• 제목/요약/키워드: Encryption Process

검색결과 350건 처리시간 0.022초

XOR 및 스크램블 연산 기반 2단계 위상 천이 디지털 홀로그래피 기술을 이용한 계층적 암호화 시스템 (Hierarchial Encryption System Using Two-Step Phase-Shifting Digital Holography Technology Based on XOR and Scramble Operations)

  • 김철수
    • 한국멀티미디어학회논문지
    • /
    • 제25권8호
    • /
    • pp.983-990
    • /
    • 2022
  • In this paper, we implemented a hierarchical encryption system using two-step phase-shifting digital holography(PSDH) technology based on XOR and scramble operations. The proposed encryption system is a system that authenticates access through the issuance of an encryption key for access to individual laboratories, department offices, and universities. In the encryption process, we proposed a double encryption method using XOR and scramble operation with digital technology and two-step phase-shifting digital holography with optical technology. In the two-step PSDH process, an new method of determining the reference wave intensity without measuring it by using random common object image gererated from digital encryption process was also proposed. In the decryption process, the process is performed in the reverse order of encryption process. And only when the various key information used in the encryption process is correct, the encrypted information can be decrypted, so that the user can access the desired place. That is, there is a feature that can hierarchically control the space that can be accessed according to the type of key issued in the proposed encryption system. Through the computer simulation, the feasibility of the proposed hierarchical encryption system was confirmed.

Analysis On Encryption Process In Data For Satellite

  • Bae, Hee-Jin
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2008년도 International Symposium on Remote Sensing
    • /
    • pp.216-219
    • /
    • 2008
  • It is necessary to study encryption for protection and safe transmission of the important information. Specially, the security in satellite data is also getting more and more important. This paper introduces DES and TDES algorithm, studies how to apply to satellite data with those algorithms and process of encryption and decryption for satellite data. Proposed encryption process in this paper will be utilized in satellite data for encryption in many satellites.

  • PDF

홀로그래픽 영상 암호화 및 디코딩 기법 (Holographic image encryption and decoding scheme)

  • 양훈기;정대섭;김은수
    • 전자공학회논문지A
    • /
    • 제33A권12호
    • /
    • pp.97-103
    • /
    • 1996
  • This paper presents a new security verification technique based on an image encryption by a white noise image that serves as an encryption key. In the proposed method that resembles holographic process, the encryption process is executed digitally using FFT routine which gives chances for separating corruptive noise from reconstructed primary image The encoded image thus obtained is regarded as an nterference pattern caused by two lightwaves transmitted through the primary image and the white noise image. The decoding process is executed optically and in real-tiem fashion where lightwave transmitted through the white noise image illuminates the encrypted card.

  • PDF

허프만 코드의 선택적 암호화에 관한 연구 (A Study on Selective Encryption of Huffman Codes)

  • 박상호
    • 융합보안논문지
    • /
    • 제7권2호
    • /
    • pp.57-63
    • /
    • 2007
  • 네트워크에서 데이터의 보안은 암호화에 의해 제공된다. 최근 영상이나 비디오와 같은 대용량의 데이터 파일의 암호화의 비용 및 복잡성을 줄이기 위한 방안으로 선택적 암호화가 제안되었다. 본 논문에서는 허프만 코딩으로 압축된 데이터의 암호화 방안을 제안하고 그 성능에 대해 논한다. 허프만 코드에 적용 가능한 단순한 선택적 암호화 방법을 제안하고 불안전한 채널에서 암호화 방법의 효율성에 대해 논의한다. 암호화 과정과 데이터 압축 과정이 하나로 결합될 수 있으며 그렇게 함으로서 데이터를 압축하고 암호화하는 과정을 간략화 하고 시간을 줄일 수 있다.

  • PDF

클라우드 환경에서의 대용량 데이터 전송의 효율성과 보안성 강화를 위한 부분 암호화 방법 (A Partial Encryption Method for the Efficiency and the Security Enhancement of Massive Data Transmission in the Cloud Environment)

  • 조성한;한기태
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제6권9호
    • /
    • pp.397-406
    • /
    • 2017
  • 클라우드 환경에서의 대용량 암호화 데이터 서비스를 위하여 기존의 암호화 알고리즘을 사용할 경우 데이터 암호화에 많은 시간 소요의 문제점이 대두된다. 이러한 단점을 보완하기 위해 일반적으로 부분 암호화 방법을 사용한다. 그러나 기존의 부분 암호화 방법은 암호화되지 않은 잔존 영역으로 인해 암호화된 데이터를 유추할 수 있다는 단점이 존재한다. 본 논문에서는 이러한 단점을 해결하기 위해 암호화 속도를 높이면서 보안을 준수하는 부분 암호화 방법을 제안한다. 제안하는 방법은 헤더 생성, 부분 암호화, 블록 셔플의 과정으로 구성된다. 1단계 헤더 생성 과정에서는 알고리즘에 필요한 헤더 데이터를 생성하고 2단계 부분 암호화 과정에서는 LEA (Lightweight Encryption Algorithm)를 이용하여 데이터의 일부분을 암호화하고 암호화하지 않은 부분의 데이터와 암호화 과정 중에 생성된 블록을 XOR하여 모든 데이터를 변형시키며, 3단계 블록 셔플 과정에서는 헤더에 저장한 셔플 데이터를 이용하여 블록을 섞어 데이터를 알아볼 수 없는 형태로 바꾸어 암호화를 수행한다. 제안하는 방법을 모바일 디바이스에 적용하여 구현한 결과 암호화한 데이터는 알아볼 수 없는 형태로 모두 바뀌어 데이터를 유추할 수 없었고, 암호 키 없이는 데이터를 복원할 수 없었다. 제안하는 방법은 블록 경량 암호화 알고리즘인 LEA에 비해 암호화 속도가 약 273% 정도 향상되어 대용량 데이터를 암호화하는데 있어 빠른 처리가 가능함을 확인하였다.

A Study on Efficient Data De-Identification Method for Blockchain DID

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권2호
    • /
    • pp.60-66
    • /
    • 2021
  • Blockchain is a technology that enables trust-based consensus and verification based on a decentralized network. Distributed ID (DID) is based on a decentralized structure, and users have the right to manage their own ID. Recently, interest in self-sovereign identity authentication is increasing. In this paper, as a method for transparent and safe sovereignty management of data, among data pseudonymization techniques for blockchain use, various methods for data encryption processing are examined. The public key technique (homomorphic encryption) has high flexibility and security because different algorithms are applied to the entire sentence for encryption and decryption. As a result, the computational efficiency decreases. The hash function method (MD5) can maintain flexibility and is higher than the security-related two-way encryption method, but there is a threat of collision. Zero-knowledge proof is based on public key encryption based on a mutual proof method, and complex formulas are applied to processes such as personal identification, key distribution, and digital signature. It requires consensus and verification process, so the operation efficiency is lowered to the level of O (logeN) ~ O(N2). In this paper, data encryption processing for blockchain DID, based on zero-knowledge proof, was proposed and a one-way encryption method considering data use range and frequency of use was proposed. Based on the content presented in the thesis, it is possible to process corrected zero-knowledge proof and to process data efficiently.

Research on Camouflaged Encryption Scheme Based on Hadamard Matrix and Ghost Imaging Algorithm

  • Leihong, Zhang;Yang, Wang;Hualong, Ye;Runchu, Xu;Dawei, Zhang
    • Current Optics and Photonics
    • /
    • 제5권6호
    • /
    • pp.686-698
    • /
    • 2021
  • A camouflaged encryption scheme based on Hadamard matrix and ghost imaging is proposed. In the process of the encryption, an orthogonal matrix is used as the projection pattern of ghost imaging to improve the definition of the reconstructed images. The ciphertext of the secret image is constrained to the camouflaged image. The key of the camouflaged image is obtained by the method of sparse decomposition by principal component orthogonal basis and the constrained ciphertext. The information of the secret image is hidden into the information of the camouflaged image which can improve the security of the system. In the decryption process, the authorized user needs to extract the key of the secret image according to the obtained random sequences. The real encrypted information can be obtained. Otherwise, the obtained image is the camouflaged image. In order to verify the feasibility, security and robustness of the encryption system, binary images and gray-scale images are selected for simulation and experiment. The results show that the proposed encryption system simplifies the calculation process, and also improves the definition of the reconstructed images and the security of the encryption system.

The fast image encryption algorithm based on substitution and diffusion

  • Zhang, Yong;Jia, Xiaoyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권9호
    • /
    • pp.4487-4511
    • /
    • 2018
  • A fast image encryption system based on substitution and diffusion was proposed, which includes one covering process, one substitution process and two diffusion processes. At first, Chen's chaotic system together with an external 256-bit long secret key was used to generate the key streams for image encryption, in which the initial values of Chen's chaotic system were regarded as the public key. Then the plain image was masked by the covering process. After that the resulting image was substituted with the disturbed S-Box of AES. Finally, the substituted image was diffused twice with the add-modulo operations as the core to obtain the cipher image. Simulation analysis and comparison results with AES and some existing image cryptosystems show that the proposed image cryptosystem possesses the merits of fast encryption/decryption speed, good statistical characteristics, strong sensitivity and etc., and can be used as a candidate system of network security communication.

조건값의 개수에 독립적인 조건부 프록시 재암호화 기법 (A Single Re-encryption key based Conditional Proxy Re-Encryption Scheme)

  • 손정갑;오희국;김상진
    • 정보보호학회논문지
    • /
    • 제23권2호
    • /
    • pp.147-155
    • /
    • 2013
  • 프록시 재암호화 기법은 데이터를 재암호화 하는 과정에서 평문이 노출되지 않는 장점이 있다. 이 기법은 최근 클라우드 컴퓨팅, 모바일 오피스 등 서버를 이용하는 환경에서 저장된 데이터를 안전하게 공유하기 위한 기법으로 각광 받고 있다. 하지만 기존 기법은 재암호화 키를 반복적으로 사용할 수 있어 재암호화 오남용 문제가 발생한다. 이를 해결하기 위해 조건부 프록시 재암호화 기법이 제안되었지만 조건값의 수만큼 재암호화키를 생성해야하는 부담이 있다. 본 논문에서는 재암호화 키 생성 측면에서 효율적인 조건부 프록시 재암호화 기법을 제안하였다. 제안하는 기법은 조건값의 사용을 암호화와 복호화 과정으로 제한하여 조건값이 많아지더라도 재암호화 키를 추가로 생성하지 않아도 되는 장점이 있다. Weng 등의 기법이 재암호화 키 생성에 따른 시간 복잡도가 O(n)인 것에 비해, 제안하는 기법은 O(1)의 시간 복잡도를 가진다. 또한, 제안하는 기법은 선택적 암호문 공격에 안전하도록 설계되었다.

A General Design Method of Constructing Fully Homomorphic Encryption with Ciphertext Matrix

  • Song, Xinxia;Chen, Zhigang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권5호
    • /
    • pp.2629-2650
    • /
    • 2019
  • It is important to construct fully homomorphic encryption with ciphertext matrix that makes fully homomorphic encryption become very nature and simple. We present a general design method of constructing fully homomorphic encryption whose ciphertext is matrix. By using this design method, we can deduce a fully homomorphic encryption scheme step by step based on a basic encryption scheme. The process of deduction is similar to solving equation and the final output result is a fully homomorphic encryption scheme with ciphertext matrix. The idea of constructing ciphertext matrix is ciphertexts stack, which don't simply stack ciphertexts together but is to obtain the desired homomorphic property. We use decryption structure as tool to analyze homomorphic property and noise growth during homomorphic evaluation. By using this design method, we obtain three corresponding fully homomorphic encryption schemes. Our obtained fully homomorphic encryption schemes are more efficient. Finally, we introduce the adversary advantage and improve the previous method of estimating concert parameters of fully homomorphic encryption. We give the concert parameters of these schemes.