술학회마을
8 M. Akkar and C. Giraud, "An Implementation of DES and AES, Secure against Sorre Attacks," CHES 2001, LNCS 2162, pp. 309-318, Springer-Verlag, 2001.
9 S. Yen, "Amplified Differential Power Cryptanalysis on Rijdael Implementation with Exponentially Fewer Power Traces," ACISP 2003, LNCS 2727, pp. 103-117, Springer-Verlag, 2003.
10 R. Bevan and E. Knudsen, "Ways to Enhance Differential Power Analysis," ICISC 2002, LNCS 2578, pp. 327-342, Springer-Verlag, 2003.
11 "차세대 암호시스템 개발에 관한 연구," 국가보안기술연구소, 2쪽, 2006년
12 이선근, "유무선 네트워크 환경에 적합한 VCR 암호 시스템 설계에 관한 연구," 한국컴퓨터정보학회논문지, 제 14권, 제 7호, 66쪽, 2009년 7월.   과학기술학회마을