Browse > Article
http://dx.doi.org/10.13089/JKIISC.2004.14.5.153

An Efficient Packet Encryption Scheme Based on Security Requirement Level  

노지명 (대구가톨릭대학교)
양정민 (대구가톨릭대학교)
Abstract
Under a large-scale client-server service environment, e.g., online games, encrypting data for acquiring information security often causes overload to the server and hence degradation of the service itself. Therefore, for reducing encryption payload, it is necessary to use adequately an efficient encryption scheme with respect to the security requirements of transmission data. In this paper, we propose a packet encryption scheme using multiple cryptosystems to realize such capability, which assigns a different cryptosystem according to the security requirements level. The proposed encryption scheme is applicable to internet services with heavy traffic ratios in which different kinds of data packets are incessantly transmitted between clients and servers. To show its effectiveness and superiority, the performance of the proposed encryption scheme is verified by experiments.
Keywords
Block Cypher; Multiciphering; Selective Encryption; Packet Encryption;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 김찬호, 'MMORPG의 핫이슈 클라이언트 해킹과 보안,' 마이크로소프트웨어, pp. 201-205, 3월, 2004
2 윤재우, 이승형, 'IP 기반 VPN 프로토코릐 연구동향 : 확장성과 보안성.; 정보보호학회지, 제11권, 제6호, pp. 53-43, 2001
3 T. Ritter, 'Cryptography: is staying with the herd really best?' IEEE Computer Society Magazine, vol.32, no. 8, pp. 94-95, 1999
4 T. Ritter, 'Multiciphering and random cipher selection in shannon,' http://www.ciphersbyritter.com/NEWS6/MULTSHAN.HTM
5 C. B. Roellgen, 'The polymorphic cipher,' http://www.pmc-ciphers.com/
6 R. Bolla, M. Marchese and S. Zappatore, 'A congestion control scheme for multimedia traffic in packet switching best-effort networks,' Lecture Notes in Computer Science, vol. 1242, pp, 523-536, 1997   DOI   ScienceOn
7 Technical Standard, 'Common security : CDSA and CSSM, version 2,' The Open Group, May, 2000 (http://www. opengroup. org/publications/catalog/ c914.htm).
8 X. Liu and A. M. Eskicioglu, 'Selective encryption of multimedia content in distribution networks: challenges and new directions,' lASTED International Conference on Communications, Internet and Information Technology (GIlT 2003), November, 2003
9 C. E. Shannon, 'Communication theory of secrecy systems,' Bell System Technical Journal. 28, pp. 656-715, 1949   DOI
10 R. Jain, 'Congestion control and traffic management in ATM networks: recent advances and a survey,' Computer Networks and ISDN Systems, vol. 28, no. 13, pp. 1723-1738, 1996   DOI   ScienceOn
11 H. Cheng and X. Li, 'Partial encryption of compressed images and video,' IEEE Transactions on Signal Processing, vol. 48, no. 8, pp. 2439-2451. 2000   DOI   ScienceOn
12 이성은, 장흥종, 박인재, 한선영, '다중 암호화 기법을 활용한 하이브리드 스마트카드 구현,' 정보보호학회지, 제13권, 제2호, pp. 81-89, 2003
13 유선실, '소프트웨어 및 인테넷 콘텐츠 편 : 온라인 게임', 정보통신산업동향-소프트웨어 및 인테넷 콘텐츠 편, 제1권, pp. 131-144, 2002
14 J. J. Yan and H. J Choi, 'Security issues in online games,' Electronic Library, vol. 20, no. 4, pp. 125-133, 2002   DOI
15 정윤경, 기준백, 천정희, '온라인 게임 아이템의 안전한 전자 거래 시스템,' 정보보호학회논문지, 제13권, 제3호, pp. 91-99, 2003
16 W. Stallings, Cryptography and Network Security: Principles and Practices, 3rd ed., Prentice-Hall, 2003
17 한국전자통신연구원, '온라인 게임 엔진 기술 개발,' 연차보고서, 4월, 2004
18 C. B. Roellgen, 'On the security of polymorphic encryption,' http://www.pmc-ciphers.com/