Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information Security and Cryptology
Journal Basic Information
Journal DOI :
Korea Institutes of Information Security and Cryptology
Editor in Chief :
Volume & Issues
Volume 10, Issue 4 - Dec 2000
Volume 10, Issue 3 - Sep 2000
Volume 10, Issue 2 - Jun 2000
Volume 10, Issue 1 - Mar 2000
Selecting the target year
Design of Modular Exponentiation Processor for RSA Cryptography
Journal of the Korea Institute of Information Security and Cryptology, volume 10, issue 4, 2000, Pages 3~11
In this paper, we design modular multiplication systolic array and exponentiation processor having n bits message black. This processor uses Montgomery algorithm and LR binary square and multiply algorithm. This processor consists of 3 divisions, which are control unit that controls computation sequence, 5 shift registers that save input and output values, and modular exponentiation unit. To verify the designed exponetion processor, we model and simulate it using VHDL and MAX+PLUS II. Consider a message block length of n=512, the time needed for encrypting or decrypting such a block is 59.5ms. This modular exponentiation unit is used to RSA cryptosystem.
Copyright Protection of Digital Image Information based on Multiresolution and Adaptive Spectral Watermark
Journal of the Korea Institute of Information Security and Cryptology, volume 10, issue 4, 2000, Pages 13~19
With the rapid development of the information communication technology, more and more distribution multimedia data and electronic publishing in the web, has created a need for the copyright protection with authentication of digital information. In this paper, we propose a multi-watermarking adding and adaptive spectral watermark algorithm well adaptive frequency domain of each hierarchical using orthogonal forward wavelet transform(FWT. Numerical test results, created watermarking image robustness not only image transform such as low-pass filtering, bluring, sharpen filtering, wavelet compression but also brightness, contrast gamma correction, histogram equalization, cropping.
A Proposal for the Practical and Secure Electronic Voting Protocol
Journal of the Korea Institute of Information Security and Cryptology, volume 10, issue 4, 2000, Pages 21~32
We have seen a lot of developments on computer application areas with the wide spread use of computers and the rapid growth of communication network. It is necessary to use a cryptographic technique for electronic voting, but, at present, despite of its importance electronic voting protocols so far have many shortcomings. In this paper, with the assumption of a trustable voting centers we propose a large-scale and practical electronic voting protocol satisfying protocol requirements, such as secureness, fairness, privacy of voter and correctness. Voters are able to get a vote without revealing their voted information by using the blinding technique. We can find the injustice between a voter and the tallier by using undeniable challenge and responsible protocol. Also, we proposes a secure protocol that compensates a integrity of electronic voting and protects a privacy of voter from outer attacks as using a anonymity of voter.
Analysis of the IPsec Internet Key Exchange (IKE) Protocol
Journal of the Korea Institute of Information Security and Cryptology, volume 10, issue 4, 2000, Pages 33~46
IPsec is a protocol suite to protect the data communication between computers on internet and many VPNs(Virtual Private Networks) use IPsec protocol. IKE protocol is used to exchange keys in IPsec. Formal analysis method is used increasingly in computer science to increase the reliability of a system. In this paper, the IKE protocol is analyzed formally. This paper shows that IKE with Authentication with Signature and Authentication with Pre-Shared Key is safe, but Authentication with Public Key Encryption and A Revised Method of Authentication with Public Key Encryption are safe only with the assumption that a participant has the correct public key of the correspondent. To make sure that a participant has the correct public key of the correspondent, the usage of certificate is recommended.
Efficient Anonymous Fingerprinting with Improved Automatic Identification of Redistributors
Journal of the Korea Institute of Information Security and Cryptology, volume 10, issue 4, 2000, Pages 47~57
This paper proposes efficient anonymous fingerprinting with improved automatic identification of redistributors in electronic commerce of digital contents. The proposed scheme by Domingos in Eletronic Letters is inefficient in electronic commerce, because of pass numbers in registration protocol and exponential computations in identification protocol. Our scheme is reduced 2-pass in registraton protocol and is required only 1 time exponential computation than his in identification protocol. According to electronic commerce of digital contents used in ordinary life, our schemes values are increased.
A Study on Anomaly Detection based on User's Command Analysis
Journal of the Korea Institute of Information Security and Cryptology, volume 10, issue 4, 2000, Pages 59~71
Due to the advance of computer and communication technology, intrusions or crimes using a computer have been increased rapidly while various information has been provided to users conveniently. As a results, many studies are necessary to detect the activities of intruders effectively. In this paper, a new association algorithm for the anomaly detection model is proposed in the process of generating user\`s normal patterns. It is that more recently observed behavior get more affection on the process of data mining. In addition, by clustering generated normal patterns for each use or a group of similar users, it is possible to identify the usual frequency of programs or command usage for each user or a group of uses. The performance of the proposed anomaly detection system has been tested on various system Parameters in order to identify their practical ranges for maximizing its detection rate.
A Fast Exponentiation Algorithm Using A Window Method and a Factor Method
Journal of the Korea Institute of Information Security and Cryptology, volume 10, issue 4, 2000, Pages 73~79
We show how to reduce the number of multiplications required for an exponentiation by using a window method and a factor method. This method requires 599 multiplications for a 512-bit integer exponent while the window method with window size 5 requires 607 multiplications. This method requires fewest multiplications among practical exponentiation algo- rithms.
Implementation of High-radix Modular Exponentiator for RSA using CRT
Journal of the Korea Institute of Information Security and Cryptology, volume 10, issue 4, 2000, Pages 81~93
In a methodological approach to improve the processing performance of modulo exponentiation which is the primary arithmetic in RSA crypto algorithm, we present a new RSA hardware architecture based on high-radix modulo multiplication and CRT(Chinese Remainder Theorem). By implementing the modulo multiplier using radix-16 arithmetic, we reduced the number of PE(Processing Element)s by quarter comparing to the binary arithmetic scheme. This leads to having the number of clock cycles and the delay of pipelining flip-flops be reduced by quarter respectively. Because the receiver knows p and q, factors of N, it is possible to apply the CRT to the decryption process. To use CRT, we made two s/2-bit multipliers operating in parallel at decryption, which accomplished 4 times faster performance than when not using the CRT. In encryption phase, the two s/2-bit multipliers can be connected to make a s-bit linear multiplier for the s-bit arithmetic operation. We limited the encryption exponent size up to 17-bit to maintain high speed, We implemented a linear array modulo multiplier by projecting horizontally the DG of Montgomery algorithm. The H/W proposed here performs encryption with 15Mbps bit-rate and decryption with 1.22Mbps, when estimated with reference to Samsung 0.5um CMOS Standard Cell Library, which is the fastest among the publications at present.
Analysis on Effects of The Firewall on Networks
Journal of the Korea Institute of Information Security and Cryptology, volume 10, issue 4, 2000, Pages 95~105
The Firewall is needed in order to protect communication networks from ill effects of informatization such as information leakage, destruction, forgery and virus. To take an advantage of the firewall, the security manager must understand the effects that it can have on the network. There airs, however, no tools available to evaluate the performance of the firewall. In this paper, we study the effect of the firewall by putting various kinds of traffic into the actual network. Also, using COMNET- III, we model two networks with and without the firewall. And we analyze the effects under the various network envion-ments
Differential Cryptanalysis of DES-Like Block Cipher HEA
Journal of the Korea Institute of Information Security and Cryptology, volume 10, issue 4, 2000, Pages 107~112
In this paper, we study a security of HEA(Hangul Encryption Algorithm) against differential cryptanalysis. HEA, which is 1,024bits input/output and 56bits key size, has the same structure as DES(Data Encyption Standard) only for Korean characters to be produced in ciphertexts. An encryption algorithm should be developed to meet certain critria such as input/ouput dependencies, correlation, avalanche effects, etc. However HEA uses the same S-Boxes as DES does and just expands the plaintext/ciphertext sizes . We analysize HEA with a differential cryptanalysis and present two results. The number of rounds of HEA has not been determined in a concrete basis of cryptanalysis and we show a chosen plintext attack of 10 round reduced HEA with a diffe- rential cryptanalysis characteristic.
Implementation of Efficient GPKI for E-Government
Journal of the Korea Institute of Information Security and Cryptology, volume 10, issue 4, 2000, Pages 113~127
It is an essential prior condition that information security of all sorts of administration-information on line for E-Government. Every country including United Slates has been constructing and managing Government PKI(Public Key Infrastructure) of information security of one\`s own authentication, confidentiality, integrity, non-repudiation in administration environment on line for information security base construction of E-Government. In this paper, we present an efficient GPKI(Government PKI) implementation suitable for Korea actual circumstance through study and analysis of superior case such as United State.