A Study on AES Extension for Large-Scale Data

대형 자료를 위한 AES 확장에 관한 연구

  • 오주영 (경인여자대학 정보미디어학부) ;
  • 고훈준 (경인여자대학 정보미디어학부)
  • Received : 2009.10.11
  • Published : 2009.12.30

Abstract

In the whole information technology area, the protection of information from hacking or tapping becomes a very serious issue. Therefore, the more effective, convenient and secure methods are required to make the safe operation. Encryption algorithms are known to be computationally intensive. They consume a significant amount of computing resources such as CPU time and memory. In this paper we propose the scalable encryption scheme with four criteria, the compression of plaintext, variable size of block, selectable round and software optimization. We have tested our scheme by c++. Experimental results show that our scheme achieves the faster execution speed of encryption/decryption.

모든 정보기술 분야에서 비인가자의 편취나 의도적 변경 등으로부터 정보를 보호하는 것은 핵심적인 문제가 되었다. 이에 안전한 작업진행을 위해 효과적이고 편의한 보안방법들이 요구되는데, 암호화 알고리즘은 많은 연산시간을 요하며, 실제 CPU 시간과 메모리 등의 많은 시스템 자원을 소모한다. 본 논문에서는 대형 자료의 암호화를 위해 평문의 압축, 입력 블록의 가변 크기, 라운드 횟수의 사용자 설정, 소프트웨어 최적화 등의 4가지 특징을 고려한 AES 확장 구조를 제안하였다. 실험은 C++로 수행하였으며 암호화와 복호화에서 개선된 실행시간을 보인다.

Keywords

References

  1. Paul A. J, Paul Varghese, Mythili P, "A fast and secure encryption algorithm for message communication," Information and Communication Technology in Electrical Sciences. 2007; 629 - 634
  2. Yang Xiao, Guizani S, Eo Sun, Hsiao-Hwa Chen, Ruhai Wang, "Performance Analysis of Advanced Encryption Standard(AES)," Global Telecommunications Conference, Nov. 27 2006-Dec. 1 2006 Page(s):1 - 5
  3. Hua Li, Jianzhou Li, "A new compact dual-core architecture for AES encryption and decryption," Electrical and Computer Engineering, Canadian Journal of Volume 33. 2008; 209 - 213 https://doi.org/10.1109/CJECE.2008.4721627
  4. Alam, M, Ghosh S, Chowdhury D.R, Sengupta I, "Single Chip Encryptor/Decryptor Core Implementation of AES Algorithm," 21st International Conference on VLSI Design, 4-8 Jan. 2008 Page(s): 693 - 698
  5. Yang Xiao, Guizani S, Eo Sun, Hsiao-Hwa Chen, Ruhai Wang, "Performance Analysis of Advanced Encryption Standard(AES)," Global Telecommunications Conference, 2006: 1-5
  6. Islam M.N, Mia M, Chowdhury M, Matin M.A, "Effect of Security Increment to Symmetric Data Encryption through AES Methodology," Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2008; 291 - 294
  7. Lopez-Ongil C, Jimenez-Horas A, Portela-Garcia M, Garcia-Valderas M, Millan E.S, Entrena L, "Smart Hardening for Round-based Encryption Algorithms: Application to Advanced Encryption Standard," On-Line Testing Symposium. 2008; 167 - 168
  8. Kuan Jen Lin, Chin-Mu Hiao, Ching Hung Jhan, "Exploring HW/SW Codesign of AES Algorithm Using Custom Instructions," The 13th International Symposium on Consumer Electronics(ISCE 2009), 2009; 192 - 195
  9. Gogniat G, Wolf T, Burleson W, Diguet J.-P, Bossuet L, Vaslin R, "Reconfigurable Hardware for High-Security/High-Performance Embedded Systems: The SAFES Perspective," Very Large Scale Integration (VLSI) Systems, IEEE Transactions on 16(2). 2008; 144 - 155 https://doi.org/10.1109/TVLSI.2007.912030