Browse > Article
http://dx.doi.org/10.6109/jkiice.2018.22.4.805

Ransomware Prevention and Steganography Security Enhancement Technology Using Format Preserving Encryption  

Lim, Ji-hwan (Department of IT Engineering, Hansung University)
Na, Gwan-Woo (Department of IT Engineering, Hansung University)
Woo, Jae-Min (Department of IT Engineering, Hansung University)
Seo, Hwa-joeng (Department of IT Engineering, Hansung University)
Abstract
Recently, Format-Preserving-Encryption (FEA) was suggested by the National Security Research institute (NSR) as an encryption method while maintaining the format without a distortion to the intended information to be encrypted. In this paper, we propose a scheme to solve conventional cyber security problems by using FEA scheme. First, we present the method to encrypt signatures and extensions with FEA in order to effectively defend against Ransomeware attacks. This technique can mitigate the exposure to the Ransomeware by encrypting the minimum information. Second, in order to reduce the secret information for Steganography, we introduce a new way to minimize the secret information with FEA. Finally, we compare the operation speed by encryption with FEA and Lightweight Encryption Algorithm (LEA), furthermore when we optimize FEA we want to compare with the performance improvement accompanying with it.
Keywords
Ransomware; Steganography; Format-Preserving-Encryption; Encryption;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 H. K. Lee, J. H. Seong, Y. C. Kim, J. B. Kim, and G. Y. Gim, "The Automation Model of Ransomware Analysis and Detection Pattern," Journal of the Korea Institute of Information and Communication Engineering, vol. 21, no. 8, pp. 1581-1588, Aug. 2017.   DOI
2 Y. K. Kim, D. G. Ham, Y. H. Joo, and K. H. Lee, "Analysis and Countermeasures for the Ransomware Cryptolocker," in Proceeding of the 2016 Spring Conference of the Korea Information Processing Society, Seoul, vol. 23, no. 1, pp. 293-293, Apr. 2016.
3 D. K. Andrew, "Steganalysis of Embedding in Two Least-Significant Bits," IEEE Transactions on Information Forensics and Security. vol. 2, no. 1, pp. 46-54, Feb. 2007.   DOI
4 B. K. Moon, D. G. Ryoo, M. S. Ko, K. W. Eom, and M. S. Jun, "An Implementation of Database Security Using Steganography in the Web," Journal of The Korea Institute of Information Security and Cryptology, vol. 15, no. 2, pp. 3-11, Apr. 2005.
5 G. J. Lee, E. J. Yoon, and K. Y. Yoo, "A Key Exchange Protocol based on the Steganography with the QR code," Journal of the Institute of Electronics Engineers of Korea, vol. 50, no. 6, pp. 173-179, Jun. 2013.
6 File Signature Database. File Signature [Internet]. Available: https://filesignatures.net/.
7 Telecommunications Technology Association. TTAK.KO-12.0275. Format-Preserving Encryption Algorithm FEA [Internet]. Available: https://tta.or.kr/include/Download.jsp?filename=choan%2F%5B2015-203%5D_%C7%FC%C5%C2+%BA%B8%C1%B8+%BE%CF%C8%A3+FEA.hwp.
8 Digital Dailey. New encryption technology came out for personal information protection [Internet]. Available: http://www.ddaily.co.kr/news/article.html?no=119354.
9 S. Y. Jeong, D. W. Hong, and C. H. Seo, "Secure Format-Preserving Encryption for Message Recovery Attack," Journal of Korean Institute of Information Scientists and Engineers, vol. 44, no. 8, pp. 860-869, Aug. 2017.