• 제목/요약/키워드: Cipher algorithm

검색결과 320건 처리시간 0.03초

DigiCipher 등하시스템의 하드웨어 구현방법에 관한 연구 (A study on the hardware implementation of the digicipher equalization system)

  • 채승수;반성범;이기헌;박래홍;김영상;이병욱
    • 전자공학회논문지B
    • /
    • 제33B권6호
    • /
    • pp.176-185
    • /
    • 1996
  • In this paper, we present the modified CMA (constant modulus algorithm) and LMS (least mean square) algorithms for digiCipher system with reduced hardware cost, in which the pipelined architecture is employed. They yield the performance comparable to that using floating-point operations. We show the effecstiveness of the proposed architecture through the implementation results using VHDL.

  • PDF

GSM에 사용될 A5 스트림 암호의 개선에 관한 연구 ((A Study on the Advanced A5 Stream Cipher in GSM Mobile System))

  • 이훈재;류명춘
    • 한국컴퓨터산업학회논문지
    • /
    • 제3권9호
    • /
    • pp.1329-1338
    • /
    • 2002
  • 본 논문에서는 GSM 암호 시스템에 적용되고 있는 A5 스트림 암호의 취약점을 보완하는 확장형 A5 알고리즘을 제안한다. 또한 제안된 알고리즘에 대하여 주기와 선형복잡도, 랜덤 특성 등 안전성 요소를 분석한 후 기존의 알고리즘과 비교한다.

  • PDF

UHF 대역 RFID 시스템을 위한 블록 암호 회로와 프로토콜 (Block Cipher Circuit and Protocol for RFID in UHF Band)

  • 이상진;박경창;김한벼리;김승열;유영갑
    • 한국콘텐츠학회논문지
    • /
    • 제9권11호
    • /
    • pp.74-79
    • /
    • 2009
  • 본 논문은 HIGHT 블록 암호 알고리즘의 성능 개선을 위하여 하드웨어 구조와 키 스케줄의 공유를 위한 FSM을 제안하였다. 또한 HIGHT 블록 암호 알고리즘을 RFID 시스템에 적용하였을 때 사용 가능한 효과적인 프로토콜을 도입하였다. 개선된 HIGHT 블록 암호 회로의 하드웨어 크기는 RFID 태그에 적용 가능한 작은 크기를 가지면서 기존의 HIGHT 블록 암호 회로에 비해 암호화 성능을 두 배로 향상시켰다. 제안하는 프로토콜은 무선 주파수 통신으로 인한 보안의 취약성을 극복하여 RFID 태그의 개인정보에 대한 보안을 강화할 수 있다.

CELL 프로세서를 이용한 SEED 블록 암호화 알고리즘의 효율적인 병렬화 기법 (An Efficient Parallelized Algorithm of SEED Block Cipher on Cell BE)

  • 김덕호;이재영;노원우
    • 정보처리학회논문지A
    • /
    • 제17A권6호
    • /
    • pp.275-280
    • /
    • 2010
  • 본 논문에서는 Cell BE 프로세서를 사용한 효율적인 병렬 블록 암호화 알고리즘을 제시한다. 제안하는 알고리즘은, 이종 프로세서인 Cell BE의 특성을 효율적으로 활용하기 위하여 PPE와 SPE에 서로 다른 부호화/복호화 방식을 적용하여 그 성능을 개선하였다. 본 논문에 제시된 구현 방식을 바탕으로 검증된 결과에 따르면, 제안하는 알고리즘은 고성능 네트워크 시스템을 지원할 수 있는 2.59Gbps의 성능을 보여준다. 이는, 다른 다중 코어 프로세서의 병렬 구현 방식과 비교할 때, 1.34배 증가된 성능의 부호화/복호화 속도를 제공한다.

CAA를 이용한 CATIA V5 파일보안시스템 개발에 관한 연구 (A study on development of CATIA V5 file security system using CAA)

  • 채희창;박두섭;변재홍
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 2006년도 춘계학술대회 논문집
    • /
    • pp.417-418
    • /
    • 2006
  • CATIA V5 is one of the most preferred softwares in product design for domestic and industrial use. But with the development of the IT industry, design data by CATIA V5 can easily be hacked and stolen especially via the internet and through assistance storage medium. The design data could be protected through executive, physical and technical security system. The best way to maintain confidentiality of data from unauthorized access is to have a cryptosystem of the technical security. In this paper, a cryptosystem for the protection of design data was being proposed. The memory contains the file information made by the New and Open function of CATIA V5. No error can be expected even if the file changed before of after the application of Save and Open function, A cryptosystem was constructed in CATIA V5 by inserting crypto algorithm before and after the I/O process. The encryption/decryption algorithm of each function was based on the complex cipher, which applied permutation cipher and transpose cipher. The file security system was programmed in CAA V5 and Visual C++.

  • PDF

CAA를 이용한 CATIA V5 파일보안시스템 개발에 관한 연구 (A Study on Development of CATIA V5 File Security System Using CAA)

  • 채희창;박두섭;변재홍
    • 한국정밀공학회지
    • /
    • 제24권5호
    • /
    • pp.77-81
    • /
    • 2007
  • CATIA V5 is one of the most preferred softwares in product design for domestic and industrial use. But with the development of the IT industry, design data by CATIA V5 can easily be hacked and stolen especially via the internet and through assistance storage medium. The design data could be protected through executive, physical and technical security system. the best way to maintain confidentiality of data from unauthorized access is to have a cryptosystem of the technical security. In this paper, a cryptosystem for the protection of design data was being proposed. The memory contains the file information made by the New and Open function of CATIA V5. No error can be expected even if the file changed before of after the application of Save and Open function. A cryptosystem was constructed in CATIA V5 by inserting crypto algorithm before and after the I/O process. The encryption/decryption algorithm of each function was based on the complex cipher, which applied permutation cipher and transpose cipher. The file security system was programmed in CAA V5 and Visual C++.

A Design of Block cipher-Secure Electronic Xenogenesis Alorithm for Efficient Plaintext Management in Block Cryptosystem

  • Lee, Seon-Keun;Kim, Hwan-Yong
    • 한국통신학회논문지
    • /
    • 제28권4C호
    • /
    • pp.356-364
    • /
    • 2003
  • Presently, etwork is being in the existence as an influence can not be neglected. This rapid progress of network has gone with development of mobile network and information communication. But the development of network can generate serous social problems. So, it is highly required to control security of network. These problems related security will be developed and keep up to confront with anti-security part such as hacking, cracking. There's no way to preserve security from hacker or cracker without delvelopping new cryptographic algorithm or keeping the state of anti-cryptanalysis in a prescribed time by means of extendig key-length. Worldwidely, many researchers for network security are trying to handle these problems. In this paper, we proposed a new block cryptosystem. The Block cipher-Secure Electronic Xenogenesis Algorithm(B-SEXA) which is capable to cipher regardless of key distribution or key-length for these definite problem is proposed and designed in hardware. B-SEXA increase secret level from using a MDP and MLP in maximum is proposed to prevent cryptograpy analysis. The designed B-SEXA in this paper performed synthesization and simulation using Synopsys Vwe. 1999.10 and VHDL.

소프트웨어 불법복제방지를 위한 보안칩 (The Secure Chip for Software Illegal Copy Protection)

  • 오명신;한승조
    • 정보보호학회논문지
    • /
    • 제12권4호
    • /
    • pp.87-98
    • /
    • 2002
  • 현재는 유형적인 물질의 가치보다 무형적인 정보의 가치가 중요시되고 있는 시대이다. 특히 하드웨어보다는 소프트웨어 제품이 훨씬 급성장하고 있지만 소프트웨어 불법 복제는 정보화시대의 가장 큰 역기능으로 이슈화 되어있다. 그러나 현재 상용화되고 있는 소프트웨어 불법복제방지제품(락)들은 복제방지에 대한 강도가 약하기 때문에 쉽게 락이 크랙되어 복제방지 기능을 할 수 없는 것들이 대부분이다. 논자는 [1,2,3]에서 DES 암호알고리즘을 대체 할 수 있는 112비트 키 길이를 갖는 96비트 블록 Cipher를 제안한 바 있으며, [3.4]에서 칩으로 하였다. 따라서 본 논문은 [1,2,3]에서 제안한 96비트 블록 Cipher와 복제방지에 필요한 보안모듈을 ASIC화하여 소프트웨어 복제방지를 위한 전용 보안칩을 설계 및 구현하며, 보안칩과 연동하여 동작되는 자동블록보호기법을 설계한다.

Higher-Order Countermeasures against Side-Channel Cryptanalysis on Rabbit Stream Cipher

  • Marpaung, Jonathan A.P.;Ndibanje, Bruce;Lee, Hoon Jae
    • Journal of information and communication convergence engineering
    • /
    • 제12권4호
    • /
    • pp.237-245
    • /
    • 2014
  • In this study, software-based countermeasures against a side-channel cryptanalysis of the Rabbit stream cipher were developed using Moteiv's Tmote Sky, a popular wireless sensor mote based on the Berkeley TelosB, as the target platform. The countermeasures build upon previous work by improving mask generation, masking and hiding other components of the algorithm, and introducing a key refreshment scheme. Our contribution brings improvements to previous countermeasures making the implementation resistant to higher-order attacks. Four functional metrics, namely resiliency, robustness, resistance, and scalability, were used for the assessment. Finally, performance costs were measured using memory usage and execution time. In this work, it was demonstrated that although attacks can be feasibly carried out on unprotected systems, the proposed countermeasures can also be feasibly developed and deployed on resource-constrained devices, such as wireless sensors.

Reliable and Secure Voice Encryption over GSM Voice Channel

  • Lee, Hoon-Jae;Jang, Won-Tae;Kim, Tae-Yong
    • Journal of information and communication convergence engineering
    • /
    • 제8권1호
    • /
    • pp.64-70
    • /
    • 2010
  • In this paper, we study and develope a special secure Dongle to be adapted in GSM SmartPhone for secure voice communication to the serial 20-pin connector in SmartPhone. We design and implement the Dongle module hardware, firmware, and software including cipher crypto-synchronization and cipher algorithm. Also we study and emulate the SmartPhone GUI software interface including communication software module to the Dongle. Finally, we analyze the performances of crypto-synchronization in some noisy environment and also we test the secure Dongle module.