Browse > Article

FPGA-based Hardware Implementation of Cryptography Algorithm ARIA  

Kim Young-Soo (국민대학교 정보관리학)
Cho Sun-Gu (나사렛대학교 경영정보학과)
Abstract
Group oriented multicast service is a prerequisite for the current application system for remote lecture and customer service. IP multicast is used to be generally accepted as an internet standard. IP multicast which is designed to support network based replication model can efficiently use host and network resource, however it has some weak points that it has to support IP multicast in the internet by adding multicast-capable internet infrastructure such as router and is vulnerable to security by using public IP address for group identifier. Therefore we propose the trigger based application level multicast model that can enhance both scalability and security by separating the functions, which send and receive message to solve these problems. Our suggested model is expected to ensure the promotion of quality of service and reliability.
Keywords
group communication; IP multicast; trigger; network based replication model; application level multicast model;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Guerraoui, R., et. aI., 'Experiences with object group systems,' Software-Practice and experience, vol. 30, no. 12, pp. 1375-1404, Oct., 2000   DOI   ScienceOn
2 Banerjee, S., B. Bhattacharjee, and S. Parthasarathy 'A protocol for scalable application level multicast,' CS-TR 4278, University of Maryland, College Park, 2001
3 Miranker, D. P. 'A better match algorithm for AI production systems,' In Proceedings AAAI National Conference on Artificial Intelligence, pp. 42-47. Aug., 1987
4 Castro, M., et. aI., 'An evaluation of scalable application level multicast built using peer to peer overlay networks,' unpublished work, 2002
5 Francis, P. 'Extending the internet multicast architecture,' 2000
6 Chawathe, Y., S. McCanne, and E. Brewer, 'An architecture for internet content distribution as an infrastructure service,' 2000
7 Jannotti, J., et. al., 'Reliable multicasting with an overlay network,' In Proceedings of OSDI 2000, San Diego, California, Oct., 2000
8 Deering, S., D. R. Cheriton, 'Multicating Routing in Datagram Internetworks and Extented LANs,' ACM Transactions on Computer Systems, May, 1990
9 Hanson, E. et. al., 'Scalable Trigger Processing,' In Proceedings of the 15th International Conference on Data Engineering, Sydney, Australia. pp.266-275, Mar., 1999
10 Chawathe, Y., S. McCanne, and E. A. Brewer, 'Reliable multicast for heterogeneous networks,' In Proceedings of IEEE Infocom, pp. 795-804, 2000
11 Mishra, S., et. aI., 'On group communication support in CORBA,' IEEE Transactions on Parallel and Distributed Systems, vol. 12, no. 2, pp.193-208, Feb. 2001   DOI   ScienceOn
12 김영수, '메시지보안시스템의 인증 프로토콜설계 및 검증,' 박사학위논문, 국민대학교대학원, 2003
13 Floyd, S., et. aI., 'A reliable multicast framework for light-weight sessions and application level framing,' IEEE/ACM Transactions on Networking, 5(6),pp. 784-803,1997   DOI   ScienceOn
14 Cochrane, R., 'Issues in Integrating Active Rules Into Database Systems. Ph.D. dissertation,' University of Maryland, Department of Computer Science, College Park, MD, 1992
15 Gehani, N., & Jagadish, H. 'Ode as an Active database: Constraints and triggers,' In Proceedings of the 17 th International Conference onnVery Large Databases, Barcelona, Catalonia, Spain. pp.327-36, Sep., 1991
16 Eswaran, K.P. 'Specifications, implementations and interactions of a trigger subsystem in an integrated database system,' IBM Research Report RJ. 1820, Aug., 1975