Browse > Article

A Study of Hybrid Cryptosystem Design with the Authentication and Self-Key Generation  

이선근 (원광대학교 전기전자정보공학부)
송제호 (국립익산대학 전기과)
김태형 (국립익산대학 전자정보과)
김환용 (원광대학교 전기전자정보공학부)
Publication Information
Abstract
The importance of protection for data and information is increasing by the rapid development of information communication and network. And the concern for protecting private information is also growing due to the increasing demand for lots of services by users. Asymmetric cryptosystem is the mainstream in encryption system rather than symmetric cryptosystem by above reasons. But asymmetric cryptosystem is restricted in applying fields by the reason it takes more times to process than symmetric cryptosystem. In this paper, encryption system which executes authentication works of asymmetric cryptosystem by means of symmetric cryptosystem. The proposed cryptosystem uses an algorithms combines that combines block cipherment with stream cipherment and has a high stability in aspect of secret rate by means of transition of key sequence according to the information of plaintext while symmetric/asymmetric cryptosystem conducts encipherment/deciphermeent using a fixed key. Consequently, it is very difficult to crack although unauthenticator acquires the key information. So, the proposed encryption system which has a certification function of asymmetric cryptosystem and a processing time equivalent to symmetric cryptosystems will be highly useful to authorize data or exchange important information.
Keywords
authentication; hybrid cryptrosystem; cryptographic; design;
Citations & Related Records
연도 인용수 순위
  • Reference
1 E. Biham, 'On Matsui's Linear Cryptanalysis', Advances in Cryptology-EURO-CRYPT'94 Proceedings, Springer-Verlag, pp. 398-412, 1995
2 H. Feistel, 'Step Code Ciphering System', U.S, Patent #3,798,360, 19 Mar. 1974
3 E. F. Brickell, J. H. Moore, and M. R. Purtill, 'Structure in the S-Boxes of the DES', Advances in Cryptology-CRYPTO'86 Proceeding, Springer-verlag, pp. 3-8, 1987
4 A. G. Broscius and J. M. Simth, 'Exploiting Parallelism in Hardware Implementation of the DES', Advances in Cryptology-CRYPTO'91 Preceeding, pp. 367-376. 1992
5 L. Brown, J. Pieprzyk, and J. Seberry, 'Key Scheduling in DES Type Cryptosystems', Advances in Cryptology-CRYPTO'90 Proceeding, Springer-Verlag, pp. 221-228, 1990
6 E. Biham, 'On the Applicability of Differential Cryptanalysis to Hash Functions', Lecture at EIES Workshop on Cryptographic Hash Functions, Mar. 1992
7 E. Biham, A. Shamir, 'Differential Crytanalysis of DES-like Cryptosystems', Advances in Cryptology-CRYPTO'90 Proceeding, Springer-Verlag, pp. 2-21, 1991
8 M. Gude, 'Concept for a High Performance Random Number Generator Based on Physical Random Phenomena', Frequenz, Vol. 39, pp. 187-190, 1985
9 E. Biham, A. Shamir, 'Differential Cryptanalysis of the Data Encryption Standard', Springer-Verlag, 1993
10 R. Durstenfeld, 'Algorithm 235 : Random Permutation', Communications of the ACM, Vol. 7, No. 7, pp. 420, Jul. 1964   DOI
11 R. Gottfert, H. Neiderreiter, 'On the Linear Complexity of Products of Shift Register Sequences', Advances in Cryptology-CRYPTO'93 Proceeding, Springer-Verlag, pp. 151-158, 1994