A Study on Development of CATIA V5 File Security System Using CAA

CAA를 이용한 CATIA V5 파일보안시스템 개발에 관한 연구

  • 채희창 (전북대학교 기계설계학과) ;
  • 박두섭 (전북대학교 기계설계학과) ;
  • 변재홍 (전북대학교 기계설계학과)
  • Published : 2007.05.01

Abstract

CATIA V5 is one of the most preferred softwares in product design for domestic and industrial use. But with the development of the IT industry, design data by CATIA V5 can easily be hacked and stolen especially via the internet and through assistance storage medium. The design data could be protected through executive, physical and technical security system. the best way to maintain confidentiality of data from unauthorized access is to have a cryptosystem of the technical security. In this paper, a cryptosystem for the protection of design data was being proposed. The memory contains the file information made by the New and Open function of CATIA V5. No error can be expected even if the file changed before of after the application of Save and Open function. A cryptosystem was constructed in CATIA V5 by inserting crypto algorithm before and after the I/O process. The encryption/decryption algorithm of each function was based on the complex cipher, which applied permutation cipher and transpose cipher. The file security system was programmed in CAA V5 and Visual C++.

Keywords

References

  1. Douglas, R., 'Crytography-Theory and Practice,' CRC Press Inc., 1995
  2. Alfres, J., Paul, C. and Scott, A., 'Handbook of applied Cryptography,' CRC Press Inc., 1997
  3. Koblitz, N., 'Algebraic aspects of cryptography,' Kluwer Academic Publishers, 2000
  4. Stallings, W., 'Network and Internetwork Security,' IEEE Press, 1995
  5. Advanced Computer Aided Design User's Manual
  6. Kruglinski, D. J., 'Inside Visual C++ Fourth Edition,' WP Publishers & Distributors, 1999
  7. Richter, J., 'Programming Application for Microsoft Windows,' Fourth Edition, Microsoft Press, 1999
  8. Lee, L.Y. and Song, Y.Z., 'Modern Cryptography,' Life & Power Publishing Co.,Ltd., 1997
  9. Park, C. S., 'Cryptography-Theory and Security,' Daeyoungsa, 1999
  10. Lee, M. S., 'Modern Cryptography,' KYOWOO Publishing Co.,Ltd., 2001
  11. Won, D. H., 'Modern Cryptography,' Green Publishing Co.,Ltd., 2003
  12. Lee, K. W., Lee, J. H., Kim, J. H. and Oh, C. S., 'Design and Analysis of Data File Protection based on the Stream Cipher,' The Korea Contents Association, Vol. 4, No. 1, pp. 56-66, 2004
  13. Kim, H. J., Lee, S. Y. and Chu, Y. Y., 'File Security Systems in PDA,' Korea Multimedia Society, pp. 91-94, 2003