• 제목/요약/키워드: Encryption & Decryption System

검색결과 200건 처리시간 0.034초

전자상거래를 위한 128비트 블록 암호 알고리즘의 구현 (An Implementation of 128bit Block Cipher Algorithm for Electronic Commerce)

  • 서장원;전문석
    • 한국전자거래학회지
    • /
    • 제5권1호
    • /
    • pp.55-73
    • /
    • 2000
  • Recently; EC(Electronic Commerce) is increasing with high speed based on the expansion of Internet. EC which is done on the cyber space through Internet has strong point like independence from time and space. On the contrary, it also has weak point like security problem because anybody can access easily to the system due to open network attribute of Internet. Therefore, we need the solutions that protect the security problem for safe and useful EC activity. One of these solutions is the implementation of strong cipher algorithm. NC(Nonpolynomial Complete) cipher algorithm proposed in this paper is good for the security and it overcome the limit of current 64bits cipher algorithm using 128bits key length for input, output and encryption key, Moreover, it is designed for the increase of calculation complexity and probability calculation by adapting more complex design for subkey generation regarded as one of important element effected to encryption. The result of simulation by the comparison with other cipher algorithm for capacity evaluation of proposed NC cipher algorithm is that the speed of encryption and decryption is 7.63 Mbps per block and the speed of subkey generation is 2,42 μ sec per block. So, prosed NC cipher algorithm is regarded as proper level for encryption. Furthermore, speed of subkey generation shows that NC cipher algorithm has the probability used to MAC(Message Authentication Code) and block implementation of Hash function.

  • PDF

Hybrid Color and Grayscale Images Encryption Scheme Based on Quaternion Hartley Transform and Logistic Map in Gyrator Domain

  • Li, Jianzhong
    • Journal of the Optical Society of Korea
    • /
    • 제20권1호
    • /
    • pp.42-54
    • /
    • 2016
  • A hybrid color and grayscale images encryption scheme based on the quaternion Hartley transform (QHT), the two-dimensional (2D) logistic map, the double random phase encoding (DRPE) in gyrator transform (GT) domain and the three-step phase-shifting interferometry (PSI) is presented. First, we propose a new color image processing tool termed as the quaternion Hartley transform, and we develop an efficient method to calculate the QHT of a quaternion matrix. In the presented encryption scheme, the original color and grayscale images are represented by quaternion algebra and processed holistically in a vector manner using QHT. To enhance the security level, a 2D logistic map-based scrambling technique is designed to permute the complex amplitude, which is formed by the components of the QHT-transformed original images. Subsequently, the scrambled data is encoded by the GT-based DRPE system. For the convenience of storage and transmission, the resulting encrypted signal is recorded as the real-valued interferograms using three-step PSI. The parameters of the scrambling method, the GT orders and the two random phase masks form the keys for decryption of the secret images. Simulation results demonstrate that the proposed scheme has high security level and certain robustness against data loss, noise disturbance and some attacks such as chosen plaintext attack.

A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm

  • Houari, Nawal Sad;Taghezout, Noria
    • Journal of Information Processing Systems
    • /
    • 제12권4호
    • /
    • pp.688-710
    • /
    • 2016
  • Our approach permits to capitalize the expert's knowledge as business rules by using an agent-based platform. The objective of our approach is to allow experts to manage the daily evolutions of business domains without having to use a technician, and to allow them to be implied, and to participate in the development of the application to accomplish the daily tasks of their work. Therefore, the manipulation of an expert's knowledge generates the need for information security and other associated technologies. The notion of cryptography has emerged as a basic concept in business rules modeling. The purpose of this paper is to present a cryptographic algorithm based approach to integrate the security aspect in business rules modeling. We propose integrating an agent-based approach in the framework. This solution utilizes a security agent with domain ontology. This agent applies an encryption/decryption algorithm to allow for the confidentiality, authenticity, and integrity of the most important rules. To increase the security of these rules, we used hybrid cryptography in order to take advantage of symmetric and asymmetric algorithms. We performed some experiments to find the best encryption algorithm, which provides improvement in terms of response time, space memory, and security.

Systems Engineering Approach to develop the FPGA based Cyber Security Equipment for Nuclear Power Plant

  • Kim, Jun Sung;Jung, Jae Cheon
    • 시스템엔지니어링학술지
    • /
    • 제14권2호
    • /
    • pp.73-82
    • /
    • 2018
  • In this work, a hardware based cryptographic module for the cyber security of nuclear power plant is developed using a system engineering approach. Nuclear power plants are isolated from the Internet, but as shown in the case of Iran, Man-in-the-middle attacks (MITM) could be a threat to the safety of the nuclear facilities. This FPGA-based module does not have an operating system and it provides protection as a firewall and mitigates the cyber threats. The encryption equipment consists of an encryption module, a decryption module, and interfaces for communication between modules and systems. The Advanced Encryption Standard (AES)-128, which is formally approved as top level by U.S. National Security Agency for cryptographic algorithms, is adopted. The development of the cyber security module is implemented in two main phases: reverse engineering and re-engineering. In the reverse engineering phase, the cyber security plan and system requirements are analyzed, and the AES algorithm is decomposed into functional units. In the re-engineering phase, we model the logical architecture using Vitech CORE9 software and simulate it with the Enhanced Functional Flow Block Diagram (EFFBD), which confirms the performance improvements of the hardware-based cryptographic module as compared to software based cryptography. Following this, the Hardware description language (HDL) code is developed and tested to verify the integrity of the code. Then, the developed code is implemented on the FPGA and connected to the personal computer through Recommended Standard (RS)-232 communication to perform validation of the developed component. For the future work, the developed FPGA based encryption equipment will be verified and validated in its expected operating environment by connecting it to the Advanced power reactor (APR)-1400 simulator.

IPTV 시스템에서의 효과적인 콘텐츠 보호를 위한 일회성 암호와 수신제한시스템을 사용한 보안 모델 (A Novel Method for Effective Protection of IPTV Contents with One-Time Password and Conditional Access System)

  • 서기택;김태훈;김정제;임종인;문종섭
    • 정보보호학회논문지
    • /
    • 제20권4호
    • /
    • pp.31-40
    • /
    • 2010
  • 최근 네트워크의 발전과 인터넷의 대중화로 인하여 IPTV의 서비스가 전 세계적으로 활성화되고 있다. IPTV는 인터넷 프로토콜을 사용하되 방송 특성을 만족해야 하는데 현재는 인터넷 특성상 보안을 제공하지 못하고 있다. 따라서 IPTV에서도 사용자가 요구하는 콘텐츠에 대하여 알맞은 서비스를 제공하는 것이 중요하며 동시에, 콘텐츠의 안전성 및 보안성을 강화해야 할 필요가 있다. 현재 IPTV에서는 콘텐츠를 보호하기 위한 기술로 수신제한시스템(Conditional Access System)과 디지털 저작권 관리(Digital Right Management) 시스템을 도입하고 있지만 한계가 존재한다. 따라서 본 논문에서는 기존의 IPTV에서 사용되고 있는 보안 시스템을 효율적으로 보완하고 안전성을 높일 수 있는 방법을 제안한다. 제안하는 기법은 OTP를 사용하여 콘텐츠를 암/복호화하고 사용자에 관한 권한 관리와 키 관리는 CAS가 수행하는 모델로써 시스템의 부하를 줄일 수 있고 사용자 인증, 콘텐츠 보호, 스트림 데이터 전송의 안전성을 제공할 수 있다.

PN Sequence Generation from 2-D Array of Shift Registers

  • Kim, Hyun-Jung;Lee, In-Kyu;Kim, Woon-Kyung M.
    • ETRI Journal
    • /
    • 제27권3호
    • /
    • pp.273-279
    • /
    • 2005
  • Toward code division multiple access (CDMA) communications and data protection, we propose and analyze pseudorandom noise (PN) sequences generated from a 2-dimensional array structure of shift-registers. For any positive integers m and n, we construct PN sequences of period $2^{mm}-1$ using an $m{\times}n$ array of registers and show that we can generate all shifted PN sequences as required by IS-95x with the proper linear combination of available sequences.

  • PDF

광 상관기와 반복 알고리듬을 이용한 영상 암호화 및 복호화 시스템 (Image Encryption and Decryption System using Optical Correlator and Iterative Algorithm)

  • 김철수;조창섭
    • 한국광학회:학술대회논문집
    • /
    • 한국광학회 2003년도 제14회 정기총회 및 03년 동계학술발표회
    • /
    • pp.64-65
    • /
    • 2003
  • 현대 정보화 사회에서는 컴퓨터 시스템 및 통신 시스템의 결합으로 시공간을 초월하여 엄청난 양의 정보교환이 신속히 이루어지고 다양한 형태의 서비스 환경이 창출되어 사회 전반에 걸쳐 빠르게 확산됨에 따라 경제, 사회 등 전 분야에 큰 변화를 일으키고 있다. 이러한 사회는 우리생활을 보다 편리하게 만들어 주고 있지만 때로는 정보의 유출로 인한 막대한 피해를 주기도 하여서 정보보호가 매우 중요한 문제로 대두된다. (중략)

  • PDF

이진 위상 홀로그램의 간섭을 이용한 광 암호화 및 복원 시스템 (Optical Image Encryption and Decryption System Using Interferometric Binary Phase Holograms)

  • 김종윤;신창목;서동환;박세준;김정우;김수중
    • 한국광학회:학술대회논문집
    • /
    • 한국광학회 2001년도 제12회 정기총회 및 01년도 동계학술발표회
    • /
    • pp.70-71
    • /
    • 2001
  • 컴퓨터와 통신의 발달로 개인의 정보와 신용이 중요시됨에 따라 여권, 신용카드 등과 같은 각종 신분증을 많이 이용함에 따라 프린터, 스캐너, 또는 복사기 등을 이용한 이들의 복제가 늘고 있다. 이를 억제하기 위해 디지털 및 광학적 위조 방지 시스템에 대한 연구가 활발하다. 현재 엠보싱(embossed) 홀로그램이 부착된 각종 신용카드와 여권이 사용되고 있으나 이는 광세기 검출기를 이용하면 마스터 홀로그램 합성 및 대량복제가 가능하다. (중략)

  • PDF

ECC(Elliptic Curve Crptographics) 기반의 보안프로세서를 위한 스칼라 곱셈기의 FPGA 구현 (Design and FPGA Implementation of the Scalar Multiplier for a CryptoProcessor based on ECC(Elliptic Curve Cryptographics))

  • 최선준;황정태;김영철
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2005년도 춘계학술발표대회
    • /
    • pp.1071-1074
    • /
    • 2005
  • The ECC(Elliptic Curve Cryptogrphics), one of the representative Public Key encryption algorithms, is used in Digital Signature, Encryption, Decryption and Key exchange etc. The key operation of an Elliptic curve cryptosystem is a scalar multiplication, hence the design of a scalar multiplier is the core of this paper. Although an Integer operation is computed in infinite field, the scalar multiplication is computed in finite field through adding points on Elliptic curve. In this paper, we implemented scalar multiplier in Elliptic curve based on the finite field $GF(2^{163})$. And we verified it on the Embedded digital system using Xilinx FPGA connected to an EISC MCU(Agent 2000). If my design is made as a chip, the performance of scalar multiplier applied to Samsung $0.35\;{\mu}m$ Phantom Cell Library is expected to process at the rate of 8kbps and satisfy to make up an encryption processor for the Embedded digital information home system.

  • PDF

CFB 모드에 기반한 2 차원 페이지 데이터의 광학적 암호화 응용 (Application to 2-D Page-oriented Data Optical Cryptography Based on CFB Mode)

  • 길상근
    • 전기전자학회논문지
    • /
    • 제19권3호
    • /
    • pp.424-430
    • /
    • 2015
  • 본 논문은 CFB(Cipher Feedback) 모드에 기반한 2 차원 페이지 데이터의 광학적 암호화 응용 시스템을 제안한다. 광학적으로 구현된 CFB 암호화 시스템은 2 차원 페이지 데이터 암호화를 위해 자유공간 광 연결 이중 인코딩 기법을 이용한다. 또한, 제안된 방법은 기존의 1 차원 암호화키를 처리하는 CFB 방식보다 2 차원 페이지 단위로 배열된 매우 큰 암호화키를 제공하기 때문에 암호강도가 한층 더 강화된 암호화 시스템을 구현한다. 제안한 CFB 알고리즘의 성능을 검증하기 위해 컴퓨터 시뮬레이션을 통하여 2 차원 페이지 데이터의 암호화 및 복호화 과정을 보여주고 오차 분석을 수행하였다. 시뮬레이션 결과, 제안한 CFB 방식은 기존의 1 차원 블록 방식보다 데이터 처리용량과 긴 암호화키를 가지는 강력한 광학적 페이지 암호화 시스템을 가능하게 한다.