WO2015133687A1 - Dispositif et procédé de chiffrement au moyen d'un schéma d'extension binaire - Google Patents
Dispositif et procédé de chiffrement au moyen d'un schéma d'extension binaire Download PDFInfo
- Publication number
- WO2015133687A1 WO2015133687A1 PCT/KR2014/007775 KR2014007775W WO2015133687A1 WO 2015133687 A1 WO2015133687 A1 WO 2015133687A1 KR 2014007775 W KR2014007775 W KR 2014007775W WO 2015133687 A1 WO2015133687 A1 WO 2015133687A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- bit
- extension
- encryption
- determining
- extended
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/34—Encoding or coding, e.g. Huffman coding or error correction
Definitions
- Embodiments of the present invention relate to an encryption technique, and more particularly, to an encryption apparatus and method using a bit extension scheme.
- Cryptography has been widely used in the economic and financial fields, and has been widely used for authentication of identity, key management for digital keys, digital signature, and identity verification. .
- Encryption techniques are often used to ensure the safety of message transmission.
- the encryption technique involves encrypting plaintext on the transmission side and decrypting ciphertext on the receiving side.
- DES Data Encryption Standard
- ANSI American National Standards Institute
- Other encryption protocols include 3-DES and AES (Advanced Encryption Standard).
- Decryption can also be done by neglecting the management of decryption keys, predictability of passwords, or monitoring of keyboard input on the network.
- Decryption techniques include Ciphertext Only Attack, Known Plaintext Attack, Chosen Plaintext Attack, Adaptive Chosen Plaintext Attack, and Timing attack. And DPA (or 'power analysis') attacks.
- Korean Patent Publication No. 10-0571178 name of the invention: a method for encrypting and decrypting a message, a registration date: April 07, 2006).
- An embodiment of the present invention can improve the security of the information transmission channel (main transport channel) by encrypting by extending the bit length of the message to be encrypted, thereby minimizing the transmission of information to the eavesdropping channel in various environments
- An encryption device and method using a bit extension method for guaranteeing a desired amount of information loss are provided.
- An encryption apparatus using a bit extension scheme includes a bit selector for selecting each bit value from a binary bit string of an input message; And for each of the selected bit values, generate an extended bit string by extending the length of each of the bit values using a plurality of random numbers, and combining the generated extended bit strings to encrypt the message. And a bit extension encryption unit.
- the present invention by extending and encrypting the length of the bit value of the message to be encrypted, it is possible to improve the security of the information transmission channel (main transport channel), thereby minimizing the transmission of information to the eavesdropping channel. In this way, the amount of information loss can be guaranteed in various environments.
- the bit extension multiple in consideration of the length and security of the message when the bit length is extended, it is possible to encrypt the message with bits of an extended length optimally for transmission to the information delivery channel. Therefore, the security of the message transmitted through the information transmission channel can be further improved.
- FIG. 1 is a block diagram illustrating an encryption apparatus using a bit extension method according to an embodiment of the present invention.
- FIG. 2 is a block diagram illustrating a detailed configuration of the bit extension encryption unit of FIG. 2.
- FIG. 3 is a block diagram illustrating an encryption apparatus using a bit extension method according to another embodiment of the present invention.
- 4 to 6 are flowcharts illustrating an encryption method using a bit extension method according to an embodiment of the present invention.
- FIG. 7 is a flowchart illustrating an encryption method using a bit extension method according to another embodiment of the present invention.
- An encryption apparatus using a bit extension scheme includes a bit selector for selecting each bit value from a binary bit string of an input message; And for each of the selected bit values, generate an extended bit string by extending the length of each of the bit values using a plurality of random numbers, and combining the generated extended bit strings to encrypt the message. And a bit extension encryption unit.
- the encryption apparatus using a bit extension method further includes an extension multiple determination unit for determining a bit extension multiple for extending the length of each bit value, and the bit extension encryption unit further comprising the determined bit extension multiple
- the extended bit string may be generated as a bit string having a length corresponding to the bit extension multiple using the plurality of random numbers.
- the bit extension encryption unit may include: a bit string generator configured to generate a first bit area among the extended bit strings using the plurality of random numbers; A bit determination unit configured to determine a bit value of a second bit area among the extended bit strings based on a result of performing a logical operation on each of the generated bit values of the first bit area; And a bit string combination unit that combines the extension bit strings including the first and second bit regions, respectively.
- the bit determiner may perform an exclusive OR operation on each of the bit values of the first bit area, and determine a bit value of the second bit area based on a result of performing the exclusive OR operation.
- the bit determining unit defines a result value of the exclusive OR operation as an operator and defines a bit value for performing an exclusive OR operation as an operand
- the result value of the logical operation with the operator is an original bit value.
- the bit value of the operand to be equal to may be determined as the bit value of the second bit area.
- the second bit region may be disposed at any position in the extension bit string.
- the extended multiple determination unit may determine the bit extended multiple in consideration of the length and security of the message.
- the extended multiple determination unit may determine a target information loss rate according to the security of a transmission channel for transmitting the encrypted message, and determine the bit extension multiple based on the determined target information loss rate.
- the extended multiple determining unit may determine the bit extended multiple in consideration of the number of transmission channels through which the encrypted message is to be transmitted.
- the extended multiple determination unit may determine the bit extended multiple based on a target transmission amount of a transmission channel through which the encrypted message is to be transmitted.
- the encryption apparatus using the bit extension method according to an embodiment of the present invention may further include an external encoding unit for encoding the input message using a linear encoding algorithm.
- the linear encoding algorithm may include a hamming encoding algorithm.
- An encryption method using a bit extension method includes selecting each bit value from a binary bit string of an input message in a bit selector of an encryption device; Generating, by the bit extension encryption unit of the encryption apparatus, an extension bit string by extending a length of each of the bit values using a plurality of random numbers for each of the selected bit values; And encrypting the message by combining each of the generated extension bit strings in the bit extension encryption unit of the encryption apparatus.
- the encryption method using the bit extension method further includes the step of determining, by the extension multiple determination unit of the encryption device, a bit extension multiple for extending the length of each of the bit values.
- the generating of the bit string may include generating the extension bit string as a bit string having a length corresponding to the bit extension multiple by using the plurality of random numbers based on the determined bit extension multiple.
- the generating of the extended bit string may include: generating, by the bit string generator of the bit extension encryption unit, a first bit region of the extended bit string using the plurality of random numbers; And determining, by the bit determining unit of the bit extension encryption unit, a bit value of a second bit region of the extended bit string based on a result of performing a logical operation on each of the generated bit values of the first bit region.
- the encrypting of the message may include encrypting the message by combining the extended bit strings including the first and second bit regions in the bit string combination unit of the bit extended encryption unit. .
- Determining a bit value of a second bit region of the extended bit string may include performing an exclusive OR operation on each of the bit values of the first bit region; And determining a bit value of the second bit area based on a result of performing the exclusive OR operation.
- a result value of the exclusive OR operation is defined as an operator, and a bit value for performing an exclusive OR operation as an operand, a bit of the second bit area based on a result of performing the exclusive OR operation
- the determining of the value may include determining a bit value of an operand so that a result of logical operation with the operator is equal to an original bit value, as a bit value of the second bit region.
- the second bit region may be disposed at a random position in the extension bit string.
- the determining of the bit extension multiple may include determining the bit extension multiple in consideration of the length and security of the message.
- the determining of the bit extension multiple may include determining a target information loss rate according to security of a transmission channel through which the encrypted message is to be transmitted; And determining the bit extension multiple based on the determined target information loss rate.
- the determining of the bit extension multiple may include determining the bit extension multiple by considering the number of transport channels through which the encrypted message is to be transmitted.
- the determining of the bit extension multiple may include determining the bit extension multiple based on a target transmission amount of a transmission channel through which the encrypted message is to be transmitted.
- the encryption method using the bit extension method according to an embodiment of the present invention may further include encoding, by the external encoding unit of the encryption apparatus, the input message using a linear encoding algorithm.
- the linear encoding algorithm may include a hamming encoding algorithm.
- FIG. 1 is a block diagram illustrating an encryption apparatus using a bit extension method according to an embodiment of the present invention.
- an encryption apparatus 100 using a bit extension method includes a bit selector 110, an extension multiple determination unit 120, and a bit extension encryption unit 130. can do.
- the bit selector 110 selects each bit value from the binary bit string of the input message. To this end, the bit selector 110 may extract the binary bit string by analyzing the input message, and sequentially select respective bit values from the extracted binary bit string.
- the bit selector 110 may extract a binary bit string '1100' as a result of analyzing the input message, and bit values' 1 'and' from the extracted binary bit string '1100'. 1 ',' 0 ', and' 0 'can be selected sequentially.
- the extended multiple determining unit 120 determines a bit extended multiple for extending the length of each bit value.
- the bit extension multiple is a multiple value for extending the length of each bit value.
- each of the bit values may be extended to a length of 1 bit.
- the binary bit string of the input message is '1100' as in the above example.
- the bit extension multiple is 3
- the lengths of the bit values of '1', '1', '0', and '0' are '001', '111', '110', and '101'.
- the bit extension multiple is increased as the value increases and the security is improved, whereas the smaller the value is reduced as the information amount and the less secure, it is preferable to be determined in consideration of both the amount of information and security. . That is, the extended multiple determination unit 120 may determine the bit extended multiple in consideration of the length and security of the message.
- the extended multiple determination unit 120 may determine a target information loss rate according to the security of a transmission channel for transmitting an encrypted message, and determine the bit extension multiple based on the determined target information loss rate. In addition, the extended multiple determination unit 120 may determine the bit extended multiple in consideration of the number of transmission channels for transmitting the encrypted message. In addition, the extended multiple determination unit 120 may determine the bit extended multiple based on a target transmission amount of a transmission channel for transmitting the encrypted message.
- the bit extension encryption unit 130 generates an extended bit string by extending the length of each of the bit values using a plurality of random numbers for each of the selected bit values.
- the random number may indicate a value randomly selected from 0 or 1.
- the bit extension encrypting unit 130 has a length corresponding to the bit extension multiple by using the plurality of random numbers based on the bit extension multiple L determined by the expansion multiple determination unit 120. It can be generated as a bit string of.
- the bit extension encryption unit 130 may encrypt the message by combining each of the generated extension bit strings.
- the bit extension encryption unit 130 sets the extension bit strings for the respective bit values '1', '1', '0', and '0' to '111', '010', '101',
- the message may be encrypted by generating a '110' and outputting a binary bit string such as '111010101110' by combining each of the generated extended bit strings.
- the bit extension encryption unit 130 may include a bit string generator 210, a bit determiner 220, and a bit string combiner 230.
- FIG. 2 is a block diagram illustrating a detailed configuration of the bit extension encryption unit 130 of FIG. 2.
- the bit string generator 210 may generate a first bit region of the extension bit string using the plurality of random numbers. As shown in the above example, when the bit extension multiple is 3, the first bit region may be defined as an area including a first bit and a second bit.
- the bit determiner 220 may determine a bit value of the second bit region of the extended bit string based on a result of the logical operation of each of the generated bit values of the first bit region.
- the bit determiner 220 may perform an exclusive OR operation on each of the bit values of the first bit area, and determine the bit value of the second bit area based on a result of performing the exclusive OR operation. .
- bit determiner 220 defines an operator as a result of performing the exclusive OR operation and defines a bit value for performing an exclusive OR operation as an operand.
- the bit value of the operand so that the result of the logical operation is equal to the original bit value may be determined as the bit value of the second bit region.
- the second bit area may be disposed at a random position in the extension bit string. That is, the second bit area may be disposed at an arbitrary position such as the front, middle, or rear part of the extension bit string. To this end, the bit determiner 220 may determine an arbitrary region in which the second bit region is to be located in the extended bit string using a random number table or the like.
- the second bit region is located at the end of the extended bit string.
- the present invention is not limited thereto and may be located at another position as described above.
- the second bit region may be disposed at any position within the extension bit string, thereby increasing security.
- the bit stream generation unit 210 allows the first bit and the second bit, ie, the first bit area, of the extended bit string for each of the bit values to be '11', '01', '10', ' 11 'may be generated.
- the bit determiner 220 determines the second bit area, that is, the last bit of the extended bit string, wherein an exclusive OR operation of the first bit and the second bit of the first bit area is performed. Based on the result of the operation, '1', '0', '1', and '0' may be determined as the last bits for each of '11', '01', '10', and '11'.
- the bit determiner 220 performs a result of the exclusive OR operation and a bit value of performing an exclusive OR operation so that an original bit value is obtained as a bit value of the second bit region of the extension bit string. You can decide.
- the extended bit strings for the respective bit values' 1 ',' 1 ',' 0 ', and' 0 'selected from the binary bit string of the input message are' 111 ',' 010 ',' 101 ',' 110 'may be generated.
- the bit string combiner 230 may combine an extended bit string including the first bit region and the second bit region.
- the bit string combiner 230 may combine each of the generated extended bit strings '111', '010', '101', and '110'.
- the message can be encrypted by outputting a binary bit string.
- FIG. 3 is a block diagram illustrating an encryption apparatus using a bit extension method according to another embodiment of the present invention.
- the encryption apparatus 300 using the bit extension scheme may include an external encoding unit 310 and an internal encoding unit 320.
- the external encoding unit 310 receives a message and encodes it using a linear encoding algorithm.
- the linear encoding algorithm may include a hamming encoding algorithm.
- the inner encoding unit 320 receives a message encoded by the outer encoding unit 310 and performs encryption.
- the internal encoding unit 320 may include a bit selector 322, an extended multiple determination unit 324, and a bit extended encryption unit 326.
- the bit selector 322 selects each bit value from the binary bit string of the message encoded by the external encoder 310. To this end, the bit selector 322 may analyze the encoded message to extract a binary bit string, and sequentially select respective bit values from the extracted binary bit string.
- the extended multiple determining unit 324 determines a bit extended multiple for extending the length of each bit value.
- the bit extension multiple is a multiple value for extending the length of each bit value as described above.
- the bit extension multiple is 1 (a natural number of 2 or more), each of the bit values extends to the length of 1 bit. Can be.
- the extended multiple determination unit 324 may determine the bit extended multiple in consideration of the length and security of the message.
- the extended multiple determination unit 324 may determine a target information loss rate according to the security of a transmission channel for transmitting an encrypted message, and determine the bit extension multiple based on the determined target information loss rate. In addition, the extended multiple determination unit 324 may determine the bit extended multiple in consideration of the number of transmission channels for transmitting the encrypted message. In addition, the extended multiple determination unit 324 may determine the bit extended multiple based on a target transmission amount of a transmission channel for transmitting the encrypted message.
- the bit extension encryption unit 326 generates an extended bit string by extending the length of each of the bit values using a plurality of random numbers for each of the selected bit values.
- the bit extension encrypting unit 326 has a length corresponding to the bit expansion multiple using the plurality of random numbers based on the bit extension multiple L determined by the expansion multiple determining unit 324. It can be generated as a bit string of.
- the bit extension encryption unit 326 may encrypt the message by combining each of the generated extension bit strings.
- 4 to 6 are flowcharts illustrating an encryption method using a bit extension method according to an embodiment of the present invention.
- bit selector 110 of the encryption apparatus 100 selects each bit value from a binary bit string of an input message.
- step 420 the extension multiple determination unit 120 of the encryption apparatus 100 determines a bit extension multiple for extending the length of each bit value.
- step 430 the bit extension encryption unit 130 of the encryption apparatus 100 expands the length of each of the bit values by using the plurality of random numbers based on the determined bit extension multiple. Generate heat.
- the bit extension encryption unit 130 of the encryption apparatus 110 may generate the extension bit string as a bit string having a length corresponding to the bit extension multiple using the plurality of random numbers.
- the step 430 will be described in detail with reference to FIG. 5 as follows.
- the bit string generator 210 of the bit extension encryption unit 130 may use the plurality of random numbers for the first bit region of the extension bit string. Create
- step 520 the bit determiner 220 of the bit extension encryption unit 130 based on a result of performing a logical operation on each of the generated bit values of the first bit region, selects a first one of the extended bit strings. Determines the bit value of the 2-bit area.
- bit determiner 220 of the bit extension encryption unit 130 performs an exclusive OR operation on each bit value of the first bit region.
- the bit determiner 220 of the bit extension encryptor 130 determines a bit value of the second bit area based on a result of performing the exclusive OR operation.
- the bit determination unit 220 of the bit extension encryption unit 130 is defined. ) May determine the bit value of the operand so that the result of logical operation with the operator is equal to the original bit value as the bit value of the second bit region.
- the second bit area may be disposed at any position in the extension bit string.
- the second bit area may be an area including one last bit of the extended bit string. That is, assuming that the extended bit string is '110', the first bit region generated by using a plurality of random numbers is '11', and is determined based on a result of performing an exclusive OR operation of the first bit region.
- the second bit area may be referred to as '0'.
- step 440 the bit extension encryption unit 130 of the encryption apparatus 100 encrypts the message by combining each of the generated extension bit strings.
- FIG. 7 is a flowchart illustrating an encryption method using a bit extension method according to another embodiment of the present invention.
- the external encoding unit 310 of the encryption apparatus 300 encodes an input message using a linear encoding algorithm.
- the linear encoding algorithm may include a hamming encoding algorithm.
- the internal encoding unit 320 of the encryption device 300 receives the message encoded by the external encoding unit 310 and performs encryption.
- step 720 the bit selector 322 of the internal encoder 320 selects each bit value from the binary bit string of the encoded message.
- the bit selector 322 of the internal encoder 320 may extract a binary bit string by analyzing the encoded message, and sequentially select respective bit values from the extracted binary bit string.
- step 730 the expansion multiple determiner 324 of the internal encoding unit 320 determines a bit extension multiple for extending the length of each bit value.
- bit extension multiple is a multiple value for extending the length of each bit value.
- bit extension multiple is 1 (a natural number of 2 or more)
- each of the bit values may be extended to a length of 1 bit.
- bit extension encryption unit 326 of the internal encoding unit 320 expands the length of each of the bit values using a plurality of random numbers based on the determined bit extension multiple. Generate heat.
- the extended bit string may be generated as a bit string having a length corresponding to the bit extension multiple.
- step 750 the bit extension encryption unit 326 of the internal encoding unit 320 combines each of the generated extension bit strings to encrypt the message.
- the present invention by extending and encrypting the length of the bit value of the message to be encrypted, it is possible to improve the security of the information transmission channel (main transport channel), thereby providing information transmission to the eavesdropping channel. Minimized to ensure the targeted loss of information in a variety of environments.
- the message by determining the bit extension multiple in consideration of the length and security of the message when the bit length is extended, the message can be encrypted with bits of an extended length optimally for transmission to the information delivery channel. Therefore, the security of the message transmitted through the information transmission channel can be further improved.
- the bit length is extended by using a plurality of random numbers and a bit value determined through a logical operation with the random numbers, so that encryption and recovery can be performed in a secure and limited resource and time. can do.
- Embodiments of the invention include a computer readable medium containing program instructions for performing various computer-implemented operations.
- the computer readable medium may include program instructions, local data files, local data structures, or the like, alone or in combination.
- the media may be those specially designed and constructed for the purposes of the present invention, or they may be of the kind well known and available to those having skill in the computer software arts.
- Examples of computer-readable recording media include magnetic media such as hard disks, floppy disks, and magnetic tape, optical recording media such as CD-ROMs, DVDs, magnetic-optical media such as floppy disks, and ROM, RAM, flash memory, and the like.
- Hardware devices specifically configured to store and execute the same program instructions are included.
- Examples of program instructions include not only machine code generated by a compiler, but also high-level language code that can be executed by a computer using an interpreter or the like.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Storage Device Security (AREA)
Abstract
La présente invention, selon un mode de réalisation, concerne un dispositif de chiffrement au moyen d'un schéma d'extension binaire, comprenant : une unité de sélection de bit destinée à sélectionner une valeur de bit individuel à partir d'une chaîne de bits binaire d'un message d'entrée ; et une unité de chiffrement d'extension binaire destinée à, par rapport à chacune des valeurs de bits sélectionnées, générer une chaîne de bits étendue par extension de la longueur de chacune des valeurs de bits ou moyen d'une pluralité de nombres aléatoires, et chiffrer le message en combinant chaque bit de la chaîne de bits étendue générée.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2014-0026104 | 2014-03-05 | ||
KR1020140026104A KR101553148B1 (ko) | 2014-03-05 | 2014-03-05 | 비트 확장 방식을 이용한 암호화 장치 및 방법 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015133687A1 true WO2015133687A1 (fr) | 2015-09-11 |
Family
ID=54055466
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2014/007775 WO2015133687A1 (fr) | 2014-03-05 | 2014-08-21 | Dispositif et procédé de chiffrement au moyen d'un schéma d'extension binaire |
Country Status (2)
Country | Link |
---|---|
KR (1) | KR101553148B1 (fr) |
WO (1) | WO2015133687A1 (fr) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102653018B1 (ko) | 2019-01-16 | 2024-03-29 | 삼성전자주식회사 | 랜덤 넘버를 이용하여 나머지 연산을 수행하는 보안 프로세서 및 이의 동작 방법 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20000016261A (ko) * | 1997-04-02 | 2000-03-25 | 알렉산드르 안드레비치 몰도비안 | 이진 코드 정보의 암호화 방법_ |
KR20020005438A (ko) * | 2001-07-03 | 2002-01-17 | 남궁석 | 암호화 처리장치 그 방법 |
KR20040088352A (ko) * | 2003-04-01 | 2004-10-16 | 마이크로소프트 코포레이션 | 확장형 멀티미디어에 대한 완전 확장형 암호화 방법 및 장치 |
-
2014
- 2014-03-05 KR KR1020140026104A patent/KR101553148B1/ko active IP Right Grant
- 2014-08-21 WO PCT/KR2014/007775 patent/WO2015133687A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20000016261A (ko) * | 1997-04-02 | 2000-03-25 | 알렉산드르 안드레비치 몰도비안 | 이진 코드 정보의 암호화 방법_ |
KR20020005438A (ko) * | 2001-07-03 | 2002-01-17 | 남궁석 | 암호화 처리장치 그 방법 |
KR20040088352A (ko) * | 2003-04-01 | 2004-10-16 | 마이크로소프트 코포레이션 | 확장형 멀티미디어에 대한 완전 확장형 암호화 방법 및 장치 |
Non-Patent Citations (1)
Title |
---|
RYU, DONG RYEOL ET AL.: "Bit-sliced Modular Multiplication Algorithm and Implementation", JOURNAL OF THE KOREA INSTITUTE OF INFORMATION SECURITY AND CRYPTOLOGY, vol. 10, no. 3, September 2000 (2000-09-01) * |
Also Published As
Publication number | Publication date |
---|---|
KR101553148B1 (ko) | 2015-09-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016039556A1 (fr) | Appareil et procédé de chiffrement de données | |
WO2014069778A1 (fr) | Procédé de chiffrement et de déchiffrement à base d'id et appareil pour sa mise en œuvre | |
US10740497B2 (en) | System and method for cryptographic processing in a time window | |
US8341426B2 (en) | Methods and devices for instruction level software encryption | |
KR100991222B1 (ko) | 암호화 및 복호를 위한 장치, 방법 및 기록 매체 | |
CN114520727B (zh) | 安全芯片数据防护方法及系统 | |
JPH0728407A (ja) | 暗号における暗号化前処理装置および復号後処理装 置 | |
WO2015133687A1 (fr) | Dispositif et procédé de chiffrement au moyen d'un schéma d'extension binaire | |
US20060126827A1 (en) | Encryption methods and apparatus | |
CN108494554B (zh) | 一种基于双明文的数据对称加密方法 | |
KR20060011999A (ko) | Des 알고리즘에 의거한 암호화 기법 | |
CN113852456A (zh) | 一种基于Matlab的混沌映射和特征提取的图像加密系统 | |
CN112235789A (zh) | 一种中断可恢复保密通信处理方法、装置和系统 | |
Madani et al. | Enhancement of A5/1 Stream Cipher Overcoming its Weaknesses | |
WO2019050343A1 (fr) | Procédé et appareil de production de nombre aléatoire en fonction d'un chiffrement par bloc auquel une cryptographie à boîte blanche est appliquée | |
JP2000004223A (ja) | 暗号・認証システム | |
WO2024077857A1 (fr) | Procédé et appareil de transmission de données et dispositif et support de stockage | |
WO2024034733A1 (fr) | Système de réseau, dispositif, et procédé de support de chiffrement de paquet d'image | |
Huang et al. | A block cipher mode of operation with two keys | |
Ahmad et al. | Attack Robustness and Security Enhancement with Improved Wired Equivalent Protocol | |
WO2017091002A1 (fr) | Système et procédé de codage et décodage de données | |
Parab et al. | Generic approach for encryption using reverse context free grammar productions | |
Kaur et al. | RSS blowfish block encryption technique for secure image cryptography | |
CN113242119A (zh) | 一种对抗已知明文密文攻击的通讯数据分组加密法 | |
Singh et al. | Enhanced advanced encryption standard (E-AES): Using eset |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14884776 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 14884776 Country of ref document: EP Kind code of ref document: A1 |