• Title/Summary/Keyword: Triple DES

Search Result 42, Processing Time 0.023 seconds

Design and Implementation of a Crypto Processor and Its Application to Security System

  • Kim, Ho-Won;Park, Yong-Je;Kim, Moo-Seop
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.313-316
    • /
    • 2002
  • This paper presents the design and implementation of a crypto processor, a special-purpose microprocessor optimized for the execution of cryptography algorithms. This crypto processor can be used fur various security applications such as storage devices, embedded systems, network routers, etc. The crypto processor consists of a 32-bit RISC processor block and a coprocessor block dedicated to the SEED and triple-DES (data encryption standard) symmetric key crypto (cryptography) algorithms. The crypto processor has been designed and fabricated as a single VLSI chip using 0.5 $\mu\textrm{m}$ CMOS technology. To test and demonstrate the capabilities of this chip, a custom board providing real-time data security for a data storage device has been developed. Testing results show that the crypto processor operates correctly at a working frequency of 30MHz and a bandwidth o1240Mbps.

  • PDF

Implementation of Secure POS SYSTEM (안전한 POS System의 구현)

  • 박동규;황유동
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.2
    • /
    • pp.70-77
    • /
    • 2001
  • This paper focuses on the design and implementation of the secure POS SYSTEM We propose a secure POS SYSTEM with RSA, MD5, Triple-DES for security and with RBAC model for access control. The client authentication is implemented before the data transferred be4ween client and server in proposed POS SYSTEM. We apply security algorithms with it, so that it can maintain confidentiality and integrity In addition. we apply RBAC model for access control of data. We verified the proposed system's stability by applying the proposed system to real works.

A service scheme for the efficient digital contents distribution in mobile environments (모바일 환경에서 효율적 디지털 콘텐츠 유통을 위한 서비스 방법)

  • Kim, Young-Hee;Lee, Chang-Yeol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.1
    • /
    • pp.9-18
    • /
    • 2007
  • We use PKI technology for the digital content distribution in mobile environment. Encoding method is used TtipleDES and digital signature is used RSA. For the efficient methods and processes to the digital content distribution, we proposed the mechanism which consists of the sequential steps including the digital contents encoding step, rights management information signature step, and interconnection steps. As a result of this study, we propose the efficient and safe processes for the mobile content distribution environment.

  • PDF

NIST 800-56 키 설정 스킴에 관한 연구

  • Won, Dong-Kyu;Kwak, Jin;Joo, Mi-Ri;Yang, Hyung-Kyu;Won, Dong-Ho
    • Review of KIISC
    • /
    • v.14 no.3
    • /
    • pp.36-48
    • /
    • 2004
  • 네트워크 기술의 발전으로 사회 여러 분야에서 인터넷을 이용하여 다양한 서비스들이 제공되고 있다. 이러한 서비스가 널리 확산됨에 따라 인터넷 상에서 전송되는 정보의 기밀성과 무결성을 보장하기 위한 암호 기술이 크게 주목을 받고 있다. 현재 널리 사용되고 있는 암호 알고리즘으로는 FIPS 197(Federal Information Processing Standard)에서 정의한 AES(Advanced Encryption Standard)와 FIPS 46-3에 채택된 Triple DES(Data Encryption Standard), FIPS 198에 정의된 HMAC 등이 있다. 이러한 알고리즘들은 시스템 사이의 상호 운용을 위해 제정되었으며, 공유 키 재료(Shared keying material) 설정이 사전에 이뤄져야 한다. 키 재료의 설정은 신뢰기관에 의해 분배가 가능하나, 객체의 수가 증가함에 따라 키 재료 분배 작업이 지수적으로 증가하게 되는 문제점이 있다. 그러므로, 본고에서는 이러한 키 재료 분배의 문제점과 효율적인 키 설정 스킴에 대하여 기술하고 있는 NIST 800-56을 분석하고자 한다.

Implementation of Area Efficient Integrated TLS Security Processor for DICOM Medical Information Security (DICOM 의료정보보호를 위한 면적효율적인 통합 TLS 보안 프로세서의 구현)

  • Jang, Woo-Young;Ryu, Sang-Jun;Kim, Young-Chul
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1107-1110
    • /
    • 2005
  • 본 논문은 의료영상진단시스템에서의 의료정보보호를 위한TLS 프로세서의 구현에 관하여 기술하였다. DICOM 3.0 standard의 ‘Part 15. DICOM Security Profile’에서는 TLS와 ISCL 두 가지의 Secure Transport Connection Profile을 정의하고 있고, 인증, 데이터의 무결성 보장, 프리아버시 보호의 기능을 할 수 있도록 몇가지의 알고리즘을 사용할 것을 정의하고 있다. 그 중 TLS Security Profile에는 Triple DES CBC모드와, RSA and SHA를 정의하고 있다. 그리하여 본 논문에서는 세 알고리즘의 개별적인 동작 검증을 마친 후 통합된 TLS Processor를 설계하고 검증하였다. 일반적인 Mux만을 이용한 설계는 임베디드 시스템 적용에 있어서 면적을 많이 차지하는 단점이 나타났다. 따라서 면적을 많이 차지하는 레지스터를 줄이기 위해서 세 알고리즘 블록이 같은 레지스터를 공유하도록 설계하였다. 그리고 임베디드시스템 개발 키트인 IFC-ETK100장비의 FPGA에 회로를 올리고 검증하였다.

  • PDF

A Study on Protection of Digital Contents using Key Exchange Protocol (Key Exchange 프로토콜을 이용한 디지털 콘텐츠 보호에 관한 연구)

  • Kwon, Do-Yun;Kim, Jeong-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2021-2024
    • /
    • 2003
  • 디지털 콘텐츠는 텍스트, 이미지, 비디오, 오디오 통의 디지털 저작물을 포함하는 총체적인 용어로 인터넷 상에서 접근할 수 있는 디지털화된 파일을 의미하는데, 최근 전자상거래의 급속한 발달과 인터넷과 같은 컴퓨터망의 확산으로 디지털 콘텐츠의 활용이 기하급수적으로 증가하고 있다. 디지털 콘텐츠는 저장, 편집, 수정이 용이할 뿐만 아니라 인터넷을 통해 원본의 손상 없이 무제한의 복제와 배포가 가능하다는 장점을 가지고 있다. 그러나, 이와 더불어 디지털 콘텐츠의 불법복제 및 배포와 같은 중요한 문제점들을 내포하고 있다. 따라서, 본 논문에서는 Key Exchange 프로토콜과 Triple DES 암호 알고리즘을 이용하여 디지털 콘텐츠 불법 복제 및 배포를 방지하기 위한 디지털 콘텐츠 보호 시스템을 구현하였다.

  • PDF

A Study on the Design and Implementation of a DSSS-based MODEM for a Right Termination System(FTS) (대역확산방식 비행종단시스템의 모뎀설계와 구현에 관한 연구)

  • Lim Keumsang;Kim Jaehwan;Cho Hyangduck;Kim Wooshik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2C
    • /
    • pp.175-183
    • /
    • 2006
  • This letter proposes a Direct Sequence Spread Spectrum (DS-SS)-based Flight Termination System(FTS) and show the simulation results and implements the system using FRGAs. The DS-SS FTS has immunity interference signals and the influence of jamming signal. Moreover, a DS-SS FTS can provides effects on an authentication and encryption with spread codes. And the system uses more less power than an analog FM system. We used Reed-Solomon (32, 28) code and triple Data Encryption Standard(3DES) for error correction and data encryption. Also we used counter algorithm for unauthenticated device's attack The spread codes of In-phase channel and Quadrature channel were generated by Gold sequence generators. The system was implemented in Altera APEX20K100E FPGA for the ground system and EPF10K100ARC240-3 for the airborne system.

Cold shock sensitive growth of Bacillus subtilis mutants deleted for genes involved in fatty acid synthesis (지방산 생합성 관련 유전자 결손 Bacillus subtilis 균주들의 저온충격 민감성 생장)

  • Kim, Do Hyung;Lee, Sang Soo
    • Korean Journal of Microbiology
    • /
    • v.54 no.1
    • /
    • pp.9-17
    • /
    • 2018
  • To investigate the role of bkdR, sigL, yplP, and des genes which were known to be involved in fatty acid synthesis and sensitive at low temperature, deletion mutants of Bacillus subtilis CU1065 and JH642 were constructed. To determine the low temperature sensitivity of these genes, we compared the growth curves of cells at $37^{\circ}C$ and $15^{\circ}C$. At $37^{\circ}C$, wild type and deletion mutants showed almost similar growth but only bkdR deletion strain at $15^{\circ}C$ showed very slow growing compared with wild type. At $15^{\circ}C$ sigL and yplP deletions were somewhat slower or similar to those of wild type strain. Double and triple mutants for bkdR, sigL, yplP deletions were constructed and grown at $20^{\circ}C$ in LB agar to investigate cold sensitive growth. Double or triple deletions including bkdR deletion showed cold sensitive growing. In order to identify more clearly cold sensitive growth, the experiments were carried out under cold shock conditions in which the temperature was lowered from $37^{\circ}C$ to $15^{\circ}C$ at the point of 0.4 optical densities at 600 nm. In these cold shock experiments, only bkdR deletion showed significantly lower growing and additional des deletion increases cold sensitivity. The bkdR activates the bkd operon, which catabolized isoleucine, valine and leucine, amino acids and produce precursors for the synthesis of branched fatty acids. At cold shock growing of bkdR deletion strain, isoleucine recovered cold sensitivity of bkdR deletion but valine did not restore cold sensitivity. Isoleucine is used as a precursor for the synthesis of anteiso-branched fatty acids. On the other hand, valine is used as a precursor for the synthesis of iso-branched fatty acids. This indicates that anteiso-branched fatty acid plays an important role at the cold shock condition.

Design and Implementation of Web Security Module for a Safe Data Transmission in Heterogeneous Systems (이기종 시스템에서 안전한 데이타 전송을 보장하는 웹 보안 모듈의 설계 및 구현)

  • Kim, Ki-Sung;Kim, Kwang;Heu, Shin
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.12
    • /
    • pp.1238-1246
    • /
    • 2005
  • This thesis is written with web security module for safe data transmission between heterogeneous systems(ex. OS). Web system has allowed users to have great convenience and a lot of information. Though web service business has been progressed much, because of the limitation of it's own system, lots of loss, derived from data spillage which is the weakest point of security, has also followed. Suggested security module is realized by two module. One for server security module for web server, the other is client security module for client. The security structure, suggested on this thesis guarantee safe data transmission by only simple installation of modules in clients and servers. for speed sensitive transmission between web server and browser, Triple-DES, symmetric encryption system suitable for fast encryption communication, is adapted. To solve problems caused from key management, Diffie-Hellman's key exchange algorithm is adapted. By this method, all symmetric encryption troubles from key distribution and management, speed could be work out a solution. And Diffie-Hellman type algorithm secures Authentication for safe data Protection.

A Performance Comparison between XEN and KVM Hypervisors While Using Cryptographic Algorithms

  • Mohammed Al-Shalabi;Waleed K. Abdulraheem;Jafar Ababneh;Nader Abdel Karim
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.61-70
    • /
    • 2024
  • Cloud Computing is internet-based computing, where the users are provided with whatever service they need from the resources, software, and information. Recently, the security of cloud computing is considered as one of the major issues for both cloud service providers CSP and end-users. Privacy and highly confidential data make many users refuse to store their data within cloud computing, since data on cloud computing is not dully secured. The cryptographic algorithm is a technique which is used to maintain the security and privacy of the data on the cloud. In this research, we applied eight different cryptographic algorithms on Xen and KVM as hypervisors on cloud computing, to be able to measure and compare the performance of the two hypervisors. Response time and CPU utilization while encryption and decryption have been our aspects to measure the performance. In terms of response time and CPU utilization, results show that KVM is more efficient than Xen on average at 11.5% and 11% respectively. While TripleDES cryptographic algorithm shows a more efficient time response at Xen hypervisor than KVM.