DOI QR코드

DOI QR Code

영상보안시스템에서의 데이터 보호를 위한 ECC(Elliptic Curve Cryptography) 연산알고리즘 비교분석

A Comparative Analysis on ECC(Elliptic Curve Cryptography) Operation Algorit hm for Data Protection in Video security System

  • 김종민 (경기대학교/융합보안학과) ;
  • 추현욱 (이지스마트팜/개발팀) ;
  • 이동휘 (동신대학교/융합정보보호학과)
  • 발행 : 2019.12.31

초록

기술의 발전을 통해 기존 영상보안시스템들이 아날로드 방식의 CCTV에서 네트워크 기반 CCTV로 교체되어지고 있다. 이러한 기술 변화로 인해 네트워크를 이용한 도청 및 해킹에 대한 공격이 발생하게 되면 영상정보유출로 인해 개인 및 공공기관에 대한 피해는 막대하다 할 수 있다. 따라서 이러한 피해발생을 해결하기 위해 본 논문에서는 데이터 통신 과정에서 영상정보를 보호할 수 있는 ECC(Elliptic Curve Cryptography) scalar multiplication algorithm들을 비교 분석하여 영상시스템에서 최적화된 ECC scalar multiplication algorithm을 제안하고자 한다.

Video security systems change from analog based systems to network based CCTVs. Therefore, such network based systems are always exposed not only to threats of eavesdropping and hacking, but to personal damage or public organizations' damage due to image information leakage. Therefore, in order to solve the problem, this study conducts a comparative analysis on proposes the optimal ECC(Elliptic Curve Cryptography) scalar multiplication algorithms for image information protection in data communication process and thereby proposes the optimal operation algorithm of video security system.

키워드

참고문헌

  1. 한종욱, 조현숙, "영상보안시스템 기술 동향", 한국정보보호학회논문지, Vol. 19, No. 5, 2009, pp. 29-37.
  2. Taewoong Seo, Myunggyun Jeong, and Changsoo Kim, "A Study on Vulnerabilities of Monitoring and Control System based on IT Convergence Technology," The 6th International Conference on Multi-media Information Technology and Applications, pp. 245-247, 2010.
  3. 유지영, 이재일, "신규 IT 서비스 도입 확산을 위한 정보보호," 한국정보처리학회 정보처리학회지, 제17권, 제2호, pp. 10-17, 2010.
  4. 서태웅, 이성렬, 배병철, 윤이중, 김창수, "CCTV 보안관제 취약성 및 성능 분석", 한국멀티미디어학회논문지, Vol. 15, No. 1, 2012, pp. 93-100. https://doi.org/10.9717/kmms.2012.15.1.093
  5. William Stallings, "Cryptography and Network Security Principles and Practices," 2006.
  6. Neal Koblitz, "A course in Number Theory and Cryptography", 1994.
  7. 한국인터넷진흥원, "암호 알고리즘 및 키 길이 이용 안내서," 2013.
  8. Christof paar and Jan Pelzl, "Unnderstanding Cryptography a Textbook for Students and Practitioners", 2009.
  9. Alfred Menezes, Paul C.van and Scott Vanstone, "HANDBOOK of APPLIED CRYPTOGRAPHY," June, 1996.
  10. Neal Koblitz, "A course in Number Theory and Cryptography", 1994.
  11. Carlisle Adams and Steve Lloyd, Effective way for security PKI, Seoul, Infobook, 2003.
  12. Seok-ho Kim, "Comparison and analysis on efficiency of scalar multiplication for Elliptic Curve Cryptosystem," M. S. dissertation, Korea Maritime and Ocean University graduate school, Busan, 2003.
  13. Yeong-ja Kim, "Design and implementation of a security messenger system using elliptic curve cryptosystem," M. S. dissertation, Chung-Ang University Information graduate school, Seoul, 2004.
  14. IETF Std. RFC 6979, Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA), IETF, T. Pornin, August 2013.
  15. Song-hwan Lim, "The efficiency analysis of ECDSA using improved element algorithm," M. S. dissertation, Dongguk University Graduate School of International Affairs & Information, Seoul, 2000.
  16. IETF Std. RFC 4050, Using the Elliptic Curve Signature Algorithm (ECDSA) for XML Digital Signatures, IETF, S. Blake-Wilson, G. Karlinger, T. Kobayashi, Y. Wang, April 2005.
  17. William Stallings, "Cryptography and Network Security Principles and Practices", 2006.
  18. 정도, "NAF와 Look-Up 테이블을 이용한타원곡선 스칼라 곱셈 가속화", 한밭대학교, 석사학위논문, 2016.
  19. K. J. Ha, C. H. Seo, D. Y. Kim, "Design of validation System for a Crypto-Algorithm Implementation," Journal of the Korea
  20. https://www.keylength.com/en/4/, June 10, 2018.
  21. https://en.wikipedia.org/wiki/Elliptic_curve_point_multiplication#cite_note-guide-1