A Proposal on Cryptographic Synchronization for T4 Link Encryption |
Lee, HoonJae
(Department of Information and Communication Engineering, Dongseo University)
Kim, KiHwan (Department of Ubiquertous IT, Dongseo University) Kang, YongJin (Department of Ubiquertous IT, Dongseo University) Lee, Sang-Gon (Department of Information and Communication Engineering, Dongseo University) Ryu, Young-Jae (ADD) |
1 | P. T. Mitchell, Network Centric Warfare: Coalition operations in the age of US military primacy, 1th ed. New York, NY: Routledge, 2013. |
2 | D. S. Alberts and R.E. Hayes, Power to the Edge: Command and Control in the Information Age, 1th ed. Washington DC, WA: CCRP Publication Series, 2003. |
3 | G. C. Wang, B. S. Lee, K. J. Lim and J. Y. Ahn, "Technical Trends on Security of Control and Non-payload Communications Network for Unmanned Aircraft Systems," International Journal of Electronics and Telecommunications Research Institute, vol. 32, no. 1, pp. 82-92, Feb. 2017. |
4 | Weatherington, Dyke, and U. Deputy, "Unmanned aircraft systems roadmap, 2005-2030." United States, Office of the Secretary of Defense, Technical Report, 2005. |
5 | J. M. Chung, K. C. Park, T. Y. Won, U. H. Oh, D. C. Ko, S. J. Hong, C. B. Yoon, H. Kim and U. Y. Pak, "Standardization Strategy for the Image and Intelligence Common Datalink," International Journal of the Korean Information and Communication Magazine, vol. 28, no. 4, pp.41-50, Apr. 2011. |
6 | E. Burak, E. C. A. Nail, T. Craig and M. Ken, "A 275 Gbps AES encryption accelerator using ROM-based S-boxes in 65nm," in Proceeding of the Custom Integrated Circuits Conference, California: CA, pp. 1-4, 2015. |
7 | Y. J. Ryu and J. M. Ahn, "Research on Performance Analysis for the Long Distance Air-Ground Wideband Common Data Link," International Journal of Korean Institute of Communications and Information Sciences, vol. 42, no. 04, pp. 703-715, Apr. 2017. DOI |
8 | F. H. Myers, "A Data Link Encryption System," in Proceeding of National Telecommunications Conference, Washington: WA, pp. 27-29, 1979. |
9 | D. H. Lim, S. J. Lee, "Public Key Authentication using Secret Sharing and ECC for Tactical Communication Networks," Journal of Security Engineering, vol. 13, no. 6 pp. 421-438, Dec. 2016. DOI |
10 | D. J. C. MacKay, Information theory, Inference and Learning Algorithms, 1th ed. Cambridge, CBG: Cambridge University Press, 2003. |
11 | T. K. Moon, Error Correction Coding: Mathematical Methods and Algorithms, 1th ed. New Jersey, NY : John Wiley & Sons, 2005. |
12 | N. Bruce, Y. S. Lee, W. T. Jang and H. J. Lee, "Next Generation Encryption of Enhanced Light-weight Stream Cipher for Communication Systems," International Journal of Wireless Devices and Engineering, vol. 1, no. 1, pp. 27-32, 2017. |
13 | A. Kahate, Cryptography and network security, 3th ed, New Delhi, IN: Tata McGraw-Hill Education, 2013. |
14 | H. J. Lee, I. S. Ko (Franz Ko), "An Intelligent Security Agent for Reliable Cipher System using PingPong," Cybernetics and Systems, vol. 39, no. 7, pp.705-718, Oct. 2008. DOI |
15 | H. R. Kim, H. J. Lee, D. H. Kwon, U. Y. Pak, "A SES Alarmed Link Encryption Synchronization Method for High-speed Video Data Encryption," Journal of the Korea Institute of Information and Communication Engineering, vol. 17, no. 12, pp.2891-2898, Dec. 2013. DOI |