• Title/Summary/Keyword: DES암호 알고리즘

Search Result 92, Processing Time 0.022 seconds

Design of Multimode Block Cryptosystem for Network Security (네트워크 보안을 위한 다중모드 블록암호시스템의 설계)

  • 서영호;박성호;최성수;정용진;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.11C
    • /
    • pp.1077-1087
    • /
    • 2003
  • In this paper, we proposed an architecture of a cryptosystem with various operating modes for the network security and implemented in hardware using the ASIC library. For configuring a cryptosystem, the standard block ciphers such as AES, SEED and 3DES were included. And the implemented cryptosystem can encrypt and decrypt the data in real time through the wired/wireless network with the minimum latency time (minimum 64 clocks, maximum 256 clocks). It can support CTR mode which is widely used recently as well as the conventional block cipher modes such as ECB, CBC and OFB, and operates in the multi-bit mode (64, 128, 192, and 256 bits). The implemented hardware has the expansion possibility for the other algorithms according to the network security protocol such as IPsec and the included ciphering blocks can be operated simultaneously. The self-ciphering mode and various ciphering mode can be supported by the hardware sharing and the programmable data-path. The global operation is programmed by the serial communication port and the operation is decided by the control signals decoded from the instruction by the host. The designed hardware using VHDL was synthesized with Hynix 0.25$\mu\textrm{m}$ CMOS technology and it used the about 100,000 gates. Also we could assure the stable operation in the timing simulation over 100㎒ using NC-verilog.

Design of Security Module using Key Exchange Protocol in Digital Contents (키 교환 프로토콜을 이용한 디지털콘텐츠 보호 모듈 설계)

  • 권도윤;이경원;김정호
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.3
    • /
    • pp.40-46
    • /
    • 2003
  • In the paper, designed digital contents security module to check unlawfulness reproduction and distribution of digital contents. This paper applied Diffie-Hellman algorithm that use discrete logarithm and random number as primary for public key application to create encryption key that agree each other through communication channel between DCPS and HOST, and applied Triple DES repeat DES 3 times through 2 different encryption key that is selecting ANSI X9.17 that is key management standard, ISO 8732 and PEM(Privacy-Enhanced Mail) etc. by secondary protection for safe transmission of digital contents in transmission line. Designed security module consist of key exchange module, key derivation module and copy protection processing module. Digital contents security module that design in this thesis checks reproduction and distribution of digital contents by unauthenticated user through user certification function and digital contents encryption function, and protect digital contents transmission line.

  • PDF

A Study on the Cipher JPEG Imag (JPEG 암호화에 관한 연구)

  • 박용범;박종일
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.3 no.4
    • /
    • pp.308-312
    • /
    • 2002
  • Recently, Internet is getting more popular and the usage of multimedia contents is getting more increased. Among the multimedia contents, the JPEG format is the most commonly used Image data format but the JPEG format doesn't supply cryptographic methods and access control. In this paper, a cryptographic method for cipher JPEG Image is proposed. This method can supply encryption and decryption using several algorithms such as DES to the JPEG Image data. Huffman table, which is the most important data area for JPEG data coding, is chosen as the coding data. Each method is compared to select the optimal cryptographic method in a certain environment.

  • PDF

The Secure Chip for Software Illegal Copy Protection (소프트웨어 불법복제방지를 위한 보안칩)

  • 오명신;한승조
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.4
    • /
    • pp.87-98
    • /
    • 2002
  • Software has been developed very fast as information has become important value. Illegal software copy has been the main problem of developing software business. Recently used protecting lock system for software copy has not guaranteed perfectly from easily cracked-defense system. This paper, therefore, proposes 96-bit block cipher with 112-bit length to replace a DES(Data Encryption Standard) algorithm. Security chip by ASIC(Application Specific Integrated Circuit) security module is presented for software copy protection. Then, an auto block protecting algorithm is designed for the security chip. Finally, controlling driver and library are built for the security chip.

Performance Improvement of Power Attacks with Truncated Differential Cryptanalysis (부정차분을 이용한 전력분석 공격의 효율 향상*)

  • Kang, Tae-Sun;Kim, Hee-Seok;Kim, Tae-Hyun;Kim, Jong-Sung;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.43-51
    • /
    • 2009
  • In 1998, Kocher et al. introduced Differential Power Attack on block ciphers. This attack allows to extract secret key used in cryptographic primitives even if these are executed inside tamper-resistant devices such as smart card. At FSE 2003 and 2004, Akkar and Goubin presented several masking methods, randomizing the first few and last few($3{\sim}4$) rounds of the cipher with independent random masks at each round and thereby disabling power attacks on subsequent inner rounds, to protect iterated block ciphers such as DES against Differential Power Attack. Since then, Handschuh and Preneel have shown how to attack Akkar's masking method using Differential Cryptanalysis. This paper presents how to combine Truncated Differential Cryptanalysis and Power Attack to extract the secret key from intermediate unmasked values and shows how much more efficient our attacks are implemented than the Handschuh-Preneel method in term of reducing the number of required plaintexts, even if some errors of Hamming weights occur when they are measured.

A MDIT(Mobile Digital Investment Trust) Agent design and security enhancement using 3BC and E2mECC (3BC와 F2mECC를 이용한 MDIT(Mobile Digital Investment Trust) 에이전트 설계 및 보안 강화)

  • Jeong Eun-Hee;Lee Byung-Kwan
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.1-16
    • /
    • 2005
  • This paper propose not only MDIT(Mobile Digital Investment Trust) agent design for Trust Investment under Mobile E-commerce environment, but also the symmetric key algorithm 3BC(Bit, Byte and Block Cypher) and the public encryption algorithm F2mECC for solving the problems of memory capacity, CPU processing time, and security that mobile environment has. In Particular, the MDIT Security Agent is the banking security project that introduces the concept of investment trust in mobile e-commerce, This mobile security protocol creates a shared secrete key using F2mECC and then it's value is used for 3BC that is block encryption technique. The security and the processing speed of MDIT agent are enhanced using 3BC and F2mECC.

  • PDF

A Study on the Cipher JPEG Image (JPEG 암호화에 관한 연구)

  • 박종일;박용범
    • Proceedings of the KAIS Fall Conference
    • /
    • 2002.11a
    • /
    • pp.216-219
    • /
    • 2002
  • 최근 인터넷 환경의 보급에 힘입어 멀티미디어 자료들의 비중이 점점 늘어나고 있다. 그 중에서 가장 범용적으로 사용되고 있는 멀티미디어 자료 표현 방법 중의 하나인 JPEG 파일의 경우에는 암호화나 특정 사용자에 대한 접근권한 등에 특별한 대안이 없는 것이 사실이다. 이에 본 논문에서는 JPEG 파일에 대하여 자료의 보안과 허가된 사용자만이 접근이 가능하게 하기 위한 방법으로 암호화를 지원하며, 암호화 알고리즘은 간단한 비트교환부터 DES 등의 다양한 암호방법론이 적용 가능한 방법을 제시하였다. 데이터 암호화는 JPEG 에서 복원을 할 때 가장 중요하게 사용되는 영역인 허프만 테이블과 비교를 위하여 이미지영역까지 확대하여 암호화를 수행하였다. 또한 이들 각각의 방법론들에 대한 비교분석을 통하여 임의의 환경 하에서의 가장 적합한 암호화 방법론의 선택기준을 살펴보았다.

Analysis of Probable Plaintext Attack in IPv4 and IPv6 Under IP Security Protocol (인터넷 보호 프로토콜에서 IPv4와 IPv6의 예상 평문 공격의 비교 분석)

  • Soh, Ju-Ho;Park, Hyun-Min;Choe, Byeong-Seog;Park, Jae-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10b
    • /
    • pp.1457-1460
    • /
    • 2000
  • 평문과 암호문 쌍에서 일부 예측할 수 있는 평문들을 이용하여 비밀키를 찾는 공격을 예상 평문 공격(Probable Plaintext Attack)(1)이라고 한다. 인터넷 보호 프로토콜은 IP Datagram에 AH(Authentication Header)(2), ESP(Encapsulating Security Payload)(3) 등과 같은 Security Header가 붙여지며, 각 헤더부분에서 예상할 수 있는 영역을 가지고 있으므로 예상 평문 공격의 주요한 대상이되고, 이러한 취약점은 현재 인터넷 보호 프로토콜에서 사용되고 있는 DES(Data Encryption Standard)(4) 알고리즘에서 두드러지게 나타난다. 본 논문에서는 IPv4와 IPv6를 서로 비교하고 각각의 IP version에서 예측할 수 있는 예상 평문영역을 조사한 다음, 일어 날 수 있는 예상 평문 공격의 비율을 서로 비교하여 앞으로 상용화될 IPv6의 문제점과 해결방안을 제시한다.

  • PDF

A Study on Protection of Digital Contents using Key Exchange Protocol (Key Exchange 프로토콜을 이용한 디지털 콘텐츠 보호에 관한 연구)

  • Kwon, Do-Yun;Kim, Jeong-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2021-2024
    • /
    • 2003
  • 디지털 콘텐츠는 텍스트, 이미지, 비디오, 오디오 통의 디지털 저작물을 포함하는 총체적인 용어로 인터넷 상에서 접근할 수 있는 디지털화된 파일을 의미하는데, 최근 전자상거래의 급속한 발달과 인터넷과 같은 컴퓨터망의 확산으로 디지털 콘텐츠의 활용이 기하급수적으로 증가하고 있다. 디지털 콘텐츠는 저장, 편집, 수정이 용이할 뿐만 아니라 인터넷을 통해 원본의 손상 없이 무제한의 복제와 배포가 가능하다는 장점을 가지고 있다. 그러나, 이와 더불어 디지털 콘텐츠의 불법복제 및 배포와 같은 중요한 문제점들을 내포하고 있다. 따라서, 본 논문에서는 Key Exchange 프로토콜과 Triple DES 암호 알고리즘을 이용하여 디지털 콘텐츠 불법 복제 및 배포를 방지하기 위한 디지털 콘텐츠 보호 시스템을 구현하였다.

  • PDF

Hardware Architecture of High Performance Cipher for Security of Digital Hologram (디지털 홀로그램의 보안을 위한 고성능 암호화기의 하드웨어 구조)

  • Seo, Young-Ho;Yoo, Ji-Sang;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.17 no.2
    • /
    • pp.374-387
    • /
    • 2012
  • In this paper, we implement a new hardware for finding the significant coefficients of a digital hologram and ciphering them using discrete wavelet packet transform (DWPT). Discrete wavelet transform (DWT) and packetization of subbands is used, and the adopted ciphering technique can encrypt the subbands with various robustness based on the level of the wavelet transform and the threshold of subband energy. The hologram encryption consists of two parts; the first is to process DWPT, and the second is to encrypt the coefficients. We propose a lifting based hardware architecture for fast DWPT and block ciphering system with multi-mode for the various types of encryption. The unit cell which calculates the repeated arithmetic with the same structure is proposed and then it is expanded to the lifting kernel hardware. The block ciphering system is configured with three block cipher, AES, SEED and 3DES and encrypt and decrypt data with minimal latency time(minimum 128 clocks, maximum 256 clock) in real time. The information of a digital hologram can be hided by encrypting 0.032% data of all. The implemented hardware used about 200K gates in $0.25{\mu}m$ CMOS library and was stably operated with 165MHz clock frequency in timing simulation.