Browse > Article
http://dx.doi.org/10.17661/jkiiect.2017.10.1.46

A new type of lightweight stream encryption algorithm motif for applying low capacity messaging data encryption for IoT / QR / electronic tags  

Kim, Jung-Hoon (BinaryLab Co. Ltd.)
Publication Information
The Journal of Korea Institute of Information, Electronics, and Communication Technology / v.10, no.1, 2017 , pp. 46-56 More about this Journal
Abstract
Recently, the spread of IoT technology has been spreading, and it has been applied to all industrial fields such as home / home appliance / medical care. Due to the low specification, low power consumption characteristic and communication data characteristic of IoT, implementation of existing algorithm is difficult thing. From this reason, we have proposed for the first time that encryption and decryption can be proceeded by introducing a kind of variable length bit XOR operation method which changes a variable the bit length value by using carry up and carry down method. We confirmed the practicality of encrypting short message data frequently processed by IoT device / QR code / RFID / NFC without changing the size of data before and after encryption.
Keywords
IoT; Light weight encryption; Message encryption; QR-code; RFID; Stream encryption algorithm;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Kyeoung-Ju Ha., Chang-Ho Seo, Dae-Youb Kim, "Design of Validation System for a Crypto-Algorithm Implementation", The Journal of Korea Information and Communications Society, 39(B), pp. 242-250, Apr. 2014
2 Jianying Zhou and Dieter Gollmann, "Evidence and Non-repudiation," Journal of Network and Computer Applications, Vol. 20, No. 3, pp. 267-281, Jul. 1997   DOI
3 Dong-Ho Won and Young-Suk Lee, Ji-Yeon Kim, "Understanding Cryptography, A Textbook for Students and Practitioners", Greenpress, pp. 37-41, Feb. 2016
4 Mi-Ji Sung and Kyung-Wook Shin,"An Efficient Hardware Implementation of Lightweight Block CipherLEA-128/192/256 for IoT Security Applications", J. Korea Inst. Inf. Commun. Eng. Vol. 19, No. 7,pp 1608-1616, Jul. 2015   DOI
5 Ministry of Science,ICT and Future Planning, "Roadmap of IoT Information Security ", p 68, Oct. 2014
6 Je-Seong Jeong, Kyung-min Kim, HakJu Kim,Joon-jeong Park, Soo-Hyun, Ahn, Dongsoo Lee,Rakyong Choi, Kwangjo Kim,Daeyoung Kim, Shin,"Configuration of IoT Secure SNAIL Platform Using Lightweight Crypto primitives (I)", CISC-W'14, v.0, Dec. 2014
7 When encrypting personal information of large capacity OLTP system System Performance Improvement Plan (Focused on Public A System), INNOVATION STUDIES, Vol. 9, No. 1, pp. 115-118, Jun. 2014
8 Kyuwoon Kim and Hyunwoo Kim and Huijeong Kim and Taeyoung Huh and Sanghyuk Jung, and Yong Ho SongAn "Analytical Model for Performance Prediction of AES on GPU Architecture", Journal of The Institute of Electronics Engineers of Korea Vol. 50, NO. 4, pp. 852-854, April 2013
9 Jang-Hyun Kim, Hyo-Joong Suh, "Implementation of Verification and Evaluation Testbed of WiMax2 PKMv2 Encryption Layer", The Journal of the Institute of Internet, Broadcasting and Communication, Vol. 15 No.1, pp.80-81. Feb. 2015