• Title/Summary/Keyword: Hybrid Crypto-system

Search Result 3, Processing Time 0.014 seconds

Fast Video Data Encryption for Swarm UAVs Using Hybrid Crypto-system (하이브리드 암호시스템을 이용한 군집 영상의 고속 암호화)

  • Cho, Seong-Won;Kim, Jun-Hyeong;Chae, Yeo-Gyeong;Joung, Yu-Min;Park, Tae-Kyou
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.46 no.7
    • /
    • pp.602-609
    • /
    • 2018
  • This paper proposes the hybrid crypto-system for fast video data encryption of UAV(Unmanned Aerial Vehicle) under the LTE(Long-Term Evolution) wireless communication environment. This hybrid crypto-system is consisted of ECC(Elliptic Curve Cryptography) public key algorithm and LEA(Light-weight Encryption Algorithm) symmetric key algorithm. ECC is a faster public key algorithm with the same security strength than RSA(Rivest Shamir Adleman), and Korean standard LEA with the same key size is also a faster symmetric key algorithm than AES(Advances Encryption Standard). We have implemented this hybrid crypto-system using OpenSSL, OpenCV and Socket programs under the Swarm 8-UAV. We have shown the efficient adaptability of this hybrid crypto-system for the real-time swarm UAV through the experiments under the LTE communication environment.

Hybrid Cryptosystem Design with Authentication (인증기능을 가진 혼합형 암호시스템 설계)

  • 이선근;김영일;고영욱;송재호;김환용
    • Proceedings of the IEEK Conference
    • /
    • 2002.06b
    • /
    • pp.341-344
    • /
    • 2002
  • The importance of protection for information is increasing by the rapid development of information communication and network. Asymmetric crypto-system is the mainstream in encryption system rather than symmetric cryptosystem by above reasons. But asymmetric cryptosystem is restricted in applying to application fields by the reason it takes more times to process than symmetric cryptosystem. In this paper, the proposed cryptosystem uses an algorithm that combines block cipherment with stream ciphcrment. Proposed cryptosystem has a high stability in aspect of secret rate by means of transition of key sequence according to the information of plaintext while asymmetric /symmetric cryptosystern conducts encipherment/decipherment using a fixed key Consequently, it is very difficult to crack although unauthenticator acquires the key information. So, the proposed encryption system which has a certification function of asymmetric cryptosystcm and a processing time equivalent to symmetric cryptosystcm will be highly useful to authorize data or exchange important information.

  • PDF

Consumer Acceptance Intention on Block Chain Consensus Mechanismbased Payment System (블록체인 기반 결제시스템에 대한 관광 소비자 수용의도)

  • Jae-Hyun Kwak
    • Information Systems Review
    • /
    • v.21 no.3
    • /
    • pp.27-47
    • /
    • 2019
  • The purpose of this study is to propose a conceptual model for the tourism application of the block chain consensus construct and to test the intention of technology acceptance of potential consumers. First, we have tried to investigate the security, reliability, functionality was derived. Secondary, structural validation of the proposed model confirmed the factors influencing the acceptance of block chain technology in terms of consumers. Based on this, we apply the Unified Theory of Acceptance and Use of Technology to evaluate. Individual innovation and block-chain technology have a strong causal relationship with the proposed block chain acceptance intentions based on the Hybrid Block Chain Consensus system, which shows strong innovation and strong cognitive status. In addition, the factors directly affecting the acceptance of block-chain are the benefits expected from the block chain, the technical infrastructure required to use the service, the perceived benefits available. The influence of the surrounding environment on the adoption of technology and ease of use on new technology did not affect the acceptance intention significantly.