Browse > Article
http://dx.doi.org/10.9708/jksci.2011.16.1.143

A Study on the design of mixed block crypto-system using subordinate relationship of plaintext and key  

Lee, Seon-Keun (Dept. of IT Applied System Engineering, Chonbuk national University)
Abstract
Plaintext and key are independent in the existing block cipher. Also, encryption/decryption is performed by using structural features. Therefore, the external environment of suggested mixed cryptographic algorithm is identical with the existing ones, but internally, features of the existing block cipher were meant to be removed by making plaintext and key into dependent functions. Also, to decrease the loads on the authentication process, authentication add-on with dependent characteristic was included to increase the use of symmetric cryptographic algorithm. Through the simulation where the proposed cryptosystem was implemented in the chip level, we show that our system using the shorter key length than the length of the plaintext is two times faster than the existing systems.
Keywords
Symmetric block Cryptographic algorithm; Mixed Mode; Authentication; Key management; iteration;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Carlos Cid, Sean Murphy, and Matthew Robshaw, "Algebraic Aspects of the Advanced Encryption Standard," Springer-Verlag, 2006.
2 http://www.design-reuse.com/articles/13981/fpga-implementation-of-aes-encryption-and-decryption.html(FPGA Implementation of AES Encryption and Decryption)
3 http://opencores.org/project,3des_vhdl
4 http://service2.nis.go.kr/pw_certified/seed.jsp
5 Nicolas T. Courtois and Gregory V. Bard, "Algebraic Cryptanalysis of the Data Encryption Standard," In Steven D. Galbraith, editor, Cryptography and Coding -11th IMA International Conference, volume 4887 of Lecture Notes in Computer Science, pp. 152-169, Berlin Heidelberg New York, Springer-Verlag, 2007.
6 E. Biham, "On the Applicability of Differential Cryptanalysis to Hash Functions," Lecture at EIES Workshop on Cryptographic Hash Functions, Mar. 1992.
7 Meiqin Wang, "Differential Cryptanalysis of reduced-round PRESENT," In Serge Vaudenay, editor, Africacrypt 2008, volume 5023 of Lecture Notes in Computer Science, pp. 40-49, Springer- Verlag, 2008.
8 E. Biham, "On Matsui's Linear Cryptanalysis," Advances in Cryptology- EURO-CRYPT'94 Proceedings, Springer- Verlag, pp. 398-412, 1995.
9 A. G. Broscius and J. M. Smith, "Exploiting Parallelism in Hardware Implementation of the DES," Advances in Cryptology- CRYPTO'91 Proceeding, Springer-verlag, pp. 367-376, 1992
10 E. Biham, A. Shamir, "Differential Cryptanalysis of DES-like Cryptosystems," Advances in Cryptology-CRYPTO'90 Proceeding, Springer-verlag, pp. 2-21, 1991.