Browse > Article
http://dx.doi.org/10.12673/jant.2019.23.5.339

Guided Missile Assembly Test Set using Encryption AES Rijndael Algorithm  

Jung, Eui-Jae (PGM Research and Development Lab, LIGNex1 Co.)
Koh, Sang-Hoon (PGM Research and Development Lab, LIGNex1 Co.)
Lee, You-Sang (PGM Research and Development Lab, LIGNex1 Co.)
Kim, Young-Sung (PGM Research and Development Lab, LIGNex1 Co.)
Abstract
In order to prepare for the rise of data security threats caused by the information and communication technology, technology that can guarantee the stability of the data stored in the missile test set is important. For this purpose, encryption should be performed when data is stored so that it cannot be restored even if data is leaked, and integrity should be ensured even after decrypting the data. In this paper, we apply AES algorithm, which is a symmetric key cryptography system, to the missile test set, and Encrypt and decrypt according to the amount of data for each bit of each AES algorithm. We implemented the AES Rijndael algorithm in the existing inspection system to analyze the effect of encryption and apply the proposed encryption algorithm to the existing system. confirmation of suitability. analysis of capacity and Algorithm bits it is confirmed that the proposed algorithm will not affect the system operation and the optimal algorithm is derived. compared with the initial data, we can confirm that the algorithm can guarantee data undulation.
Keywords
Missile assembly test set; Advanced encryption standard Rijndael algorithm; Encryption; Decryption;
Citations & Related Records
연도 인용수 순위
  • Reference
1 E. Biham and A. Shamir, "Differential cryptanalysis of DES-like cryptosystem," Journal of cryptology, Vol.4, No.1, 1991.
2 M. S Hwang, “An elgamal-like cryptosystem for enciphering large messages,” IEEE Transactional on Knowledge and Data Engineering, Vol. 14, No. 2, pp. 445-446, 2002.   DOI
3 M. N. Islam , M. Mia, M. Chowdhury, and M. A. Matin, "Effect of security increment to symmetric data encryption through AES methodology," in Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, Phuket: Thailand, pp. 291-294, 2008.
4 B. Y. Choi, “Design of AES Rijndael cryptographic processor,” Journal of Korean Institute of Communication Sciences, Vol. 26, No. 10B, pp. 1491-1500, Oct. 2001.
5 J. Y Oh and Sun J. H Sun, " Experimental analysis of the AES encryption algorithm", Journal of Korea Institute of Information, Electronics, and Communication Technology, Vol. 3, No. 2, Jun. 2010.
6 S. M. Kim, Cryptographic Algorithms Understand by Story, Seoul, Korea: Road Book, pp. 197-224, 2017