Browse > Article
http://dx.doi.org/10.5762/KAIS.2011.12.5.2322

The Design of Hybrid Cryptosystem for Smart Card  

Song, Je-Ho (Dept. of IT Applied System Eng. Chonbuk National University)
Lee, Woo-Choun (Dept. of IT Applied System Eng. Chonbuk National University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.12, no.5, 2011 , pp. 2322-2326 More about this Journal
Abstract
General cryptosystem uses differently the data and key value for the increment of security level, processes the repetition of limited number and increases the periodic feature of LFSR similar infinite series. So, it cause the efficiency of the cryptosystem. In this thesis, proposed algorithm is composed of reformat, permutation, data cipher block and key scheduler which is applied the new function by mixed symmetric cryptography and asymmetric cryptography. We design the cryptosystem of smart card using the common Synopsys and simulate by ALTERA MAX+PLUS II at 40MHz. Consequently, we confirm the 52% increment of processing rate and the security level of 16 rounds.
Keywords
Cryptosystem; Cryptography; Security level; Processing rate; Smart card;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 E. Biham and A. Shamir, Differential Cryptanalysis of DES-like Cryptosystems, J. of CRYPTOLOGY Vol. 4 No. 1, 1991.
2 B. Schneier, Applied Cryptography : Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Inc., New York, USA, 1994.
3 W. Diffie and M. E. Hellman, "New directions in Cryptography," IEEE Trans. on Infor. Theory, Vol. IT-22, No. 6, pp. 644-654, Nov. 1976.
4 R. Revest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," CACM, Vol. 21, No. 2, pp. 120-126, Feb. 1978.   DOI   ScienceOn
5 W.Stallings, Cryptography and Network Security, Prentice Hall, 1998.
6 B. Schneier, Applied Cryptography : Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Inc., New York, USA, 1994.
7 D. R. Stinson, Cryptography Theory and Practice, Chapman & Hall/CRC, 2002.
8 H. Miyano, A Method to Estimate the Number of Ciphertext Pairs for Differential Cryptanalysis, Abstracts of ASIACRYPT91, 1991.
9 서광석, 김창한, 암호학과 대수학, 북스힐, 1999.
10 T. Siegenthaler, "Decrypting a Class of Stream Ciphers Using Ciphertext Only," IEEE Trans. on Computer, Vol. C-34, No. 1, pp. 81-85, Jan. 1985.   DOI
11 R.Rueppel, "Stream Ciphers," Contemporary Cry ptology: The science of Infor. Integrity, New York, IEEE Press, pp. 65-134, 1991.
12 이병관, 전자상거래 보안, 남두도서, 2002.
13 VISA Open Platform Overview, 1999.