DOI QR코드

DOI QR Code

이진 병합에 의한 양자암호 취약성

(An) analysis of quantum cryptography vulnerability by Binary merge

  • 투고 : 2010.07.23
  • 심사 : 2010.12.06
  • 발행 : 2010.12.25

초록

본 논문에서는 양자암호 시스템의 설계과정에서 필연적으로 사용되는 의사난수들의 비트열들이 다수개 존재하는 현상과 이를 상호 공개된 채널에서 부분정보를 공유해야 하는 상황은 비트열들의 쌍을 노출시킨다. 본고에서는 이러한 의사난수 열의 기본 테스트 과정과 이를 벗어나는 이진 병합 비트열의 난수성에 대하여 살펴본다.

In this paper, quantum cryptography systems used in the design process inevitably open bit stream of pseudo-random number that exists multiple open channels between them and the need to share information on the part of the situation exposes a pair of bit stream. In this paper, the base test of pseudo-random number I tested out this process and the merge bit binary column look out for randomness.

키워드

참고문헌

  1. H. Feistel, Block Cipher Cryptographic System, U.S. Patent #3,798,359,19 Mar 1974.
  2. L. R. Knudsen, "Block Ciphers-Analysis,“ Computer Science department, Aarhus University, 1994.
  3. C. E. Shannon, "Communication theory ofsecrecy system," BSTJ, vol. 28, pp. 656-715, 1949
  4. NIST, "Federal Information Processing Standards Publication 197 - Specification for the Advanced Encryption Standard (AES)," Available: http://csrc.nist.gov/publication/fips/fips-197.pdf, 2001, [Accessed: Apl 12, 2010]
  5. J. Daemen, L.Knudsen and V. Rijmen, The block cipher Square, In Fast Software Encryption, Lecture Notes in Computer Science(LNCS) 1267, Springer-Verlag, 1997
  6. M. Akkar and C. Giraud, "An Implementation of DES and AES, Secure against Some Attacks," CHES 2001, LNCS 2162, pp. 309-318, 2001
  7. Hoon.Lim "A Revised Version of CRYPTON," Information and Commuications Research Center
  8. B.Schneier, "The uses and Abuses of Biometrics,"Communications of the ACM, vol 42,no, 8, 1999, p136 https://doi.org/10.1145/310930.310988
  9. NIST, "Instruction-level Parallelism in AESC andidates"
  10. NIST,"Data Encryption Standard(DES)", Available:http: //www.itl.nist.gov/fipspubs/fip46-2.htm,1993, [Accessed:Apl2,2010]
  11. B. Schneier, Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth), 1996
  12. A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.
  13. N.Goots, B. Izotov, A. Moldovyan, N. Moldovyan, Modern Cryptography: Protect Your Data with Fast Block Ciphers A-LIST Publishing, 2003
  14. D. Stinson, Cryptography: Theory and Practice, CRC Press, 1995
  15. Charles H. Bennett, Gilles Brassard, Artur K.Ekert, Quantum Cryptography, Scientific American, October 1992