Browse > Article
http://dx.doi.org/10.13089/JKIISC.2014.24.4.753

An Efficient New Format-Preserving Encryption Algorithm to encrypt the Personal Information  

Song, Kyung-Hwan (Korea University)
Kang, Hyung-Chul (Korea University)
Sung, Jae-Chul (University of Seoul)
Abstract
Recently financial institutions and large retailers have a large amount of personal information leakage accident occurred one after another, and the damage is a trend of increasing day by day. Regulation such as enforcing the encryption of the personal identification information are strengthened. Efficient technology to encrypt personal information is Format-preserving encryption. Typical encryption expand output data length than input data length and change a format. Format Preserving Encryption is an efficient method to minimize database and application modification, because it makes preserve length and format of input data. In this paper, to encrypt personal information efficiently, we propose newly Format Preserving Encryption using Block cipher mode of operation.
Keywords
Format-Preserving Encryption; Modes of Operation; Block cipher; Data format; Data Length;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Terence Spies, "Format Preserving Encryption," Unpublished white paper, www.voltage.com Database and Network Journal, Dec. 2008.
2 Min Li, Zheli Lie, Jingwei Li, and Chunfu Jia, "Format Preserving Encryption for Character Data," Journal of Networks, vol. 7, no. 8, pp. 1239-1244, Aug. 2012.
3 NIST Computer Security Division's (CSD) Security Technology Group (STG), "Block cipher modes," Cryptographic Toolkit. NIST, Apr. 2013.
4 National Bureau of Standards[USA]. FIPS PUB 74, "Guidelines for implementing and using the NBS Data Encryption Standard," 1981.
5 M. Brightwell and H. Smith, "Using datatype-preserving encryption to enhance data warehouse security," 20th National Information Systems Security Conference Proceedings(NISSC), pp. 141-149, 1997.
6 J. Black and P. Rogaway, "Cipher with arbitrary finite domains," RSA Data Security Conference, Cryptographer's Track(RSA CT '02). LNCS vol. 2271, pp.114-130, Springer, 2002.
7 Mihir Bellare, Phillip Rogaway, and Terence Spies, "The FFX Mode of Operation for Format-Preserving Encryption," Unpublished NIST proposal, Feb. 2010.
8 M. Dworkin, "Recommendation for cipher block modes of operation: the CMAC mode for authentication," National Institute of Standards and Technology. SP800-38B, 2005.
9 Turner and James M, "The keyed-hash message authentication code(HMAC)," National Institute of Standards and Technology. FIPS 198, 2002.
10 E. Brier, T. Peyrin, and J. Stern, "BPS: a format-preserving encryption proposal," Ingenico, France, 2010.
11 National Institute of Standards and Technology. SP800-67: "Recommendation for the Triple Data Encryption Algorithm(TDEA) Block Cipher," May 2004.
12 National Institute of Standards and Technology. FIPS 197: "Advanced Encryption Standard," Nov. 2001.
13 National Institute of Standards and Technology. FIPS 180-2: "Secure Hash Standard," Aug. 2002.
14 Michael Scott,"A Note on the Implementation of Format Preserving Encryption Modes," Certivox Labs, http://www.certivox.com/certivox-research/
15 John Sheets, Kim R, and Wagner, "VISA Format Preserving Encryption," VISA USA Inc, Oct. 2011.
16 Gary S. Sarasin, "Character Set Preserving Encryption Mode(CSPEM)," National Institute of Standards and Technology, Nov. 2011.
17 Ulf T. Mattsson, "Format-Controlling Encryption using Datatype-Preserving Encryption," IACR Cryptology ePrint Archive, 2009.
18 ISO/IEC9797-1:1999, "Information technology -Security technologies-Messages Authentication Codes(MACs)-Part 1:Mechanisms using a block ciphers," International Organization for Standardization/International Electrotechnical Commission, 1999.