• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö > Á¤º¸°úÇÐȸ³í¹®Áö (Journal of KIISE)

Á¤º¸°úÇÐȸ³í¹®Áö (Journal of KIISE)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ¸Þ½ÃÁö ÀÎÁõ Äڵ忡 ´ëÇÑ ¿¬±¸ µ¿Ç⠺м® ¹× ¼º´É ºñ±³
¿µ¹®Á¦¸ñ(English Title) Analysis of Research Trend and Performance Comparison on Message Authentication Code
ÀúÀÚ(Author) ±è¹Î¿ì   ±ÇÅ°栠 Minwoo Kim   Taekyoung Kwon  
¿ø¹®¼ö·Ïó(Citation) VOL 43 NO. 11 PP. 1245 ~ 1258 (2016. 11)
Çѱ۳»¿ë
(Korean Abstract)
´Ù¾çÇÑ ±â±âµéÀÌ »óÈ£ ¿¬°áµÇ¾î Åë½ÅÇÏ´Â IoT ȯ°æ¿¡¼­´Â º¸¾È À§ÇùÀ» ¹æÁöÇϱâ À§ÇØ ¾ÏÈ£ ¾Ë°í¸®Áò, ¸Þ½ÃÁö ÀÎÁõ ÄÚµå µî ±â¹Ð¼º°ú ¹«°á¼ºÀ» Á¦°øÇÏ´Â ¾ÏÈ£ ±â¼úÀ» »ç¿ëÇÑ´Ù. ¾ÈÀü¼ºÀÌ °ËÁõµÈ ±âÁ¸ ¾ÏÈ£ ±â¼úµéÀÌ ´Ù¼ö Á¸ÀçÇÏÁö¸¸, ÀúÀü·Â・Àú¼º´ÉÀÇ ¸¶ÀÌÅ©·Î ÄÁÆ®·Ñ·¯ ±â¹Ý IoT ±â±â¿¡ ±âÁ¸ ¾ÏÈ£ ±â¼úÀ» ±×´ë·Î »ç¿ëÇϱ⠾î·Æ±â ¶§¹®¿¡ ´Ù¾çÇÑ °æ·® ¾ÏÈ£ ±â¼úÀÌ µîÀåÇÏ°Ô µÇ¾ú´Ù. ÃÖ±Ù °æ·® ºí·Ï ¾ÏÈ£ ¾Ë°í¸®Áò¿¡ ´ëÇÑ ¿¬±¸´Â ²ÙÁØÈ÷ Áõ°¡ÇÏ°í ÀÖÁö¸¸, °æ·® ¸Þ½ÃÁö ÀÎÁõ Äڵ忡 ´ëÇÑ ¿¬±¸´Â ¹ÌÈíÇÑ ½ÇÁ¤ÀÌ´Ù. µû¶ó¼­, º» ³í¹®¿¡¼­´Â ´Ù¾çÇÑ ¸Þ½ÃÁö ÀÎÁõ Äڵ忡 ´ëÇÑ ºÐ·ù・ºÐ¼®À» ÅëÇØ ÇâÈÄ ¸Þ½ÃÁö ÀÎÁõ ÄÚµåÀÇ ¹ßÀü ¹æÇâ¿¡ ´ëÇØ Á¦½ÃÇÑ´Ù. ¶ÇÇÑ, ±â¹Ý ±â¼úº° ´ëÇ¥ ¾Ë°í¸®ÁòÀ» ½ÇÁ¦ ¸¶ÀÌÅ©·Î ÄÁÆ®·Ñ·¯¿¡ ±¸Çö ½ÇÇèÇÏ¿© Àú»ç¾ç ȯ°æ¿¡¼­ÀÇ ¾Ë°í¸®Áò ¼º´É ÀúÇϸ¦ ½ÇÁõÀûÀ¸·Î °ËÁõÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Cryptographic technologies providing confidentiality and integrity such as encryption algorithms and message authentication codes (MACs) are necessary for preventing security threats in the Internet of Things (IoT) where various kinds of devices are interconnected. As a number of encryption schemes that have passed security verification are not necessarily suitable for low-power and low-performance IoT devices, various lightweight cryptographic schemes have been proposed. However, a study of lightweight MACs is not sufficient in comparison to that of lightweight block ciphers. Therefore, in this paper, we reviewed various kinds of MACs for their classification and analysis and then, we presented a new way for future MAC development. We also implemented major MAC algorithms and performed experiments to investigate their performance degradation on low-end micro-controllers.
Å°¿öµå(Keyword) ¸Þ½ÃÁö ÀÎÁõ Äڵ堠 ¸Þ½ÃÁö ¹«°á¼º   ÀÎÁõ   °æ·®È­   ¸¶ÀÌÅ©·Î ÄÁÆ®·Ñ·¯   IoT   message integrity   authentication   lightweight   message authentication code   microcontroller   IoT  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå