DOI QR코드

DOI QR Code

A Countermeasure against Brute-force Attack using Digital Holography and DES Algorithm

디지털 홀로그래피와 DES 알고리즘을 이용한 전수키 공격 대응 기법

  • Noh, Chang-Oh (Dept. of Computer Engineering, Chosun University) ;
  • Moon, In-Kyu (School of Computer Engineering, Chosun University) ;
  • Cho, Beom-Joon (School of Computer Engineering, Chosun University)
  • 노창오 (조선대학교 컴퓨터공학과) ;
  • 문인규 (조선대학교 컴퓨터공학부) ;
  • 조범준 (조선대학교 컴퓨터공학부)
  • Received : 2011.03.30
  • Accepted : 2011.05.11
  • Published : 2011.05.31

Abstract

The DES encryption algorithm employed in information security has a strong avalanche effect, and the processing speed to encrypt is also fast. However, due to the H/W advances, the secret key length of DES having 56bits is not enough so that it is easily exposed to brute force attack. In this paper, we present a new method to significantly increase the secret key length in the DES by integration of digital holography and DES algorithm. In addition, we evaluate the encryption performance of the proposed method by measuring the avalanche effect and verify the possibility of it.

정보 보안을 위해 사용되는 DES 암호화 알고리즘은 강력한 쇄도효과를 갖고 있으며, 그 처리 속도 또한 매우 빠른 알고리즘이다. 하지만 H/W의 발달로 인해 DES의 비밀키의 길이가 56bits로 너무 짧기 때문에 전수키 조사 공격에 쉽게 노출되어 있다. 본 논문에서는 전수키 조사 공격에 취약한 DES 알고리즘의 비밀키 길이 문제 해결을 위하여 디지털 홀로그래피와 DES 알고리즘을 결합하여 DES의 비밀키 길이를 크게 증가시키는 새로운 방법론을 제시한다. 또한 제안한 DES 알고리즘의 암호성능을 테스트하기 위하여 쇄도효과를 측정하여 가능성을 검증한다.

Keywords

References

  1. J. W. Goodman, "Introduction to Fourier Optics," McGraw-Hill, New York, USA, 1996.
  2. I. Yamaguchi and T. Zhang, "Phase-shifting digital holography," Opt. Lett. Vol. 22, pp. 1268-1270, 1997. https://doi.org/10.1364/OL.22.001268
  3. B. Javidi and E. Tajahuerce, "Three dimensional object recognition by use of digital holography," Opt. Lett. Vol. 25, pp. 610-612, 2000. https://doi.org/10.1364/OL.25.000610
  4. H. Kim, D. Kim, and Y. Lee, "Encryption of digital hologram of 3-D object by virtual optics," Optics Exp. Vol. 12, pp. 4912-4921, 2004. https://doi.org/10.1364/OPEX.12.004912
  5. O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, "Optical Techniques for Information Security," Proceedings of the IEEE, Vol. 97, pp. 1128-1148 2009. https://doi.org/10.1109/JPROC.2009.2018367
  6. Y. Frauel, A. Castro, T. Naughton, and B. Javidi, "Resistance of the double random phase encryption against various attacks," Optics Exp. Vol. 15, pp. 10253-10265, 2007. https://doi.org/10.1364/OE.15.010253
  7. S. Kishk and B. Javidi, "3D object watermarking by a 3D hidden object," Optics Exp. Vol. 11, pp. 874-888, 2003. https://doi.org/10.1364/OE.11.000874
  8. E. Tajahuerce and B. Javidi, "Encrypting three-dimensional information with digital holography," Appl. Opt. Vol. 39, pp. 6595-6601, 2000. https://doi.org/10.1364/AO.39.006595
  9. W. Stallings, "Crytography and network security," Pearson, New York, USA, 2011.
  10. T. Shimobaba, Y. Sato, J. Miura, M. Takenouchi, and T. Ito, "Real-time digital holographic microscopy using the graphic processing unit," Optics Exp. Vol. 16, pp. 11776-11781, 2008. https://doi.org/10.1364/OE.16.011776