• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ¹«¼± Åë½Å¸Á ¾ÏÈ£µ¿±â¿¡ ÀûÇÕÇÑ Statistical CFB ¹æ½ÄÀÇ ¾ÏÈ£ ¾Ë°í¸®Áò ¼º´É ºÐ¼®
¿µ¹®Á¦¸ñ(English Title) Performance Analysis of a Statistical CFB Encryption Algorithm for Cryptographic Synchronization Method in the Wireless Communication Networks
ÀúÀÚ(Author) ¹Ú´ë¼±   ±èµ¿¼ö   ±è¿µ¼ö   À±ÀåÈ«   Dae-seon Park   Dong-soo Kim   Young-soo Kim   Jang-h  
¿ø¹®¼ö·Ïó(Citation) VOL 09 NO. 07 PP. 1419 ~ 1424 (2005. 11)
Çѱ۳»¿ë
(Korean Abstract)
º» ³í¹®¿¡¼­´Â Åë½Å ä³ÎÀÇ ¿À·ù·Î ÀÎÇÏ¿© Åë½Å ´Ü¸»°£¿¡ ¼­·Î ¼Û¼ö½ÅµÇ´Â Á¤º¸Áß¿¡ ÀÓÀÇÀÇ ºñÆ®°¡ »èÁ¦µÇ°Å³ª Ãß°¡µÇ¾î ¾ÏÈ£ ¾Ë°í¸®ÁòÀ» »ç¿ëÇÏ¿© Åë½ÅÀÌ ºÒ°¡´ÉÇØÁö´Â °æ¿ì, À̸¦ ±Øº¹Çϱâ À§ÇÑ ±â¹ýÀ¸·Î Statistical CFB ¹æ½ÄÀÇ ¾ÏÈ£ ¾Ë°í¸®ÁòÀ» Á¦¾ÈÇÑ´Ù. ¸ÕÀú, ºñÆ® »ðÀÔ ¶Ç´Â ºñÆ® »èÁ¦ ¹ß»ý ½Ã ¿À·ù ÀüÆÄÀÇ ¿µÇâÀ» ¼öÇÐÀûÀ¸·Î ¸ðµ¨¸µÇÏ¿© ÀÌ·ÐÀûÀÎ Statistical CFB ¾ÏÈ£ ¾Ë°í¸®ÁòÀÇ ¼º´ÉÀ» ºÐ¼®ÇÑ´Ù. ÀÌ °æ¿ì, Statistical CFB ¹æ½ÄÀÇ ¼º´ÉÀ» °áÁ¤ÇÏ´Â ¿ä¼ÒÀÎ ³ó±â ÆÐÅÏÀÇ ±æÀÌ¿Í ÇÇÇÁ¹éµÇ´Â Å°ÀÇ ±æÀ̸¦ º¯È­ÇØ°¡¸ç ºÐ¼®Çϵµ·Ï ÇÑ´Ù. ¶ÇÇÑ ÀÌ·ÐÀûÀÎ ºÐ¼®°ú ÇÔ²² ½ÇÁ¦·Î ƯÁ¤ ±æÀÌÀÇ µ¿±â ÆÐÅÏ°ú Çǵå¹éµÇ´Â Å°¸¦ ¼±ÅÃÇÑ ÈÄ, Statistical CFB ¹æ½ÄÀ» Àû¿ëÇÑ ¾ÏÈ£ ¾Ë°í¸®ÁòÀ» »ç¿ëÇÏ¿© ¼º´ÉÀ» ºÐ¼®ÇÏ¿´´Ù. À̸¦ ÀÌ·ÐÀûÀÎ ºÐ¼® °á°ú¿Í ºñ±³ÇÏ¿© Á¦¾ÈµÈ ¾ÏÈ£ ¾Ë°í¸®ÁòÀÇ Å¸´ç¼ºÀ» °ËÁõÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
This paper suggests a new cipher mode of operation which can recover cryptographic synchronization. First, we study the typical cipher modes of operation, especially focused on cryptographic synchronization problems. Then, we suggest a statistical cipher-feedback mode of operation. We define the error sources mathmatically and simulate propagation errors caused by a bit insertion or bit deletion. In the simulation, we compare the effects of changing the synchronization pattern length and feedback key length. After that, we analyze the simulation results with the calculated propagation errors. finally. we evaluate the performance of the statistical cipher-feedback mode of operation and recommand the implementation considerations.
Å°¿öµå(Keyword) Cryptographic synchronization   Cipher Modes of Operation   Channel Errors   Statistical CFB  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå