DOI QR코드

DOI QR Code

Design and Implementation of a Security Program for Supersafe Document Using Ancient and Modern Cryptography

고대 및 현대 암호 방식을 결합한 초안전 문서 보안 프로그램의 설계 및 구현

  • Received : 2017.07.15
  • Accepted : 2017.11.06
  • Published : 2017.12.31

Abstract

Encryption technology is to hide information in a cyberspace built using a computer and to prevent third parties from changing it. If a malicious user accesses unauthorized device or application services on the Internet of objects, it may be exposed to various security threats such as data leakage, denial of service, and privacy violation. One way to deal with these security threats is to encrypt and deliver the data generated by a user. Encrypting data must be referred to a technique of changing data using a complicated algorithm so that no one else knows the content except for those with special knowledge. As computers process computations that can be done at a very high speed, current cryptographic techniques are vulnerable to future computer performance improvements. We designed and implemented a new encryption program that combines ancient and modern cryptography so that the user never knows about data management, and transmission. The significance of this paper is that it is the safest method to combine various kinds of encryption methods to secure the weaknesses of the used cryptographic algorithms.

Keywords

References

  1. C. Paar, J. Pelzl, and B. Preneel, Understanding Cryptography : A Textbook for Students and Practitioners, Korean Publishing Company Green, 2013. Seoul.
  2. R.E. Smith, Authentification from Passwords to Publish Keys, Addison-Wesley, 2012. Boston.
  3. M. Lee, H. Yeom, Y. Song, and J. Kim., Introduction to Information Protection, Korean Publishing Company Hongreung, 2005. Seoul.
  4. H. Seo, “Implementing Software Passwords over the Internet,” Communications of the Korean Institute of Information Scientists and Engineers, Vol. 35, No. 1, pp. 8-15, 2017.
  5. N. Ferguson and B. Schneier, Practical Cryptography, Korean Publishing Company SciTech Media, 2004. GoYang.
  6. B.H. Kim, T.K. Kim, and J.H. Kim, "FPGA Implementation of the AES Cipher Algorithm by Using Pipelining," KIISE Transactions on Computing Practices, Vol. 8, No. 6, pp. 717-726, 2002.
  7. H.W. Nam, D.H. Kim, and N.S. Park, "Implementation of ARIA Encryption Algorithm based on WebCL," Proceeding of Annual Meeting and Proceedings of Korea Computer Conference, Vol. 42, No. 2, pp. 49-51, 2015.
  8. M.B. Song, M.K. Ko, and Y.M. Jung, "Hardware Using of the SEED Algorithm," Proceedings of Korea Information Processing society, Vol. 7, No. 2, pp. 1453-1456, 2000.
  9. K.H. Song, H.C. Kang, and J.C. Sung, "An Efficient New Format Preserving Encryption Algorithm to Encrypt the Personal Information," Journal of the Korea Institute of Information Security and Cryptology, Vol. 24, No. 4, pp. 753-763, 2014. https://doi.org/10.13089/JKIISC.2014.24.4.753
  10. S.J. Jang, "Design of the File Security Function Using Encryption Algorithm in the Windows Operating System," The Korea Institute of Information and Communication Engineering, Vol. 17, No. 3, pp. 612-618, 2013. https://doi.org/10.6109/jkiice.2013.17.3.612
  11. T.H. Kim, M.Y. Jang, and J.W. Chang, "Hilbert-Curve Based Multi-Dimensional Indexing Key Generation Scheme and Query Processing Algorithm for Encrypted Databases," Journal of Korea Multimedia Society, Vol. 17, No. 10, pp. 1182-1188, 2014. https://doi.org/10.9717/kmms.2014.17.10.1182
  12. M. Yoon, A.R. Cho, and J.W. Chang, "A Bitmap Encryption Scheme and a GPU-based Query Processing Algorithm for Spatial Database Outsourcing," Journal of Korean Institute of Information Scientists and Engineers, Vol. 41, No. 2, pp. 71-82, 2014.
  13. K.R. Lee, I.S. You, and K.B. Yim, "An Analysis of Agility of the Cryptography API Next Generation in Microsoft : Based on Implementation Example of Applying Cryptography Algorithm HAS-160 in South Korea," Journal of the Korea Institute of Information Security and Cryptology, Vol. 25, No. 6, pp. 1327-1339, 2015. https://doi.org/10.13089/JKIISC.2015.25.6.1327
  14. K.R. Lee, I.S. You, and K.B. Yim, "An Analysis of a Structure and Implementation of Error-Detection Tool of Cryptography API-Next Generation in Microsoft," Journal of the Korea Institute of Information Security and Cryptology, Vol. 26, No. 1, pp. 153-168, 2016. https://doi.org/10.13089/JKIISC.2016.26.1.153
  15. T.W. Kwon, H.M. Kim, and S.H. Hong, "SEED and ARIA Algorithm Design Methods Using GEZEL," Journal of the Korea Institute of Information Security and Cryptology, Vol. 24, No. 1, pp. 15-29, 2014. https://doi.org/10.13089/JKIISC.2014.24.1.15
  16. B.H. Jeon, S.H. Shin, K.H. Jung, J.H. Lee, and K.Y. Yoo, "Reversible Secret Sharing Scheme Using Symmetric Key Encryption Algorithm in Encrypted Images," Journal of Korea Multimedia Society, Vol. 18, No. 11, pp. 1332-1341, 2015. https://doi.org/10.9717/kmms.2015.18.11.1332