• 제목/요약/키워드: Cryptosystem

검색결과 445건 처리시간 0.028초

Twofish 암호알고리즘의 성능향상을 위한개선 된 MDS 블록 설계 (Design of Modified MDS Block for Performance Improvement of Twofish Cryptographic Algorithm)

  • 정우열;이선근
    • 한국컴퓨터정보학회논문지
    • /
    • 제10권5호
    • /
    • pp.109-114
    • /
    • 2005
  • Twofish 암호알고리즘은 AES인 Rijndael 암호알고리즘에 비하여 알고리즘 자체가 간결하며, 구현의 용이성이 좋지만 처리속도가 느린 단점을 가진다. 그러므로 본 논문은 Twofish 암호알고리즘의 속도를 향상시키기 위하여 개선된 MDS 블록을 설계하였다. 기존 MDS 블록은 Twofish 암호시스템의 critical path를 점유하게 되는 블록으로서 처리속도의 병목현상으로 인한 속도저하의 문제점이 존재하였다. MDS 블록에서 연산자로 사용되는 곱셈연산을 감소시키기 위하여 본 논문은 LUT 연산과 modul-2o연산을 사용하여 MDS자체에 대한 속도저하 및 병목현상을 제거하였다 이러한 결과로 새롭게 설계된 MDS블록을 포함하는 Twofish 암호시스템은 기존 Twofish 암호시스템에 비하여 10$\%$정도 처리속도의 향상을 가져옴을 확인하였다.

  • PDF

타원 곡선 상의 Diffie-Hellman 기반 하이브리드 암호 시스템 (Hybrid Cryptosystem based on Diffie-Hellman over Elliptic Curve)

  • 정경숙;정태충
    • 한국컴퓨터정보학회논문지
    • /
    • 제8권4호
    • /
    • pp.104-110
    • /
    • 2003
  • 본 논문에서는 타원 곡선 상에서의 Diffie-Hellman 기반의 하이브리드 암호 시스템을 제안하고, 구체적인 프로토콜을 설계하였다. 본 논문에서 제안하는 하이브리드 암호 시스템은 기존 하이브리드 시스템과 달리, 송신자와 수신자에 대한 함축적 키 인증성을 제공하는 효율적인 하이브리드 암호 시스템이다. 이 시스템은 암호학적으로 안전한 의사 난수 생성기를 사용하여 세션키를 생성함으로써 안전성을 높였으며, 하이브리드 시스템이기때문에 공개키 시스템과 비밀키 시스템의 장단점을 보완하여 계산량 면에서 더 효율적이다. 또한 위장 공격이 불가능하며, 송신자의 비밀키가 노출되더라도 지정된 수신자 이외에는 정당한 평문을 얻을 수 없다. 그리고 세션키가 노출되더라도 다른 세션의 암호문의 안전성에는 영향을 주지 않는, 알려진 키에 대한 안전성 뿐만 아니라 상호 개체 인증과 재실행 공격에 대한 안전성도 제공한다.

  • PDF

Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks

  • Li, Wei;Ge, Chenyu;Gu, Dawu;Liao, Linfeng;Gao, Zhiyong;Shi, Xiujin;Lu, Ting;Liu, Ya;Liu, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권7호
    • /
    • pp.3421-3437
    • /
    • 2018
  • With the enlargement of wireless technology, vehicular ad-hoc networks (VANETs) are rising as a hopeful way to realize smart cities and address a lot of vital transportation problems such as road security, convenience, and efficiency. To achieve data confidentiality, integrity and authentication applying lightweight cryptosystems is widely recognized as a rather efficient approach for the VANETs. The Khudra cipher is such a lightweight cryptosystem with a typical Generalized Feistel Network, and supports 80-bit secret key. Up to now, little research of fault analysis has been devoted to attacking Khudra. On the basis of the single nibble-oriented fault model, we propose a differential fault analysis on Khudra. The attack can recover its 80-bit secret key by introducing only 2 faults. The results in this study will provides vital references for the security evaluations of other lightweight ciphers in the VANETs.

CAA를 이용한 CATIA V5 파일보안시스템 개발에 관한 연구 (A study on development of CATIA V5 file security system using CAA)

  • 채희창;박두섭;변재홍
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 2006년도 춘계학술대회 논문집
    • /
    • pp.417-418
    • /
    • 2006
  • CATIA V5 is one of the most preferred softwares in product design for domestic and industrial use. But with the development of the IT industry, design data by CATIA V5 can easily be hacked and stolen especially via the internet and through assistance storage medium. The design data could be protected through executive, physical and technical security system. The best way to maintain confidentiality of data from unauthorized access is to have a cryptosystem of the technical security. In this paper, a cryptosystem for the protection of design data was being proposed. The memory contains the file information made by the New and Open function of CATIA V5. No error can be expected even if the file changed before of after the application of Save and Open function, A cryptosystem was constructed in CATIA V5 by inserting crypto algorithm before and after the I/O process. The encryption/decryption algorithm of each function was based on the complex cipher, which applied permutation cipher and transpose cipher. The file security system was programmed in CAA V5 and Visual C++.

  • PDF

CAA를 이용한 CATIA V5 파일보안시스템 개발에 관한 연구 (A Study on Development of CATIA V5 File Security System Using CAA)

  • 채희창;박두섭;변재홍
    • 한국정밀공학회지
    • /
    • 제24권5호
    • /
    • pp.77-81
    • /
    • 2007
  • CATIA V5 is one of the most preferred softwares in product design for domestic and industrial use. But with the development of the IT industry, design data by CATIA V5 can easily be hacked and stolen especially via the internet and through assistance storage medium. The design data could be protected through executive, physical and technical security system. the best way to maintain confidentiality of data from unauthorized access is to have a cryptosystem of the technical security. In this paper, a cryptosystem for the protection of design data was being proposed. The memory contains the file information made by the New and Open function of CATIA V5. No error can be expected even if the file changed before of after the application of Save and Open function. A cryptosystem was constructed in CATIA V5 by inserting crypto algorithm before and after the I/O process. The encryption/decryption algorithm of each function was based on the complex cipher, which applied permutation cipher and transpose cipher. The file security system was programmed in CAA V5 and Visual C++.

ID 기반 키동의 프로토콜을 이용한 PayWord 시스템 (PayWord System using ID-based tripartite Key Agreement Protocol)

  • 이현주;이충세
    • 한국통신학회논문지
    • /
    • 제29권2C호
    • /
    • pp.348-353
    • /
    • 2004
  • 모바일 환경에서 전자 지불 메카니즘이 구축되기 위채서는 안전성과 효율성을 갖춘 지불 시스템의 개발이 필요하다. 기존의 PayWord 프로토콜은 판매자와 거래를 할 때마다 판매자의 인증서를 생성해야 하기 때문에 연산량이 빈번해진다. 본 논문에서는 유한체 $F_{q}$에서 타원곡선(Elliptic Cue Cryptosystem)을 이용한 ID 기반 3자간의 키 동의 프로토콜에 의해 생성된 세션키로써 개체간의 인증이 이루어지기 때문에 알고리즘 연산이 감소된다. 특히, ID 기반 공개키 암호 시스템을 적용하여 속도의 향상 및 위장 공격(Man-in-the-middle attacks)과 Forward secrecy에 안전하다.

ON THE STRUCTURES OF CLASS SEMIGROUPS OF QUADRATIC NON-MAXIMAL ORDERS

  • KIM, YONG TAE
    • 호남수학학술지
    • /
    • 제26권3호
    • /
    • pp.247-256
    • /
    • 2004
  • Buchmann and Williams[1] proposed a key exchange system making use of the properties of the maximal order of an imaginary quadratic field. $H{\ddot{u}}hnlein$ et al. [6,7] also introduced a cryptosystem with trapdoor decryption in the class group of the non-maximal imaginary quadratic order with prime conductor q. Their common techniques are based on the properties of the invertible ideals of the maximal or non-maximal orders respectively. Kim and Moon [8], however, proposed a key-exchange system and a public-key encryption scheme, based on the class semigroups of imaginary quadratic non-maximal orders. In Kim and Moon[8]'s cryptosystem, a non-invertible ideal is chosen as a generator of key-exchange ststem and their secret key is some characteristic value of the ideal on the basis of Zanardo et al.[9]'s quantity for ideal equivalence. In this paper we propose the methods for finding the non-invertible ideals corresponding to non-primitive quadratic forms and clarify the structure of the class semigroup of non-maximal order as finitely disjoint union of groups with some quantities correctly. And then we correct the misconceptions of Zanardo et al.[9] and analyze Kim and Moon[8]'s cryptosystem.

  • PDF

복소 이차체위에서의 공개키 암호계에 관한 소고 (On the Public Key Cryptosystems over Imaginary Quadratic Fields)

  • 김용태
    • 한국전자통신학회논문지
    • /
    • 제4권4호
    • /
    • pp.270-273
    • /
    • 2009
  • 1988년에 Buchmann 과 Williams이 처음으로 복소이차체의 최대 order을 이용한 키 분배암호계를 제안하였다. 그 후 H$\ddot{u}$hnlein, Tagaki 등이 솟수 conductor를 갖는 비-최대 복소 이차 order의 class group에서 덫을 가지는 암호계를 발표하였다. 두 가지 방법의 공통점은 최대 oder 또는 비-최대 order의 가역 이데알의 특성을 이용하는 것이었다. 한편 2003년에 Kim and Moon은 복소 이차 비-최대 order의 class semigroup에 기반한 키분배암호계와 공개키 암호법을 소개하였다. 그런데 Kim and Moon의 암호계는 Zanardo등이 발표한 논문에서 동치이데알의 비-가역 이데알을 생성자로 택하여 비밀키를 그 이데알의 어떤 특성값으로 하는 암호계를 제안하였다. 본 논문에서는 이러한 암호계를 소개하고 그 암호계의 문제점, 효율성과 전망을 논하려고 한다.

  • PDF

Optical Implementation of Triple DES Algorithm Based on Dual XOR Logic Operations

  • Jeon, Seok Hee;Gil, Sang Keun
    • Journal of the Optical Society of Korea
    • /
    • 제17권5호
    • /
    • pp.362-370
    • /
    • 2013
  • In this paper, we propose a novel optical implementation of a 3DES algorithm based on dual XOR logic operations for a cryptographic system. In the schematic architecture, the optical 3DES system consists of dual XOR logic operations, where XOR logic operation is implemented by using a free-space interconnected optical logic gate method. The main point in the proposed 3DES method is to make a higher secure cryptosystem, which is acquired by encrypting an individual private key separately, and this encrypted private key is used to decrypt the plain text from the cipher text. Schematically, the proposed optical configuration of this cryptosystem can be used for the decryption process as well. The major advantage of this optical method is that vast 2-D data can be processed in parallel very quickly regardless of data size. The proposed scheme can be applied to watermark authentication and can also be applied to the OTP encryption if every different private key is created and used for encryption only once. When a security key has data of $512{\times}256$ pixels in size, our proposed method performs 2,048 DES blocks or 1,024 3DES blocks cipher in this paper. Besides, because the key length is equal to $512{\times}256$ bits, $2^{512{\times}256}$ attempts are required to find the correct key. Numerical simulations show the results to be carried out encryption and decryption successfully with the proposed 3DES algorithm.

A Design of Block cipher-Secure Electronic Xenogenesis Alorithm for Efficient Plaintext Management in Block Cryptosystem

  • Lee, Seon-Keun;Kim, Hwan-Yong
    • 한국통신학회논문지
    • /
    • 제28권4C호
    • /
    • pp.356-364
    • /
    • 2003
  • Presently, etwork is being in the existence as an influence can not be neglected. This rapid progress of network has gone with development of mobile network and information communication. But the development of network can generate serous social problems. So, it is highly required to control security of network. These problems related security will be developed and keep up to confront with anti-security part such as hacking, cracking. There's no way to preserve security from hacker or cracker without delvelopping new cryptographic algorithm or keeping the state of anti-cryptanalysis in a prescribed time by means of extendig key-length. Worldwidely, many researchers for network security are trying to handle these problems. In this paper, we proposed a new block cryptosystem. The Block cipher-Secure Electronic Xenogenesis Algorithm(B-SEXA) which is capable to cipher regardless of key distribution or key-length for these definite problem is proposed and designed in hardware. B-SEXA increase secret level from using a MDP and MLP in maximum is proposed to prevent cryptograpy analysis. The designed B-SEXA in this paper performed synthesization and simulation using Synopsys Vwe. 1999.10 and VHDL.