Browse > Article
http://dx.doi.org/10.7840/kics.2017.42.1.250

A Study on the Cryptography Algorithm Performance Comparison Used in Modulation and Forgery  

Lee, Jun Yeong (Sejong Cyber University Graduate School of Information Security)
Chang, Nam Su (Sejong Cyber University Department of Information Security)
Abstract
Recently, the use of mobile devices has increased in order to provide a variety of services, and thus there has been a surge in the number of application malicious attacks on the Android platform. To resolve the problem, the domestic financial sector has been introducing the app anti-tamper solution based on cryptographic algorithms. However, since the capacity of apps installed in smartphones continues to increase and environments with limited resources as wearables and IoTs spread, there are limitations to the processing speed of the anti-tamper solutions. In this paper, we propose a novel anti-tamper solution by using lightweight hash function LEA and LSH. We also present the test results of a simulation program that implements this method and compare the performance with anti-tamper solutions based on the previous cryptographic algorithms.
Keywords
APP anti-tamper; LEA; ARIA; SEED; LSH; SHA;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 K. Y. Park and J. H. Seo, "Research on information security technology trends smartphone," in Proc. KICS Int. Conf. Commun., pp. 305-306, Nov. 2014.
2 D. Kim, S. Yoon, and Y. Lee "Security for IoT services," KICS Inf. and Commun. Mag., vol. 20, no. 8, pp. 53-59, Jul. 2013.
3 B. Choi, H. J. Shim, C. H. Lee, S. Cho, and S. Cho, "An APK overwrite scheme for preventing modification of android applications," J. KICS, vol. 39, no. 8, pp. 309-316, May 2014.
4 J.-W. Kim and I. Kim, "The counterfeit & modulation checks on the android applications," in Proc. KITS Int. Conf. Commun., pp. 460-464, 2012.
5 TTAS, 128-bit Block Cipher SEED, TTAS.KO-12.0004/R1, Dec. 2005.
6 NIST, Announcing the Advanced Encryption Standard(AES), FIPS PUB-197, Nov. 2002.
7 KS, 128 bit block encryption algorithm ARIA, KS X 1213:2004, Dec. 2004.
8 D. Hong, J.-K. Lee, D.-C. Kim, D. Kwon, K. H. Ryu, and D.-G. Lee, "LEA: A 128-bit block cipher for fast encryption on common processors," in Proc. WISA 2013, LNCS, vol. 8269, 2014.
9 J.-Y. Lee, D.-E. Cho, and J.-Y. Lee, "An integrity verification method for secure application on the smartphone," KIIT, vol. 9, no. 10, pp. 223-228, Oct. 2011.
10 S. Kim, S. Kim, and D. H. Lee, "A study on the vulnerability of integrity verification functions of android-based smartphone banking applications," JKIISC, vol. 23, no. 4, pp. 743-755, Aug. 2013.
11 NIST, Secure Hash Standard(SHS), FIPS 180-4, Aug. 2015.
12 NIST, Recommendation for block cipher modes of operation: Methods and techniques, SP 800-38A, 2001.
13 D.-C. Kim, D. Hong, J.-K. Lee, W.-H. Kim, and D. Kwon, "LSH: A new fast secure hash function family," Inf. Security and Cryptology, ICISC 2014, pp. 286-313, Jan. 2015.
14 Daniel R. L. Brown, Standards for efficient cryptography, SEC 1: Elliptic curve cryptography, Certicom Res., May 2009.