Browse > Article
http://dx.doi.org/10.33778/kcsa.2019.19.5.037

A Comparative Analysis on ECC(Elliptic Curve Cryptography) Operation Algorit hm for Data Protection in Video security System  

Kim, Jongmin (경기대학교/융합보안학과)
Choo, Hyunwook (이지스마트팜/개발팀)
Lee, DongHwi (동신대학교/융합정보보호학과)
Publication Information
Abstract
Video security systems change from analog based systems to network based CCTVs. Therefore, such network based systems are always exposed not only to threats of eavesdropping and hacking, but to personal damage or public organizations' damage due to image information leakage. Therefore, in order to solve the problem, this study conducts a comparative analysis on proposes the optimal ECC(Elliptic Curve Cryptography) scalar multiplication algorithms for image information protection in data communication process and thereby proposes the optimal operation algorithm of video security system.
Keywords
ECC; ECDH; ECDSA; calar multiplication algorithm;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Taewoong Seo, Myunggyun Jeong, and Changsoo Kim, "A Study on Vulnerabilities of Monitoring and Control System based on IT Convergence Technology," The 6th International Conference on Multi-media Information Technology and Applications, pp. 245-247, 2010.
2 유지영, 이재일, "신규 IT 서비스 도입 확산을 위한 정보보호," 한국정보처리학회 정보처리학회지, 제17권, 제2호, pp. 10-17, 2010.
3 서태웅, 이성렬, 배병철, 윤이중, 김창수, "CCTV 보안관제 취약성 및 성능 분석", 한국멀티미디어학회논문지, Vol. 15, No. 1, 2012, pp. 93-100.   DOI
4 William Stallings, "Cryptography and Network Security Principles and Practices," 2006.
5 Neal Koblitz, "A course in Number Theory and Cryptography", 1994.
6 한국인터넷진흥원, "암호 알고리즘 및 키 길이 이용 안내서," 2013.
7 Christof paar and Jan Pelzl, "Unnderstanding Cryptography a Textbook for Students and Practitioners", 2009.
8 Alfred Menezes, Paul C.van and Scott Vanstone, "HANDBOOK of APPLIED CRYPTOGRAPHY," June, 1996.
9 Neal Koblitz, "A course in Number Theory and Cryptography", 1994.
10 Carlisle Adams and Steve Lloyd, Effective way for security PKI, Seoul, Infobook, 2003.
11 Seok-ho Kim, "Comparison and analysis on efficiency of scalar multiplication for Elliptic Curve Cryptosystem," M. S. dissertation, Korea Maritime and Ocean University graduate school, Busan, 2003.
12 Yeong-ja Kim, "Design and implementation of a security messenger system using elliptic curve cryptosystem," M. S. dissertation, Chung-Ang University Information graduate school, Seoul, 2004.
13 IETF Std. RFC 6979, Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA), IETF, T. Pornin, August 2013.
14 https://www.keylength.com/en/4/, June 10, 2018.
15 Song-hwan Lim, "The efficiency analysis of ECDSA using improved element algorithm," M. S. dissertation, Dongguk University Graduate School of International Affairs & Information, Seoul, 2000.
16 IETF Std. RFC 4050, Using the Elliptic Curve Signature Algorithm (ECDSA) for XML Digital Signatures, IETF, S. Blake-Wilson, G. Karlinger, T. Kobayashi, Y. Wang, April 2005.
17 William Stallings, "Cryptography and Network Security Principles and Practices", 2006.
18 정도, "NAF와 Look-Up 테이블을 이용한타원곡선 스칼라 곱셈 가속화", 한밭대학교, 석사학위논문, 2016.
19 K. J. Ha, C. H. Seo, D. Y. Kim, "Design of validation System for a Crypto-Algorithm Implementation," Journal of the Korea
20 https://en.wikipedia.org/wiki/Elliptic_curve_point_multiplication#cite_note-guide-1
21 한종욱, 조현숙, "영상보안시스템 기술 동향", 한국정보보호학회논문지, Vol. 19, No. 5, 2009, pp. 29-37.