Browse > Article
http://dx.doi.org/10.5762/KAIS.2011.12.5.2311

A Study on the Block Cryptosystem Design with Variable Byte Operation  

Lee, Seon-Keun (Faculty of Materials & Chemical Engineering, Chonbuk National University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.12, no.5, 2011 , pp. 2311-2316 More about this Journal
Abstract
With development of information communications and network environments security importance to the informations deepen as time goes. In this viewpoint, cryptosystem is developing but proportionally cracking and hacking technology is developing. Therefore in this paper we proposed and designed block cryptosystem with byte variable operation. Designed cryptosystem based on byte operation is safe than existed cryptosystem because it is not generate the fixed DC and LC characteristics. Additionally, proposed cryptosystem have high processing rate and authenticated operation. Therefore proposed cryptosystem is considered to many aid in the network fields.
Keywords
DC; LC; Authentication; Asymmetric; Block cipher;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Salmasizadeh, J. Dj. Goli'c, E. Dawson, L. Simpson, "A Systematic Procedure for Applying Fast Correlation Attacks to Combiners with Memory", In Workshop on Selected Areas in Cryptography(SAC 97), pp. 102-115, 1997.
2 L. Brown and J. Seberry, "On the Design of Permutation P in Des Type Cryptosystem", Abstract of AUSCRYPT'90, 1990.
3 C. Ding, V. Niemi, A. Renvall, and A. saloma, "Twoprime : A Fast Stream Ciphering Algorithm", Fast Software Encryption'97, Springer-Verlag, pp. 82-96, 1997.
4 B. Schneier, "Applied Cryptography : Protocols, Algorithms, and Source Code in C", John Wiley & Sons, Inc., New York, USA, 1994.
5 Third AES candidate conference, "AES3 Proceedings, http://csrc.nist.gov/encryption/aes/round2/conf3/papers/", pp. 44-54, April, 2000.