• Title/Summary/Keyword: 블록 암호화

Search Result 304, Processing Time 0.02 seconds

Selective Encryption of Canonical Huffman code (정규 허프만 코드의 선택적 암호화)

  • Park, Sang-ho
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.1163-1167
    • /
    • 2018
  • The selective encryption scheme for canonical Huffman codes using the inversion of bit values is proposed. The symbols are divided into blocks of a certain size, and each symbol in the block is compressed by canonical Huffman coding. Blocks are determined to be sent in the original code or encrypted form. The encryption block inverts the values of the whole bits, and bits of block that do not encrypt are not inverted. Those compressed data are transmitted with the encryption information. It is possible to decrypt the compressed data on the receiving side using the encryption information and compressed data.

An Efficient Operation Mode for Block Cipher (블록 암호화를 위한 효율적인 연산 모드)

  • 이창두;권오현;박규석
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.955-958
    • /
    • 2002
  • 암호화를 위한 블록간의 연산 모드에서 어떤 연산 모드를 사용하는가에 따라 평문, 암호문 또는 키 추측 등에 많은 영향을 주게 된다. 본 논문에서는 여러 가지 블록 암호 연산 모드에 대해 알아보고, 다음 블록에 대한 키 정보의 암호화 강도를 효율적으로 높일 수 있는 RFB(Round key FeedBack) 운영 모드를 제안한다.

  • PDF

Fair Private Block Encryption Protocol for Delegated Node of Public Blockchain (동등한 권한을 가진 대표노드를 위한 비공개 블록 암호화 기법)

  • Jung, Seung Wook;Lee, HooKi
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.11-18
    • /
    • 2019
  • In current public blockchain, any node can see every blocks, so that public blockchain provider transparent property. However, some application requires the confidential information to be stored in the block. Therefore, this paper proposes a multi-layer blockchain that have the public block layer and the private block for confidential information. This paper suggests the requirement for encryption of private block. Also, this paper shows the t-of-n threshold cryptosystem without dealer who is trusted third party. Finally proposed scheme satisfies the requirements for encryption and fairness.

Implementing an Immutable Encryption Module using Blockchain (블록체인을 활용한 불변성 암호화 모듈 구현)

  • Yoon, Kyung Seob;Kim, Minji
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.01a
    • /
    • pp.189-192
    • /
    • 2021
  • 이 시스템은 블록체인의 분산 처리 방식을 활용하여 중앙 집중식 데이터베이스에서 사용자가 관리자의 보안 인프라에 의존할 수밖에 없는 점을 보완하고, 네트워크 독립성과 데이터의 불변성, 투명성을 보장한다. 본 논문에서는 기존의 중앙 집중식 데이터베이스의 단점을 보완하는 블록체인의 분산 데이터 저장 방식을 활용하여 블록체인의 해시 기법과 작업 증명, 탈중앙화, 합의 알고리즘을 구현한 암호화 시스템을 제안한다.

  • PDF

A Simple Encryption Technology for Space-Time Block Coding (시공간 블록 코딩에 적용가능한 간단한 암호화 기법)

  • Jung, Hyeok-Koo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.5
    • /
    • pp.1-8
    • /
    • 2018
  • This paper proposes a simple encryption technology for space-time block coding algorithm. Space-time block coding algorithm uses two antennas in transmitting data which consists of original data and transformed data for the purpose of combining in the receiver. This kind of two transmission antenna data could be exchanged and transmitted on each other's antenna individually, which can be used as a simple encryption algorithm. Encryption timing control informations should be shared between transmitter and receiver beforehand. It is shown that the proposed architecture can give performance enhancement compared with no encryption cases.

A Study of video encryption architecture for privacy protection (개인정보보호를 위한 영상 암호화 아키텍처 연구)

  • Kim, Jeongseok;Lee, Jaeho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.138-141
    • /
    • 2020
  • 영상 감시 시스템은 광범위한 영역에서 쉽게 설치되고 있으며, 감시 지역을 녹화한 영상 정보는 대게 인터넷을 통한 클라우드 상의 저장소에서 관리하는 중앙 관리 방식을 사용하고 있다. 그러나 이러한 시스템의 주요한 문제점은 저장 영상의 전송 과정과 저장 대해서 객관적으로 신뢰할 수 있는 방법이 제공되지 않고 있으며, 개인정보보호를 위한 장치 유무와 별개로 모든 권한을 서비스 제공자에게 위임한 상태에서 운영하고 있다는 점이다. 본 연구에서는 공개키 기반 암호화와 블록체인 기반의 키 관리 시스템을 조합한 아키텍처를 이용하여 민감한 정보를 사용자가 안전하게 보호할 수 있는 방안을 제시한다. 제안하는 아키텍처에서는 대칭키를 사용한 블록 암호화(block-cipher) 과정을 통해 영상 정보를 암호화하고, 이때 사용하는 대칭키를 사용자의 공개키로 암호화하여 블록체인의 레저(ledger)로 기록하는 기법을 사용한다. 영상정보를 암호화하는 과정을 블록체인 네트워크의 특성(분산, 투명성, 데이터 변조 불가)을 활용하여 개인정보 영상의 생성부터 소멸까지 사용자가 추적이 가능하도록 한다.

A Study on the Current Status and Performance of OTP Utilization of Blockchain Technology (블록체인 기술의 OTP 활용 현황과 성능에 관한 연구)

  • Lee, Deok Gyu
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.2
    • /
    • pp.47-52
    • /
    • 2021
  • As blockchain technology develops, encryption for blockchain blocks is also becoming more important. Encryption in the blockchain is used to secure the identity of the person who created the transaction and to prevent manipulation of information in the past block. However, increasing the security of encryption decreases the speed of block creation, one of the biggest drawbacks of the blockchain. Therefore, in this paper, we propose a method to minimize the performance of the current OTP and the degradation of the blockchain by comparing the status and performance of OTP used in the blockchain.

A Partial Encryption Method for the Efficiency and the Security Enhancement of Massive Data Transmission in the Cloud Environment (클라우드 환경에서의 대용량 데이터 전송의 효율성과 보안성 강화를 위한 부분 암호화 방법)

  • Jo, Sung-Hwan;Han, Gi-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.9
    • /
    • pp.397-406
    • /
    • 2017
  • In case of using the existing encrypted algorithm for massive data encryption service under the cloud environment, the problem that requires much time in data encryption come to the fore. To make up for this weakness, a partial encryption method is used generally. However, the existing partial encryption method has a disadvantage that the encrypted data can be inferred due to the remaining area that is not encrypted. This study proposes a partial encryption method of increasing the encryption speed and complying with the security standard in order to solve this demerit. The proposed method consists of 3 processes such as header formation, partial encryption and block shuffle. In step 1 Header formation process, header data necessary for the algorithm are generated. In step 2 Partial encryption process, a part of data is encrypted, using LEA (Lightweight Encryption Algorithm), and all data are transformed with XOR of data in the unencrypted part and the block generated in the encryption process. In step 3 Block shuffle process, the blocks are mixed, using the shuffle data stored with the random arrangement form in the header to carry out encryption by transforming the data into an unrecognizable form. As a result of the implementation of the proposed method, applying it to a mobile device, all the encrypted data were transformed into an unrecognizable form, so the data could not be inferred, and the data could not be restored without the encryption key. It was confirmed that the proposed method could make prompt treatment possible in encrypting mass data since the encryption speed is improved by approximately 273% or so compared to LEA which is Lightweight Encryption Algorithm.

A Code Block Cipher Method to Protect Application Programs From Reverse Engineering (응용프로그램 역분석 방지를 위한 코드블록 암호화 방법)

  • Jung, Dong-Woo;Kim, Hyong-Shik;Park, Joong-Gil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.85-96
    • /
    • 2008
  • One of the typical methods to prevent tampering and reverse engineering on executable codes is to encrypt them. This paper proposes a code block cipher method based on key chaining to encrypt the code. The block cipher by key chaining has been known to be inadequate for encrypting the code with control transfer, even though the key chaining has advantage of hiding the keys in blocks and making the individual keys different from block to block. This paper proposes a block transformation and duplication method to apply the block cipher by key chaining to the executable codes with control transfer instructions, and shows the idea works with the MIPS instruction set.

Fair Private Block Encryption Protocol with Proactive Secret Sharing for Delegated Node of Public Blockchain (동등한 권한을 가진 대표노드를 위한 능동적 비밀 분산을 이용한 비공개 블록 암호화 기법)

  • Jung, Seung Wook
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.177-186
    • /
    • 2020
  • In current public blockchain, any node can see every blocks, so that public blockchain provider transparent property. However, some application requires the confidential information to be stored in the block. Therefore, this paper proposes a multi-layer blockchain that have the public block layer and the private block for confidential information. This paper suggests the requirement for encryption of private block. Also, this paper shows the t-of-n threshold cryptosystem without dealer who is trusted third party. Moreover, the delegated node who has key information can be withdraw the delegated node group or a new delegated node can join in the delegated node group. Therefore, the paper proposes an efficient key information resharing scheme for withdraw and join. Finally proposed scheme satisfies the requirements for encryption and fairness.