• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document : 5 / 12

ÇѱÛÁ¦¸ñ(Korean Title) Ÿ¿ø°î¼± °ø°³Å° »ý¼ºÀ» À§ÇÑ °í¼Ó ½ºÄ®¶ó°ö ¿¬»ê ½Ã½ºÅÛ ±¸Çö
¿µ¹®Á¦¸ñ(English Title) Development of High Speed Scalar Product Operation System for ECC Public Key
ÀúÀÚ(Author) ±è°©¿­   ÀÌö¼ö   ¹Ú¼®Ãµ   Kap-yol Kim   Chul-soo Lee   Seok-cheon Park  
¿ø¹®¼ö·Ïó(Citation) VOL 14 NO. 02 PP. 0394 ~ 0402 (2010. 02)
Çѱ۳»¿ë
(Korean Abstract)
¿Â¶óÀο¡¼­ À¯ÅëµÇ´Â ¼ö¸¹Àº Á¤º¸µéÀº µ¥ÀÌÅÍ·Î Á¦À۵Ǿî Àü¼ÛµÇ°í ÀÖÀ¸¸ç À̵é Á¤º¸µéÀº ŸÀο¡ ³ëÃâµÉ °æ¿ì Å« ¹®Á¦°¡ ¹ß»ýÇÒ ¼ö ÀÖ´Â Á¤º¸µéÀÌ ´Ù¼ö Â÷ÁöÇÏ°í ÀÖ´Ù. µû¶ó¼­ °ú°ÅºÎÅÍ ÃÖ±Ù±îÁö º¸È£°¡ ÇÊ¿äÇÑ Á¤º¸µéÀÇ ¾ÈÀüÇÑ À¯Åëä³Î È®º¸¸¦ À§ÇØ ´Ù¾çÇÑ ¹æ¹ýµéÀÌ ¿¬±¸µÇ°í ÀÖÀ¸¸ç ±× ´ëÇ¥ÀûÀÎ ±â¼úÀÌ ¾ÏÈ£ ½Ã½ºÅÛÀÌ´Ù. ¾ÏÈ£ ½Ã½ºÅÛÀº ´Ù¾çÇÑ ¼öÇÐÀû À̷аú ´Ù¾çÇÑ ¾ÏÈ£ ¾Ë°í¸®ÁòÀ» ¹ÙÅÁÀ¸·Î ±¸ÇöµÇ¹Ç·Î °í¼Ó ¿¬»êÀÇ Áß½ÉÀ» µÎ°í ¿¬±¸°¡ ÁøÇàµÇ¾î Áö°í ÀÖ´Ù. ÇÏÁö¸¸ ÃÖ±Ù µé¾î ºñ°ø°³Å° ¾ÏÈ£ ½Ã½ºÅÛ¿¡ ºñÇØ °ø°³Å° ¾ÏÈ£ ½Ã½ºÅÛ¿¡ ´ëÇÑ ¿¬±¸´Â ÁöÁöºÎÁøÇÑ ÇüÆíÀÌ¸ç µû¶ó¼­ º» ³í¹®¿¡¼­´Â ´ëÇ¥ÀûÀÎ °ø°³Å° ¾ÏÈ£ ½Ã½ºÅÛÀÎ ECC ¾ÏÈ£ ½Ã½ºÅÛ¿¡¼­ °í¼Ó °ø°³Å° »ý¼ºÀ» À§ÇÑ ½ºÄ®¶ó°ö ¿¬»ê ½Ã½ºÅÛÀ» ¿¬±¸ÇÏ¿´´Ù. Á¦¾ÈÇÏ´Â ½Ã½ºÅÛÀº ½ÇÁ¦ ±¸ÇöÀ» ÅëÇØ ±âÁ¸ ÀÌÁø NAF ½Ã½ºÅÛ°ú ÀÌÁø °Ë»ö ½Ã½ºÅÛÀ» ºñ±³․ºÐ¼® ÇÏ¿´°í ±× °á°ú º» ³í¹®¿¡¼­ Á¦¾ÈÇÑ ½Ã½ºÅÛÀÌ ±âÁ¸ ½Ã½ºÅÛº¸´Ù °ø°³Å° »ý¼ºÀÇ ½Ã°£Àû È¿À²ÀÌ ¿ì¼öÇÑ °ÍÀ» È®ÀÎÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
At a recent, enterprises based on online-service are established because of rapid growth of information network. These enterprises collect personal information and do customer management. If customers use a paid service, company send billing information to customer and customer pay it. Such circulation and management of information is big issue but most companies don¡¯t care of information security. Actually, personal information that was managed by largest internal open-market was exposed. For safe customer information management, this paper proposes the method that decrease load of RSA cryptography algorithm that is commonly used for preventing from illegal attack or hacking. The method for decreasing load was designed by Binary NAF Method and it can operates modular Exponentiation rapidly. We implemented modular Exponentiation algorithm using existing Binary Method and Windows Method and compared and evaluated it.
Å°¿öµå(Keyword) ¾Ïȣȭ   Ÿ¿ø°î¼±   °ø°³Å°   ¾ÏÈ£ ½Ã½ºÅÛ   RSA   ECC   Binary Search   Binary NAF  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå