• LF몰 이벤트
  • 파일시티 이벤트
  • 서울좀비 이벤트
  • 탑툰 이벤트
  • 닥터피엘 이벤트
  • 아이템베이 이벤트
  • 아이템매니아 이벤트

경량 암호화 계획서 기능 연구 및 제안서 (IoT와 Cloud의 요약 및 제안서)

Twodragon
개인인증판매자스토어
최초 등록일
2020.03.14
최종 저작일
2017.11
24페이지/파일확장자 어도비 PDF
가격 2,500원 할인쿠폰받기
다운로드
장바구니

소개글

"경량 암호화 계획서 기능 연구 및 제안서 (IoT와 Cloud의 요약 및 제안서)"에 대한 내용입니다.

목차

1. 연구 결과물
1) 경량 암호화 기능 연구
2) IoT 의 보안 문제 및 대책
3) 고급 경량 알고리즘 및 제안

2. 결론
1) 연구 결과의 기대 효과 및 활용 계획

본문내용

제 1 절 경량 암호화 기능 연구
우리는 그림 1 에서와 같이 경량 암호화 알고리즘의 다양한 기본 요소를 논의하고 키 크기, 블록 길이, 라운드 및 구조 수를 기반으로 표 1 의 많은 경량 알고리즘을 요약한다.

1. 경량 블록 암호화
Xinxin Fan 외 연구 논문은 저자원 장치를 위해 Welch-gong 암호 그룹에서 지어진 암호화 알고리즘으로 경량
암호 WG-8 을 제시하였다 [12]. AES-128 [13], RC-5 [14], TEA [15], XTEA [16] 등과 같은 항목에 대해 더 나은 성능을 달성하기 위해 기존의 연구에서 다수의 블록 암호가 제안되었다. 일반적으로, 이들 중 일부는 성능을 향상시키기 위해 기존 블록 암호를 단순화함으로써 개선되고 설계되었다. 예를 들어, DESL [17]은 고전적인 DES [18]의 변형과 경량 DES 로 알려져 있다. DESL 에서 라운드 함수는 8 라운드를 반복하지 않고 단일 S-box 를 사용하여 하드웨어 구현을 향상시키는 위한 초기 및 최종 순열을 생성한다. 블록 암호의 SIMON 과 SPECK [19]는 넓이와 키 크기가 다양하다. 둘 다 주어진 플랫폼에 유연하게 적용되며, 경량 응용 프로그램은 모든 종류에서 잘 수행되며, 경량 블록 암호화 중 일부는 [20] 에 설명되어 있다

참고 자료

http://www.gartner.com/newsroom/id/2636073 accessed online 16 Jan. 2017
Padmavathi, B., Kumari, S. R. (2013) A survey on performance analysis of DES, AES and RSA algorithm along
with LSB substitution. International Journal of Scienceand Research, 2(4), pp. 170-174
McKay, K. A., Bassham, L., Turan, M. S., Mouha, N. (2016) Report on Lightweight Cryptography. NIST DRAFT NISTIR, pp. 1-29
Yick, J., Mukherjee, B., Ghosal, D. (2008) Wireless sensor network survey. Computer networks, 52(12), pp. 2292-2330
Latré, B., Braem, B., Moerman, I., Blondia, C., Demeester, P. (2011) A survey on wireless body area networks. Wireless Networks, 17(1), pp. 1-18
Sajid, A., Abbas, H., Saleem, K. (2016) Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges. IEEE Access, 4, pp. 1375-1384
Singh, S., Jeong, Y. S., Park, J. H. (2016). A survey on cloud computing security: Issues, threats, and solutions. Journal of Network and Computer Applications, 75, pp. 200-222
Singh, S., Sharma, P. K., Park, J. H. (2016). Secure Clouds Forensic Investigative Architecture for Social Network Cloud. Advanced Science Letters, 22(9), 2461-2464
Kar, J., & Mishra, M. R. (2016) Mitigating Threats and Security Metrics in Cloud Computing. Journal of Information Processing Systems, 12(2), pp. 226~233
Zhou, J., Cao, Z., Dong, X., Vasilakos, A. V. (2017) Security and Privacy for Cloud-Based IoT: Challenges. IEEE Communications Magazine, 55(1), pp. 26-33
Singh, S., Sharma, P. K., Moon, S. Y., Moon, D., Park, J. H. (2016) A Comprehensive Study on APT Attacks and Countermeasures for Future Networks and Communications: Challenges and Solutions. The Journal of Supercomputing, pp. 1-32
Fan, X., Mandal, K., Gong, G. (2013) Wg-8: A lightweight stream cipher for resource-constrained smart devices. In: Proceeding of International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness Springer Berlin Heidelberg, pp. 617-632
Iokibe, K., Maeshima, K., Kagotani, H., Nogami, Y., Toyota, Y., Watanabe, T. (2014) Analysis on equivalent current source of AES-128 circuit for HD power model verification. In: Proceeding of 2014 International Symposium on Electromagnetic Compatibility, Tokyo (EMC'14/Tokyo), IEEE, pp. 302-305
Rivest, R. L. (1994) The RC5 encryption algorithm. In: Proceeding of International Workshop on Fast Software Encryption, Springer Berlin Heidelberg, pp. 86-96
Wheeler, D. J., & Needham, R. M. (1994) TEA, a tiny encryption algorithm. In: Proceeding of International Workshop on Fast Software Encryption, Springer Berlin Heidelberg, pp. 363-366
Yu, J., Khan, G., Yuan, F. (2011) Xtea encryption based novel RFID security protocol. In: Proceeding of 24th Canadian Conference on, Electrical and Computer Engineering (CCECE), IEEE, pp. 58-62
Leander, G., Paar, C., Poschmann, A., Schramm, K. (2007) New lightweight DES variants. In: Proceeding of International Workshop on Fast Software Encryption, Springer Berlin Heidelberg, pp. 196-210
Saputra, H., Vijaykrishnan, N., Kandemir, M., Irwin, M. J., Brooks, R., Kim, S., & Zhang, W. (2003) Masking the energy behavior of DES encryption. In: Proceeding of the conference on Design, Automation and Test in Europe-Volume 1 Computer Society, IEEE, pp. 1-6
Beaulieu, R., Treatman-Clark, S., Shors, D., Weeks, B., Smith, J., Wingers, L. (2015) The SIMON and SPECK lightweight block ciphers. In: Proceeding of 52nd ACM/EDAC/IEEE, Design Automation Conference (DAC), IEEE, pp. 1-6
Université du Luxembourg, Lightweight Block Ciphers, https://www.cryptolux.org/index.php/Lightweight_Block_Ciphers, accessed online 22 Jan. 2017
Bogdanov, A., Knudsen, L. R., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J., Vikkelsoe, C. (2007) PRESENT: An ultra-lightweight block cipher. In: Proceeding of International Workshop on Cryptographic Hardware and Embedded Systems, Springer Berlin Heidelberg, pp. 450-466
Hosseinzadeh, J., Hosseinzadeh, M. (2016) A Comprehensive Survey on Evaluation of Lightweight Symmetric Ciphers: Hardware and Software Implementation. Advances in Computer Science: an International Journal, 5(4), pp. 31-41
Mohd, B. J., Hayajneh, T., Vasilakos, A. V. (2015) A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues. Journal of Network and Computer Applications, 58, pp. 73-93
Standaert, F. X., Piret, G., Rouvroy, G., Quisquater, J. J., Legat, J. D. (2004) ICEBERG: An involutional cipher efficient for block encryption in reconfigurable hardware. In: Proceeding of International Workshop on Fast Software Encryption, Springer Berlin Heidelberg, pp. 279-298 Feldhofer, M., Rechberger, C. (2006) A case against currently used hash functions in RFID protocols. In: Proceeding of OTM Confederated International Conferences On the Move to Meaningful Internet Systems, Springer Berlin Heidelberg, pp. 372-381
Bogdanov, A., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J., Seurin, Y. (2008) Hash functions and RFID tags: Mind the gap. In: Proceeding of International Workshop on Cryptographic Hardware and Embedded Systems, Springer Berlin Heidelberg, pp. 283-299
Guo, J., Peyrin, T., Poschmann, A. (2011) The PHOTON family of lightweight hash functions. In: Proceeding of Annual Cryptology Conference, Springer Berlin Heidelberg, pp. 222-239
Aumasson, J. P., Henzen, L., Meier, W., Naya-Plasencia, M. (2013) Quark: A lightweight hash. Journal of cryptology, 26(2), pp. 313-339.
Bogdanov, A., Knežević, M., Leander, G., Toz, D., Varıcı, K., & Verbauwhede, I. (2011) SPONGENT: A lightweight hash function. In: Proceeding of International Workshop on Cryptographic Hardware and Embedded Systems, Springer Berlin Heidelberg, pp. 312-325
Hirose, S., Ideguchi, K., Kuwakado, H., Owada, T., Preneel, B., Yoshida, H. (2010, December). A lightweight 256-bit hash function for hardware and low-end devices: lesamnta-LW. In: Proceeding of International Conference on Information Security and Cryptology, Springer Berlin Heidelberg, pp. 151-168
Bossuet, L., Grand, M., Gaspar, L., Fischer, V., Gogniat, G. (2013) Architectures of flexible symmetric key crypto engines—a survey: From hardware coprocessor to multi-crypto-processor system on chip. ACM Computing Surveys (CSUR), 45(4), pp. 1-41
Tillich, S., Großschädl, J. (2006) Instruction set extensions for efficient AES implementation on 32-bit processors. In: Proceeding of International Workshop on Cryptographic Hardware and Embedded Systems, Springer Berlin Heidelberg, pp. 270-284
Hodjat, A., Verbauwhede, I. (2004) High-throughput programmable crypto co-processor, IEEE Micro, 24(3) pp. 34-45
Grand, M., Bossuet, L., Le Gal, B., Gogniat, G., Dallet, D. (2011) Design and implementation of a multi-core crypto-processor for software defined radios. In: Proceeding of International Symposium on Applied Reconfigurable Computing, Springer Berlin Heidelberg, pp. 29-40
ECRYPT, eSTREAM: the ECRYPT Stream Cipher Project, http://www.ecrypt.eu.org/stream/, accessed online 16 Jan. 2017
https://www.cryptolux.org/index.php/Lightweight_ Stream Ciphers, accessed online 24 Jan. 2017
Hell, M., Johansson, T., Meier, W. (2007) Grain: a stream cipher for constrained environments. International Journal of Wireless and Mobile Computing, 2(1), pp. 86-93
Babbage, S., Dodd, M. (2008). The MICKEY stream ciphers. In: Proceeding of New Stream Cipher Designs, Springer Berlin Heidelberg, pp. 191-209
Kitsos, P., Sklavos, N., Provelengios, G., Skodras, A. N. (2013) FPGA-based performance analysis of stream ciphers ZUC, Snow3g, Grain V1, Mickey V2, Trivium and E0. Microprocessors and Microsystems, 37(2), pp. 235-245
Souissi, R., Ben-Ammar, M. (2014) An intelligent wireless sensor network temperature acquisition system with an FPGA. Wireless Sensor Network, 6(1), pp.1-7
James, M., Kumar, D. S. (2016) An Implementation of Modified Lightweight Advanced Encryption Standard in FPGA. Procedia Technology, 25, pp. 582-589
Li, L., Liu, B., Wang, H. (2016) QTL: A new ultra-lightweight block cipher. Microprocessors and
Microsystems, 45, pp. 45-55
Karakoç, F., Demirci, H., Harmancı, A. E. (2015) AKF: A key alternating Feistel scheme for lightweight cipher designs. Information Processing Letters, 115(2), pp. 359-367
Bansod, G., Raval, N., Pisharoty, N. (2015) Implementation of a new lightweight encryption design for embedded security. IEEE Transactions on Information Forensics and Security, 10(1), pp. 142-151
Biswas, K., Muthukkumarasamy, V., Singh, K. (2015) An encryption scheme using chaotic map and genetic operations for wireless sensor networks. IEEE Sensors Journal, 15(5), pp. 2801-2809
Guo, P., Wang, J., Ji, S., Geng, X. H., Xiong, N. N. (2015) A lightweight encryption scheme combined with trust management for privacy-preserving in body sensor networks. Journal of medical systems, 39(12), pp. 190-198
Verma, S., Pal, S. K., Muttoo, S. K. (2014) A new tool for lightweight encryption on android. In: Proceeding of Advance Computing Conference (IACC), 2014 IEEE International, IEEE, pp. 306-311
Peng, C., Du, X., Li, K., Li, M. (2016) An Ultra-Lightweight Encryption Scheme in Underwater Acoustic Networks. Journal of Sensors, 2016, pp 1-10
Bansod, G., Patil, A., Sutar, S., Pisharoty, N. (2016) An Ultra Lightweight Encryption Design for Security in Pervasive Computing. In: Proceeding of 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), IEEE. pp. 79-84
Buja, A. G., Latip, S. F. A. (2015) The direction of lightweight ciphers in mobile big data computing. Procedia Computer Science, 72, pp. 469-476
Shelby, Z., Hartke, K., Bormann, C. (2014) The constrained application protocol (CoAP), pp. 1-110
Lee, J. H., & Lim, D. G. (2014). Parallel architecture for high-speed block cipher, HIGHT. International Journal of Security and its Applications, 8(2), pp. 59-66
Huang, Q., Yang, Y., Shen, M. (2016) Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing. Future Generation Computer Systems, pp.1-11
Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S., Yang, G., & Yang, A. (2015) A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Future Generation Computer Systems, 52, pp. 95-108
Fugkeaw, S., Sato, H. (2016) Improved Lightweight Proxy Re encryption for Flexible and scalable Mobile Revocation Management in Cloud Computing. In: Proceeding of 2016 IEEE 9th International Conference on Cloud Computing (CLOUD), IEEE, pp. 894-899
Liang, C., Ye, N., Malekian, R., Wang, R. (2016) The hybrid encryption algorithm of lightweight data in cloud storage. In: Proceeding of 2016 2nd International Symposium on, Agent, Multi-Agent Systems and Robotics (ISAMSR), IEEE, pp. 160-166
Baharon, M. R., Shi, Q., Llewellyn-Jones, D. (2015) A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing. In: Proceeding of 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), IEEE. pp. 618-625
Zegers, W., Chang, S. Y., Park, Y., & Gao, J. (2015) A Lightweight Encryption and Secure Protocol for Smartphone Cloud. In: Proceeding of 2015 IEEE Symposium on Service-Oriented System Engineering (SOSE), IEEE, pp. 259-266
Yao, X., Chen, Z., Tian, Y. (2015) A lightweight attribute-based encryption scheme for the Internet of Things. Future Generation Computer Systems, 49, pp. 104-112
Yang, Y., Zheng, X., Tang, C. (2016) Lightweight distributed secure data management system for health internet of things. Journal of Network and Computer Applications, pp.1-12
Sahraoui, S., & Bilami, A. (2015) Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things. Computer Networks, 91, pp. 26-45
Al Salami, S., Baek, J., Salah, K., & Damiani, E. (2016). Lightweight Encryption for Smart Home. In: Proceeding of 2016 11th International Conference on Availability, Reliability and Security (ARES), , IEEE, pp. 382-388
Baskar, C., Balasubramaniyan, C., Manivannan, D. (2016) Establishment of Light Weight Cryptography for Resource Constraint Environment Using FPGA. Procedia Computer Science, 78, pp. 165-171
ERNEST W., Light primitives and new technologies are driving the next generation of lightweight
cryptography, http://semiengineering.com/lightweight-cryptography-for-the-ioe/ , accessed online Feb. 2017
Kar, J., Mishra, M. R. (2016) Mitigating Threats and Security Metrics in Cloud Computing, Journal of Information Processing Systems, 12(2), PP. 226-233
Mohd, B. J., Hayajneh, T., Khalaf, Z. A. (2015, April). Optimization and modeling of FPGA implementation of the Katan Cipher. In: Proceeding of 2015 6th International Conference on Information and Communication Systems (ICICS), IEEE, pp. 68-72
Bhunia, S., Abramovici, M., Agrawal, D., Bradley, P., Hsiao, M. S., Plusquellic, J., Tehranipoor, M. (2013) Protection against hardware trojan attacks: Towards a comprehensive solution. IEEE Design and Test, 30(3), pp. 6-17
Hayajneh, T., Doomun, R., Al‐Mashaqbeh, G., Mohd, B. J. (2014) An energy‐efficient and security aware route selection protocol for wireless sensor networks. Security and Communication Networks, 7(11), pp. 2015-2038
Negash, B., Rahmani, A. M., Westerlund, T., Liljeberg, P., & Tenhunen, H. (2016). LISA 2.0: lightweight internet of things service bus architecture using node centric networking. Journal of Ambient Intelligence and Humanized Computing, 7(3), pp. 305-319
Maity, S., Park, J. H. (2016) Powering IoT Devices: A Novel Design and Analysis Technique. Journal of Convergence, 7, pp. 1-18
Naruse, T., Mohri, M., Shiraishi, Y. (2015) Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating. Human-centric Computing and Information Sciences, 5(1), pp. 8-25
Twodragon
판매자 유형Gold개인인증
소개
IT 연구원으로써 공학 및 자기소개서, 취업 관련 자료
전문분야
자기소개서, 이력서, 공학/기술
판매자 정보
학교정보
비공개
직장정보
비공개
자격증
  • 비공개
해당 판매자는 노하우톡 기능을 사용하는 회원입니다.노하우톡
* 노하우톡 기능이란?노하우 자료를 판매하는 회원에게 노하우 컨설팅, 활용방법 등을 1:1 대화를 통해 문의할 수 있는 기능입니다.

주의사항

저작권 자료의 정보 및 내용의 진실성에 대하여 해피캠퍼스는 보증하지 않으며, 해당 정보 및 게시물 저작권과 기타 법적 책임은 자료 등록자에게 있습니다.
자료 및 게시물 내용의 불법적 이용, 무단 전재∙배포는 금지되어 있습니다.
저작권침해, 명예훼손 등 분쟁 요소 발견 시 고객센터의 저작권침해 신고센터를 이용해 주시기 바랍니다.
환불정책

해피캠퍼스는 구매자와 판매자 모두가 만족하는 서비스가 되도록 노력하고 있으며, 아래의 4가지 자료환불 조건을 꼭 확인해주시기 바랍니다.

파일오류 중복자료 저작권 없음 설명과 실제 내용 불일치
파일의 다운로드가 제대로 되지 않거나 파일형식에 맞는 프로그램으로 정상 작동하지 않는 경우 다른 자료와 70% 이상 내용이 일치하는 경우 (중복임을 확인할 수 있는 근거 필요함) 인터넷의 다른 사이트, 연구기관, 학교, 서적 등의 자료를 도용한 경우 자료의 설명과 실제 자료의 내용이 일치하지 않는 경우

이런 노하우도 있어요!더보기

최근 본 자료더보기
탑툰 이벤트
경량 암호화 계획서 기능 연구 및 제안서 (IoT와 Cloud의 요약 및 제안서)
  • 레이어 팝업
  • 레이어 팝업
  • 레이어 팝업
  • 레이어 팝업
  • 레이어 팝업