Browse > Article

A Study of Practical Field Application Cryptographic Module through Evaluation Derived by Connection Indicators  

Noh, SiChoon (남서울대학교 컴퓨터학과)
Na, SangYeob (남서울대학교 컴퓨터학과)
Publication Information
Abstract
In this study, we propose a cryptographic module quality evaluation system referenced by ISO/IEC 9000 quality system with Quality, Quality Factor, Quality Subfactor, Metric. Practical application process encryption algorithm based on the encryption algorithm to encrypt the pros and cons valuation of diagnosis, point selection algorithm, analysis, and quality items(quality factor), eliciting constraints derived, such as the cryptographic module design quality evaluation system is set to step 5. The five steps are examples of field-based diagnostic tool for cryptographic operations, the most essential work to be done in order to derive one will work. 2-Factor encryption module for connection between indicator items(quality factor) to identify and ensure the quality of the item the constraints of the environment are two kinds of cryptographic operations. This study is an encryption module and a practical field application system, it presents the standardized model. We have to meet the rapid changes in information technology. The environment, development and the encryption algorithm applied to model a wide variety of on-site development encryption will be able to expect the efficiency.
Keywords
Practical; Field Application; Cryptographic Module; Evaluation; Connection Indicators;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R. L. Rivest, A. Shamir, L. Adleman, "A Method for Obtaining Digital. Signatures and Public-Key Cryptosystems", Communications of the ACM vol. 21. pp 8-10, 1978
2 Imai H., Hanaoka G., Shikata J., Otsuka A., Nascimento A.C. 2002. Cyptography with Information Theoretic Security. Information Theory Workshop, 2002, Proceedings of the IEEE, 20-25 Oct 2002.
3 Li, S., Zheng, X., 2002. On the Security of an Image Encryption Method. ICIP2002.
4 Menezes, A. J., P.C. Van Oorschot, S.A. Van Stone. 1996.Handbook of Applied Cryptography. CRC press.
5 Overbey, J., Traves, W., Wojdylo, J., 2005. On the keyspace of the Hill cipher. Cryptologia, 29(1):59-72.   DOI
6 A. Diffie, M. E. Hellman, ''New directions in cryptography", IEEE Trans. Inf. Theory IT-26, no. 6., pp. 644-654, 1976
7 Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, Saroj Kumar Panigrahy. 2007. Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm, International Journal of Security, Vol 1, Issue 1, 2007, pp. 14-21.
8 P.W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring", Proceedings, 35th Annual Symposium on Fundamentals of Computer Science (FOCS), pp. 124-134.. 1994
9 Tom M. Apostol, "Calculus", Volume 1, Blaisdell Publishing Company, pp 422-423, 1962
10 Brian S. Thomson, Andrew M. Bruckner, "Elementary Real Analysis Second Edition", CreateSpace, pp 85, 2008
11 O.Elkeelany, M.M.Matalgah, K.P.Sheikh , M.Thaker, G.Chaudhry, D.Medhi, J.Qaddour, ""Performance Analysis of IPSec Protocol: Encryption and Authentication"", 1164-1168, IEEE 2002
12 Alan O.Freier, Philip Karlton, Paul C.Kocher, "he SSL Protocol Version 3.0" Internet-Draft, November 1996