• 제목/요약/키워드: Data Encryption

검색결과 1,013건 처리시간 0.027초

Double Random Phase Encryption Based Orthogonal Encoding Technique for Color Images

  • Lee, In-Ho;Cho, Myungjin
    • Journal of the Optical Society of Korea
    • /
    • 제18권2호
    • /
    • pp.129-133
    • /
    • 2014
  • In this paper, we propose a simple Double random phase encryption (DRPE)-based orthogonal encoding technique for color image encryption. In the proposed orthogonal encoding technique, a color image is decomposed into red, green, and blue components before encryption, and the three components are independently encrypted with DRPE using the same key in order to decrease the complexity of encryption and decryption. Then, the encrypted data are encoded with a Hadamard matrix that has the orthogonal property. The purpose of the proposed orthogonal encoding technique is to improve the security of DRPE using the same key at the cost of a little complexity. The proposed orthogonal encoder consists of simple linear operations, so that it is easy to implement. We also provide the simulation results in order to show the effects of the proposed orthogonal encoding technique.

Optical Encryption Scheme for Cipher Feedback Block Mode Using Two-step Phase-shifting Interferometry

  • Jeon, Seok Hee;Gil, Sang Keun
    • Current Optics and Photonics
    • /
    • 제5권2호
    • /
    • pp.155-163
    • /
    • 2021
  • We propose a novel optical encryption scheme for cipher-feedback-block (CFB) mode, capable of encrypting two-dimensional (2D) page data with the use of two-step phase-shifting digital interferometry utilizing orthogonal polarization, in which the CFB algorithm is modified into an optical method to enhance security. The encryption is performed in the Fourier domain to record interferograms on charge-coupled devices (CCD)s with 256 quantized gray levels. A page of plaintext is encrypted into digital interferograms of ciphertexts, which are transmitted over a digital information network and then can be decrypted by digital computation according to the given CFB algorithm. The encryption key used in the decryption procedure and the plaintext are reconstructed by dual phase-shifting interferometry, providing high security in the cryptosystem. Also, each plaintext is sequentially encrypted using different encryption keys. The random-phase mask attached to the plaintext provides resistance against possible attacks. The feasibility and reliability of the proposed CFB method are verified and analyzed with numerical simulations.

Enabling Energy Efficient Image Encryption using Approximate Memoization

  • Hong, Seongmin;Im, Jaehyung;Islam, SM Mazharul;You, Jaehee;Park, Yongjun
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • 제17권3호
    • /
    • pp.465-472
    • /
    • 2017
  • Security has become one of the most important requirements for various devices for multi-sensor based embedded systems. The AES (Advanced Encryption Standard) algorithm is widely used for security, however, it requires high computing power. In order to reduce the CPU power for the data encryption of images, we propose a new image encryption module using hardware memoization, which can reuse previously generated data. However, as image pixel data are slightly different each other, the reuse rate of the simple memoization system is low. Therefore, we further apply an approximate concept to the memoization system to have a higher reuse rate by sacrificing quality. With the novel technique, the throughput can be highly improved by 23.98% with 14.88% energy savings with image quality loss minimization.

단일 데이터패스 구조에 기반한 AES 암호화 및 복호화 엔진의 효율적인 통합설계 (Efficient Integrated Design of AES Crypto Engine Based on Unified Data-Path Architecture)

  • 정찬복;문용호
    • 대한임베디드공학회논문지
    • /
    • 제7권3호
    • /
    • pp.121-127
    • /
    • 2012
  • An integrated crypto engine for encryption and decryption of AES algorithm based on unified data-path architecture is efficiently designed and implemented in this paper. In order to unify the design of encryption and decryption, internal steps in single round is adjusted so as to operate with columns after row operation is completed and efficient method for a buffer is developed to simplify the Shift Rows operation. Also, only one S-box is used for both key expansion and crypto operation and Key-Box saving expended key is introduced provide the key required in encryption and decryption. The functional simulation based on ModelSim simulator shows that 164 clocks are required to process the data of 128bits in the proposed engine. In addition, the proposed engine is implemented with 6,801 gates by using Xilinx Synthesizer. This demonstrate that 40% gates savings is achieved in the proposed engine, compared to individual designs of encryption and decryption engine.

Survey on Data Deduplication in Cloud Storage Environments

  • Kim, Won-Bin;Lee, Im-Yeong
    • Journal of Information Processing Systems
    • /
    • 제17권3호
    • /
    • pp.658-673
    • /
    • 2021
  • Data deduplication technology improves data storage efficiency while storing and managing large amounts of data. It reduces storage requirements by determining whether replicated data is being added to storage and omitting these uploads. Data deduplication technologies require data confidentiality and integrity when applied to cloud storage environments, and they require a variety of security measures, such as encryption. However, because the source data cannot be transformed, common encryption techniques generally cannot be applied at the same time as data deduplication. Various studies have been conducted to solve this problem. This white paper describes the basic environment for data deduplication technology. It also analyzes and compares multiple proposed technologies to address security threats.

Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing

  • Chao Ma;Xiaojun Jin;Song Luo;Yifei Wei;Xiaojun Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권7호
    • /
    • pp.1935-1950
    • /
    • 2023
  • The arrival of the Internet of Things and 5G technology enables users to rely on edge computing platforms to process massive data. Data sharing based on edge computing refines the efficiency of data collection and analysis, saves the communication cost of data transmission back and forth, but also causes the privacy leakage of a lot of user data. Based on attribute-based encryption and blockchain technology, we design a fine-grained access control scheme for data in edge computing, which has the characteristics of verifiability, support for outsourcing decryption and user attribute revocation. User attributes are authorized by multi-attribute authorization, and the calculation of outsourcing decryption in attribute encryption is completed by edge server, which reduces the computing cost of end users. Meanwhile, We implemented the user's attribute revocation process through the dual encryption process of attribute authority and blockchain. Compared with other schemes, our scheme can manage users' attributes more flexibly. Blockchain technology also ensures the verifiability in the process of outsourcing decryption, which reduces the space occupied by ciphertext compared with other schemes. Meanwhile, the user attribute revocation scheme realizes the dynamic management of user attribute and protects the privacy of user attribute.

원격 저장소 환경에서 다중 키워드를 이용한 효율적인 검색 가능한 대칭키 암호 시스템 (Effective Searchable Symmetric Encryption System using Conjunctive Keyword on Remote Storage Environment)

  • 이선호;이임영
    • 정보처리학회논문지C
    • /
    • 제18C권4호
    • /
    • pp.199-206
    • /
    • 2011
  • 매우 가벼운 무게와 손안에 들어가는 작은 크기로 휴대성을 제공하는 휴대용 저장매체는 사용자들로부터 많은 호응을 받고 있다. 하지만 휴대용 저장매체의 휴대성으로 인하여 USB 메모리의 분실 및 도난이 잦아졌고 그로 인하여 저장매체 내부에 저장되어 있는 개인정보가 유출되는 사고가 발생하는 문제점이 발생되었다. 따라서 분실위험이 없고 네트워크를 통하여 언제든 자료를 저장하고 접근할 수 있는 원격 저장소 서비스가 등장하게 되었다. 정보통신산업이 발달함에 따라 여러 종류의 정보 기기를 통하여 언제 어디서든 빠른 네트워크에 접근할 수 있게 되었고, 이는 원격 저장소를 이용하는 사용자들을 더욱 증가하게 하였다. 하지만 여러 사용자의 주요 자료가 저장됨에 따라 비윤리적인 관리자 및 공격자로 인하여 서버에 저장된 여러 사용자의 주요자료가 동시에 유출될 수 있는 위험이 존재한다. 이를 해결하기 위해 서버에 저장되는 자료의 암호화가 필요해졌으며, 이와 동시에 암호화한 자료의 효율적인 검색 및 이용을 위하여 검색 가능 암호 시스템이 필요하다. 하지만, 기존의 대칭키 검색 가능 암호 시스템은 문서의 삽입/삭제 효율성 및 다중 키워드 검색 시 연산의 효율성이 떨어지는 문제점이 존재한다. 따라서 본 논문은 기존 대칭키 검색 가능 암호의 문제점을 해결할 수 있는 효율적인 대칭키 검색 가능 암호 시스템을 제안한다.

Message Security Level Integration with IoTES: A Design Dependent Encryption Selection Model for IoT Devices

  • Saleh, Matasem;Jhanjhi, NZ;Abdullah, Azween;Saher, Raazia
    • International Journal of Computer Science & Network Security
    • /
    • 제22권8호
    • /
    • pp.328-342
    • /
    • 2022
  • The Internet of Things (IoT) is a technology that offers lucrative services in various industries to facilitate human communities. Important information on people and their surroundings has been gathered to ensure the availability of these services. This data is vulnerable to cybersecurity since it is sent over the internet and kept in third-party databases. Implementation of data encryption is an integral approach for IoT device designers to protect IoT data. For a variety of reasons, IoT device designers have been unable to discover appropriate encryption to use. The static support provided by research and concerned organizations to assist designers in picking appropriate encryption costs a significant amount of time and effort. IoTES is a web app that uses machine language to address a lack of support from researchers and organizations, as ML has been shown to improve data-driven human decision-making. IoTES still has some weaknesses, which are highlighted in this research. To improve the support, these shortcomings must be addressed. This study proposes the "IoTES with Security" model by adding support for the security level provided by the encryption algorithm to the traditional IoTES model. We evaluated our technique for encryption algorithms with available security levels and compared the accuracy of our model with traditional IoTES. Our model improves IoTES by helping users make security-oriented decisions while choosing the appropriate algorithm for their IoT data.

데이타 보호용 모뎀 시스템 (A Secure Modem System)

  • 백기진;이창순;문상재
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 1991년도 학술발표논문집
    • /
    • pp.194-203
    • /
    • 1991
  • This paper presents the hardware development of a secure modem system for personal computers. This system consists of a data encryption system and an existing modem. The algorithm of LUCIFER-type with block size of 64-bit is used for data encryption and Diffie-Hellman method is also employed for generation of the encryption key. We implement the system in hardware using the DSP56001.

  • PDF

실시간 처리를 위한 쿼드트리 기반 무손실 영상압축 및 암호화 (QuadTree-Based Lossless Image Compression and Encryption for Real-Time Processing)

  • 윤정오;성우석;황찬식
    • 정보처리학회논문지C
    • /
    • 제8C권5호
    • /
    • pp.525-534
    • /
    • 2001
  • 일반적으로 무손실 영상압축 및 암호화 방법에는 압축과 암호화 과정이 독립적으로 이루어진다. 압축 후 암호화를 수행하면 압축열이 암호에 대한 평문으로 사용되므로 압축에 따른 엔트로피가 감소하여 랜덤한 성질을 갖게된다. 그러나 압축열 전체에 대한 암호화는 수행시간이 길어져 실시간 처리를 저해하는 원인이 되기도 한다. 본 논문에서는 무손실 영상압축과 암호의 결합에서 전체 처리시간을 줄이는 방법을 제안한다. 이는 쿼드트리 압축 알고리즘으로 그레이 영상을 분해하여 구조부분만을 암호화하는 방법이다. 아울러 영상의 무상관성과 동질영역을 확보하기 위한 변환과정을 수행하여 무손실 압축성능을 개선하였고, 쿼드트리 분해시 암호화되지 않은 데이터를 레벨별로 재구성하여 안전성을 갖도록 하였다. 모의 실험을 통하여 제안한 방법이 영상 압축율의 개선과 암호화 방법의 안전성 확보 및 실시간 처리가 가능함을 확인하였다.

  • PDF