대칭단을 이용한 암호와 복호가 다른 블록 암호의 재설계
- Alternative Title
- Redesign of the block cipher which has different encryption and decryption algorithm, using symmetric layer
- Abstract
- The hardware implementation of block cipher algorithm is closely related to the structure of a cipher algorithm. Because Feistel structure has same encryption and decryption algorithm, only one of them is required to process both encryption and decryption, when implemented by hardware. However, since SPN structure has different encryption and decryption algorithm, both algorithms have to be implemented by hardware when both are needed. Therefore the block cipher algorithm, which has different encryption and decryption, has the significant disadvantage that hardware area increases, compared to the one, which has same encryption and decryption algorithm.
In this paper, in order to improve the block cipher which has different encryption and decryption algorithm, it has been composed of same encryption and decryption, using symmetric layer consisting of simple logical operations. The whole algorithm is organized with R round. A function (encryption algorithm) is used from first round to ((R/2) - 1)round and the inversed function (decryption algorithm) is used from (R/2) + 1 round to R round. Moreover, an irregular symmetric block, an independent round symmetric formed-layer, is inserted into the middle of the function and the inversed function to avoid the repetition of regular rounds.
The block ciphers which have different encryption and decryption algorithm such as AES, RC6, SHACAL-1, and SHACAL-2, have been recomposed by software, adapting symmetric layer. The symmetric adapted-block ciphers are about 10% slower than original ones, and it is estimated that the adapted symmetric layers don’t have a significant effect on encryption execution time. The symmetric layer can be easily applied to not only 128 bits block cipher but also 160 and 256 bits block cipher algorithms. It means that the symmetric layer can be applied to all block cipher algorithms which have different encryption and decryption.
In the aspect of security of symmetric layer adapted block algorithms, the symmetric layer prevents from the attacks such as Differential, Linear, Square, Impossible Differential, Boomerang, Related-key Slide, Related-key Differential-Nonlinear, Related-key Rectangle. It shows that symmetric layer is very efficient in the improvement of block cipher security. Like this, the reimplementation which applies characteristic about execution time and security of symmetric layer can be an efficient idea that is able to be easily adapted to a new block cipher algorithm design.
- Author(s)
- 김길호
- Issued Date
- 2010
- Awarded Date
- 2010. 2
- Type
- Dissertation
- Keyword
- 블록 암호 Feistel 구조 SPN 구조 대칭단
- Publisher
- 부경대학교
- URI
- https://repository.pknu.ac.kr:8443/handle/2021.oak/10058
http://pknu.dcollection.net/jsp/common/DcLoOrgPer.jsp?sItemId=000001955821
- Alternative Author(s)
- Kim, Gil Ho
- Affiliation
- 부경대학교 대학원
- Department
- 대학원 컴퓨터공학과
- Advisor
- 조경연
- Table Of Contents
- 목 차
Abstract v
1. 서 론 1
1.1 암호 1
1.2 비밀키 암호의 분류 3
1.3 블록 암호의 구조적 분류 4
1.4 논문의 주제 6
1.5 표기법 7
1.6 논문의 구성 8
2. 선택된 블록 암호 알고리즘 10
2.1 AES 10
2.2 RC6 11
2.3 SHACAL-1 13
2.4 SHACAL-2 15
2.5 블록 암호의 안전성 기준 17
2.6 블록 암호의 공격 방법 20
2.6.1 차분 공격 20
2.6.2 선형 공격 22
2.6.3 Square 공격 23
2.6.4 연관 키 공격 24
3. 대칭단과 대칭단을 적용한 구조 26
3.1 대칭단 구조의 목적 26
3.2 암호와 복호 알고리즘 사용 28
3.3 암호와 복호를 같게 만들기 위한 다른 노력 31
3.4 대칭단 구조 32
3.5 128비트 블록의 대칭단 35
3.6 160비트 블록의 대칭단 37
3.7 256비트 블록의 대칭단 38
3.8 대칭단의 안전성 분석 39
3.9 결론 41
4. 대칭단을 적용한 128비트 블록 암호 알고리즘 42
4.1 128비트 대칭단을 적용한 AES 42
4.1.1 구현 43
4.1.2 AES의 부분 상쇄 44
4.1.3 안전성 분석 46
4.2 128비트 대칭단을 적용한 RC6 56
4.2.1 구현 56
4.2.2 RC6의 부분 상쇄 58
4.2.3 안전성 분석 59
4.3 실행 결과 분석 67
4.4 결론 68
5. 대칭단을 적용한 160비트 블록 암호 알고리즘 70
5.1 160비트 대칭단을 적용한 SHACAL-1 70
5.2 구현 71
5.3 SHACAL-1의 부분 상쇄 73
5.4 안전성 분석 74
5.5 실행 결과 분석 83
5.6 결론 84
6. 대칭단을 적용한 256비트 블록 암호 알고리즘 86
6.1 256비트 대칭단을 적용한 SHACAL-2 86
6.2 구현 87
6.3 SHACAL-2의 부분 상쇄 89
6.4 안전성 분석 90
6.5 실행 결과 분석 105
6.6 결론 107
7. 결 론 108
참고문헌 110
- Degree
- Doctor
-
Appears in Collections:
- 대학원 > 컴퓨터공학과
- Authorize & License
-
- Files in This Item:
-
Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.