A Study on the HiSSR Block Cryptosystem Design adapted Multimedia Communications

멀티미디어 통신에 적합한 HiSSR 블록암호 시스템 설계에 관한 연구

Kim, Jong-Hyup;Lee, Seon-Keun;Kim, Hwan-Yong
김종협;이선근;김환용

  • Published : 20030900

Abstract

Information protection and cryptography technology is developed with IT but real time processing and secret maintenance are problems to be solved. Therefore this paper is proposed new HiSSR(High Speed and Security Rate for the Cryptographic Algorithm) for increasing secret rate and processing rate perform performance analysis with existed other cryptography algorithms. The Proposed new HiSSR crypto-algorithm increase the processing rate than existed algorithms by using bit and byte mixed operation with RNG(Random Number Generator). HiSSR that performs simultaneous operations have higher 1.03 in the processing rate and 2 in the cryptosystem performance than existed cryptosystems. Implementation for HiSSR use Synopsys Design Analyser Ver. 1999.10, samsung KG75 library and Synopsys VHDL Debegger. As a simulation result, symmetric cryptosystem DES operate 416Mbps at the 40MHz. and Rijndael operate 612Mbps at the 50MHz.. HiSSR cryptosystem have gate counting 10K and operate 430Mbps at the 40MHz. and 630Mbps at the 50.

정보보호 및 암호기술은 IT 산업과 더불어 매우 많은 발전을 이룩하였지만 실시간 처리 및 비화성 유지 등은 아직도 해결해야 하는 문제점이다. 그러므로 본 논문에서는 효준화된 AES인 보다 비도 증가 및 처리율을 향상시킬 수 있는 새로운 HiSSR(High Speed and Security Rate for the Cryptographic Algorithm) 알고리즘을 제안하였으며 Rijndael 및 다른 DES와 비교하여 성능분석을 수행하였다. HiSSR 암호알고리즘의 구현은 Synopsys Design Analyser Ver. 1999.10과 삼성 KG75 library 그리고 Synopsys VHDL Debegger를 사용하였다. 모의실험결과, 대칭형 암호시스템인 DES는 동작주파수가 40MHz일 경우 416Mbps의 처리율을 가지며, Rijndael 암호시스템은 동작주파수가 50MHz일 경우 612Mbps의 처리율을 가진다. HiSSR 암호시스템의 전체 거이트 수는 10K이며 동작주파수가 40MHz일 때 128 비트에 대한 처리율은 430Mbps, 50MHz일 때 128 비트에 대한 처리율은 630Mbps였다.

Keywords

References

  1. W. Stallings, 'Cryptography and Network Security', Prentice Hall, 1998
  2. E. Dawson, W. Millan and L. Simpson, 'Methods for Designing Boolean Functions for Cryptographic Applications', In 58th Workshop on General Algebra Conference (AAA58) Vienna, June 1999
  3. Neal Koblitz, 'A Course in Number Theory and Cryptography', Springer-Verlag, 1994
  4. E. Dawson and L. Nielsen, 'Automated cryptanalysis of XOR Plaintext Strings', Cryptologia, Vol. XX, No. 2, pp. 165-181, April 1996
  5. L. Simpson, J. Dj. Goli´c, M. Salmasizadeh and E. Dawson, 'A Fast Correlation Attack on Multiplexer Generators', In Information Processing Letters, pp70, 1999
  6. M. Kimberley, 'Comparison of Two Statistical Tests for Keystream Sequences', Electronics Letters, Vol. 23, No. 8, pp. 365-366, April 1987 https://doi.org/10.1049/el:19870268
  7. L. Brown and J. Seberry, 'Key scheduling in DES type Cryptosystems', abstract of AUSCRYPT'90, 1990
  8. E. Biham and A. Shamir, 'Differential Cryptanalysis of DES-like Cryptosystems', Journal of CRYPTOLOGY Vol. 4 No. 1, 1991
  9. E. Biham and A. Shamir, 'Differential Cryptanalysis of the Full 16-Round DES', Proc. of CRYPTO'92, 1992
  10. J. D. Golic, 'On the linear complexity of Functions of Periodic GF(q) Sequences', IEEE Trans. on Information Theory, vol. 35. No. 1, pp. 69-75, Jan. 1989
  11. M. Matsui, 'Linear Cryptanalysis Method for DES Cipher', EUROCRYO'93, Extended Abstracts, 1993
  12. NIST, “Draft FIPS for the AES”, http://csrc.nist.gov/publications/drafts.html, Feb. 2001
  13. L. Brown and J. Seberry, 'On the Design of Permutation P in Des Type Cryptosystem', Abstract of AUSCRYPT'90, 1990
  14. R. Rueppel, 'Stream Ciphers', Contemporary Cryptology : The science of Infor. Integrity, New York, IEEE Pres, pp. 65-134, 1991
  15. Burton S. Kaliski Jr., 'An Overview of the PKCS Standards', RSA Data Security, Inc. 1993