Browse > Article

(The chip design for the cipher of the voice signal to use the SEED cipher algorithm)  

안인수 (국민대학교 전자정보통신공학부)
최태섭 (국민대학교 전자정보통신공학부)
임승하 (부천대학 전자과)
사공석진 (국민대학교 전자정보통신공학부)
Publication Information
Abstract
The world was opened by communication network because of fast improvement and diffusion of information communication. And information was effected in important factor that control economy improvement of the country. The country should improve the information security system because of necessity to maintain its information security independently. Therefore we have used the SEED cipher algorithm and designed the cipher chip of the voice band signal using the Xilinx Co. XCV300PQ240 chip. At the result we designed the voice signal cipher chip of the maximum frequency 47.895MHz and the total equivalent gate 27,285.
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Andreas Pfitzmann and Ralf Abmann. 'Efficient Software Implementations of (Generalized)DES.' SECURICOM '90. 1990
2 Ralph C. Merkle, 'Fast Software Functions.', CRYPTO '90, 1990
3 Han Eberle, 'A High-speed DES Implementation for Network Applications.' CRYPTO '92. 1992
4 Schneirer Bruce. Applied Cryptography, John Wiley & Sons, Inc., 1988, pp. 219-296
5 E. Biham and A. Shamir. Differential Cryptanalysis of DES-like cryptosystems. In A. J. Menezes and S. A. Vanstone, editors, Proc. CRYPTO 90, pp. 2-21. Springe-Verlag, 1991. Lecture Notes in Computer Science No. 537
6 128비트 블록 암호 알고리즘(SEED) 개발 및 분석 보고서, 한국정보보호센터, 1999
7 M. Matsui. Linear Cryptanalysis method for DES cipher. In T. Helleseth, editor, Advanced in Cryptology-Eurocrypt‘93, Vol..765 of Lecture Notes in Computer Science, pp. 386-397, Springer-Verlag, Berlin, 1994
8 이규원, SEED 블록 암호 알고리즘의 칩 설계 연구, 서울여자대학교, 2000
9 Zimmermann, A. Curiger, H. Kaeslin, N. Felber, W. Fiehtner, 'A 177Mb/s VLSI Implementation of the International Data Encryption Algorithm.', IEEE Journal of Solid State Circuit, Vol. 29. No. 3, March. 1994
10 Charles P. Pfleeger. Security in Computing, Prentice Hall. 1989
11 서영호, 대한민국 표준 128비트 블록 암호 알고리즘의 하드웨어 구현에 관한 연구, 광운대학교, 2000
12 M. Matsui. The first experimental Cryptanalysis of Data Encryption Standard. In Yvo G. Desmedt, editor, Advances in Cryptology-Crypto'94, vol.839 of Lecture Notes in Computer Science, pp. 1-11, Springer-Verlag, Berlin, 1994
13 E. Biham and A. Shamir. Differential Cryptanalysis of the full 16-round DES. In Ernest F. Brickell, editor, Proc. CRYPTO 92, pp. 487-496. Springer-Verlag, 1992. Lecture Notes in Computer Science No. 740
14 신혜진, SEED 암호화 프로세서의 하드웨어 설계 및 구현, 한국항공대학교, 2000
15 E. Biham and A. Shamir. Differential Cryp tanalysis of FEAL and N-Hash. In D. W. Davies, editor, Advances in Cryptology-Eurocrypt'91, pp.1-16, Springer-erlag, Berlin, 1991
16 Deborah Williams and Harvey J Hindin, 'Can software do encryption job.', Electronics, 1980. 7