DOI QR코드

DOI QR Code

On the development of DES encryption based on Excel Macro

엑셀 매크로기능을 이용한 DES 암호화 교육도구 개발

  • Kim, Daehak (Department of Mathematics, Catholic University of Daegu)
  • Received : 2014.09.30
  • Accepted : 2014.10.30
  • Published : 2014.11.30

Abstract

In this paper, we consider the development of encryption of DES (data encryption standard) based on Microsoft Excel Macro, which was adopted as the FIPS (federal information processing standard) 46 of USA in 1977. Concrete explanation of DES is given. Algorithms for DES encryption are adapted to Excel Macro. By repeating the 16 round which is consisted of diffusion (which hide the relation between plain text and cipher text) and the confusion (which hide the relation between cipher key and cipher text) with Excel Macro, we can easily get the desired DES cipher text.

본 논문에서는 1977년 미국 국립기술표준원이 FIPS (연방정보처리기준; federal information processing standard) 46으로 공표한 암호화 표준인 현대 대칭키 블록 암호 DES (data encryption standard)의 암호화 전 과정에 대하여 엑셀 매크로 기능을 활용하여 암호화와 복호화에 사용할 수 있는 매크로를 개발하였다. 평문과 암호문과의 관계를 숨기는 확산과 암호문과 암호 키 사이의 관계를 숨기는 혼돈을 반복하는 라운드는 DES 구조의 핵심이다. 평문을 암호화 하는 DES 구조를 살펴보고 엑셀 매크로기능을 이용하여 암호화를 완성하는 매크로의 구현을 제안하고 개발된 매크로의 정확성과 활용성을 서술하였다.

Keywords

References

  1. Choi, H. S. and Ha, J. (2011a). Development of process-oriented education tool for Statistics with Excel Macro. Journal of the Korean Data & Information Science Society, 22, 643-650.
  2. Choi, H. S. and Ha, J. (2011b). Development of Bayes' rule education tool with Excel Macro. Journal of the Korean Data & Information Science Society, 23, 905-912.
  3. Choi, H. S. and Kim, T. Y. (2010). A study on sampling using the function of excel. Journal of the Korean Data & Information Science Society, 21, 481-491.
  4. Forouzan, B. A. (2008). Introduction to cryptography and network security, The McGraw-Hill Companies, New York.
  5. Hoffstein, J., Pipher, J. and Silverman, J. H. (2008). An introduction to mathematical cryptography, Springer, New York.
  6. Kahn, D. (1996). The codebreakers : The story of secret writing, Scribner's, New York.
  7. Kim, D. (2012). On the development of DES round key generator based on Excel Macro. Journal of the Korean Data & Information Science Society, 23, 1203-1212. https://doi.org/10.7465/jkdi.2012.23.6.1203
  8. Rivest, R. L., Shamir, A. and Adleman, L. (1978). A method of obtaining digital signature and public-key cryptosystem. Communication of the Association for Computing Machinery, 21, 120-126. https://doi.org/10.1145/359340.359342
  9. Shannon, C. E. (1949). Communication theory of secrecy system. The Bell Laps Technical Journal, 28, 656-715.
  10. Trappe, W. and Washington, L. (2006). Introduction to cryptography and coding theory, Prentice Hall, Upper Saddle River.