SILVER
SILVER 등급의 판매자 자료

경량 암호화 계획서 기능 연구 및 제안서 (IoT왿 Cloud의 요약 및 제안서)

"경량 암호화 계획서 기능 연구 및 제안서 (IoT왿 Cloud의 요약 및 제안서)"에 대한 내용입니다.
24 페이짿
어도비 PDF
최초등록일 2020.03.14 최종젿작일 2017.11
24P 미보기
경량 암호화 계획서 기능 연구 및 제안서 (IoT왿 Cloud의 요약 및 제안서)
  • 미보기

    소개

    "경량 암호화 계획서 기능 연구 및 제안서 (IoT왿 Cloud의 요약 및 제안서)"에 대한 내용입니다.

    목차

    1. 연구 결과물
    1) 경량 암호화 기능 연구
    2) IoT 의 보안 문제 및 대책
    3) 고급 경량 알고리즘 및 제안

    2. 결론
    1) 연구 결과의 기대 효과 및 활용 계획

    본내용

    제 1 절 경량 암호화 기능 연구
    우리는 그림 1 에서왿 같이 경량 암호화 알고리즘의 다양한 기본 요소를 논의하고 키 크기, 블록 길이, 라운드 및 구조 수를 기반으로 표 1 의 많은 경량 알고리즘을 요약한다.

    1. 경량 블록 암호화
    Xinxin Fan 외 연구 논은 저자원 장치를 위해 Welch-gong 암호 그룹에서 지어진 암호화 알고리즘으로 경량
    암호 WG-8 을 제시하였다 [12]. AES-128 [13], RC-5 [14], TEA [15], XTEA [16] 등과 같은 항목에 대해 더 나은 성능을 달성하기 위해 기존의 연구에서 다수의 블록 암호가 제안되었다. 일반적으로, 이들 중 일부는 성능을 향상시키기 위해 기존 블록 암호를 단순화함으로써 개선되고 설계되었다. 예를 들어, DESL [17]은 고전적인 DES [18]의 변형과 경량 DES 로 알려져 있다. DESL 에서 라운드 함수는 8 라운드를 반복하지 않고 단일 S-box 를 사용하여 하드웨어 구현을 향상시키는 위한 초기 및 최종 순열을 생성한다. 블록 암호의 SIMON 과 SPECK [19]는 넓이왿 키 크기가 다양하다. 둘 다 주어진 플랫폼에 유연하게 적용되며, 경량 응용 프로그램은 모든 종류에서 잘 수행되며, 경량 블록 암호화 중 일부는 [20] 에 설명되어 있다

    참고자료

    · http://www.gartner.com/newsroom/id/2636073 accessed online 16 Jan. 2017
    · Padmavathi, B., Kumari, S. R. (2013) A survey on performance analysis of DES, AES and RSA algorithm along
    · with LSB substitution. International Journal of Scienceand Research, 2(4), pp. 170-174
    · McKay, K. A., Bassham, L., Turan, M. S., Mouha, N. (2016) Report on Lightweight Cryptography. NIST DRAFT NISTIR, pp. 1-29
    · Yick, J., Mukherjee, B., Ghosal, D. (2008) Wireless sensor network survey. Computer networks, 52(12), pp. 2292-2330
    · Latré, B., Braem, B., Moerman, I., Blondia, C., Demeester, P. (2011) A survey on wireless body area networks. Wireless Networks, 17(1), pp. 1-18
    · Sajid, A., Abbas, H., Saleem, K. (2016) Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges. IEEE Access, 4, pp. 1375-1384
    · Singh, S., Jeong, Y. S., Park, J. H. (2016). A survey on cloud computing security: Issues, threats, and solutions. Journal of Network and Computer Applications, 75, pp. 200-222
    · Singh, S., Sharma, P. K., Park, J. H. (2016). Secure Clouds Forensic Investigative Architecture for Social Network Cloud. Advanced Science Letters, 22(9), 2461-2464
    · Kar, J., & Mishra, M. R. (2016) Mitigating Threats and Security Metrics in Cloud Computing. Journal of Information Processing Systems, 12(2), pp. 226~233
    · Zhou, J., Cao, Z., Dong, X., Vasilakos, A. V. (2017) Security and Privacy for Cloud-Based IoT: Challenges. IEEE Communications Magazine, 55(1), pp. 26-33
    · Singh, S., Sharma, P. K., Moon, S. Y., Moon, D., Park, J. H. (2016) A Comprehensive Study on APT Attacks and Countermeasures for Future Networks and Communications: Challenges and Solutions. The Journal of Supercomputing, pp. 1-32
    · Fan, X., Mandal, K., Gong, G. (2013) Wg-8: A lightweight stream cipher for resource-constrained smart devices. In: Proceeding of International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness Springer Berlin Heidelberg, pp. 617-632
    · Iokibe, K., Maeshima, K., Kagotani, H., Nogami, Y., Toyota, Y., Watanabe, T. (2014) Analysis on equivalent current source of AES-128 circuit for HD power model verification. In: Proceeding of 2014 International Symposium on Electromagnetic Compatibility, Tokyo (EMC'14/Tokyo), IEEE, pp. 302-305
    · Rivest, R. L. (1994) The RC5 encryption algorithm. In: Proceeding of International Workshop on Fast Software Encryption, Springer Berlin Heidelberg, pp. 86-96
    · Wheeler, D. J., & Needham, R. M. (1994) TEA, a tiny encryption algorithm. In: Proceeding of International Workshop on Fast Software Encryption, Springer Berlin Heidelberg, pp. 363-366
    · Yu, J., Khan, G., Yuan, F. (2011) Xtea encryption based novel RFID security protocol. In: Proceeding of 24th Canadian Conference on, Electrical and Computer Engineering (CCECE), IEEE, pp. 58-62
    · Leander, G., Paar, C., Poschmann, A., Schramm, K. (2007) New lightweight DES variants. In: Proceeding of International Workshop on Fast Software Encryption, Springer Berlin Heidelberg, pp. 196-210
    · Saputra, H., Vijaykrishnan, N., Kandemir, M., Irwin, M. J., Brooks, R., Kim, S., & Zhang, W. (2003) Masking the energy behavior of DES encryption. In: Proceeding of the conference on Design, Automation and Test in Europe-Volume 1 Computer Society, IEEE, pp. 1-6
    · Beaulieu, R., Treatman-Clark, S., Shors, D., Weeks, B., Smith, J., Wingers, L. (2015) The SIMON and SPECK lightweight block ciphers. In: Proceeding of 52nd ACM/EDAC/IEEE, Design Automation Conference (DAC), IEEE, pp. 1-6
    · Université du Luxembourg, Lightweight Block Ciphers, https://www.cryptolux.org/index.php/Lightweight_Block_Ciphers, accessed online 22 Jan. 2017
    · Bogdanov, A., Knudsen, L. R., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J., Vikkelsoe, C. (2007) PRESENT: An ultra-lightweight block cipher. In: Proceeding of International Workshop on Cryptographic Hardware and Embedded Systems, Springer Berlin Heidelberg, pp. 450-466
    · Hosseinzadeh, J., Hosseinzadeh, M. (2016) A Comprehensive Survey on Evaluation of Lightweight Symmetric Ciphers: Hardware and Software Implementation. Advances in Computer Science: an International Journal, 5(4), pp. 31-41
    · Mohd, B. J., Hayajneh, T., Vasilakos, A. V. (2015) A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues. Journal of Network and Computer Applications, 58, pp. 73-93
    · Standaert, F. X., Piret, G., Rouvroy, G., Quisquater, J. J., Legat, J. D. (2004) ICEBERG: An involutional cipher efficient for block encryption in reconfigurable hardware. In: Proceeding of International Workshop on Fast Software Encryption, Springer Berlin Heidelberg, pp. 279-298 Feldhofer, M., Rechberger, C. (2006) A case against currently used hash functions in RFID protocols. In: Proceeding of OTM Confederated International Conferences On the Move to Meaningful Internet Systems, Springer Berlin Heidelberg, pp. 372-381
    · Bogdanov, A., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J., Seurin, Y. (2008) Hash functions and RFID tags: Mind the gap. In: Proceeding of International Workshop on Cryptographic Hardware and Embedded Systems, Springer Berlin Heidelberg, pp. 283-299
    · Guo, J., Peyrin, T., Poschmann, A. (2011) The PHOTON family of lightweight hash functions. In: Proceeding of Annual Cryptology Conference, Springer Berlin Heidelberg, pp. 222-239
    · Aumasson, J. P., Henzen, L., Meier, W., Naya-Plasencia, M. (2013) Quark: A lightweight hash. Journal of cryptology, 26(2), pp. 313-339.
    · Bogdanov, A., Knežević, M., Leander, G., Toz, D., Varıcı, K., & Verbauwhede, I. (2011) SPONGENT: A lightweight hash function. In: Proceeding of International Workshop on Cryptographic Hardware and Embedded Systems, Springer Berlin Heidelberg, pp. 312-325
    · Hirose, S., Ideguchi, K., Kuwakado, H., Owada, T., Preneel, B., Yoshida, H. (2010, December). A lightweight 256-bit hash function for hardware and low-end devices: lesamnta-LW. In: Proceeding of International Conference on Information Security and Cryptology, Springer Berlin Heidelberg, pp. 151-168
    · Bossuet, L., Grand, M., Gaspar, L., Fischer, V., Gogniat, G. (2013) Architectures of flexible symmetric key crypto engines—a survey: From hardware coprocessor to multi-crypto-processor system on chip. ACM Computing Surveys (CSUR), 45(4), pp. 1-41
    · Tillich, S., Großschädl, J. (2006) Instruction set extensions for efficient AES implementation on 32-bit processors. In: Proceeding of International Workshop on Cryptographic Hardware and Embedded Systems, Springer Berlin Heidelberg, pp. 270-284
    · Hodjat, A., Verbauwhede, I. (2004) High-throughput programmable crypto co-processor, IEEE Micro, 24(3) pp. 34-45
    · Grand, M., Bossuet, L., Le Gal, B., Gogniat, G., Dallet, D. (2011) Design and implementation of a multi-core crypto-processor for software defined radios. In: Proceeding of International Symposium on Applied Reconfigurable Computing, Springer Berlin Heidelberg, pp. 29-40
    · ECRYPT, eSTREAM: the ECRYPT Stream Cipher Project, http://www.ecrypt.eu.org/stream/, accessed online 16 Jan. 2017
    · https://www.cryptolux.org/index.php/Lightweight_ Stream Ciphers, accessed online 24 Jan. 2017
    · Hell, M., Johansson, T., Meier, W. (2007) Grain: a stream cipher for constrained environments. International Journal of Wireless and Mobile Computing, 2(1), pp. 86-93
    · Babbage, S., Dodd, M. (2008). The MICKEY stream ciphers. In: Proceeding of New Stream Cipher Designs, Springer Berlin Heidelberg, pp. 191-209
    · Kitsos, P., Sklavos, N., Provelengios, G., Skodras, A. N. (2013) FPGA-based performance analysis of stream ciphers ZUC, Snow3g, Grain V1, Mickey V2, Trivium and E0. Microprocessors and Microsystems, 37(2), pp. 235-245
    · Souissi, R., Ben-Ammar, M. (2014) An intelligent wireless sensor network temperature acquisition system with an FPGA. Wireless Sensor Network, 6(1), pp.1-7
    · James, M., Kumar, D. S. (2016) An Implementation of Modified Lightweight Advanced Encryption Standard in FPGA. Procedia Technology, 25, pp. 582-589
    · Li, L., Liu, B., Wang, H. (2016) QTL: A new ultra-lightweight block cipher. Microprocessors and
    · Microsystems, 45, pp. 45-55
    · Karakoç, F., Demirci, H., Harmancı, A. E. (2015) AKF: A key alternating Feistel scheme for lightweight cipher designs. Information Processing Letters, 115(2), pp. 359-367
    · Bansod, G., Raval, N., Pisharoty, N. (2015) Implementation of a new lightweight encryption design for embedded security. IEEE Transactions on Information Forensics and Security, 10(1), pp. 142-151
    · Biswas, K., Muthukkumarasamy, V., Singh, K. (2015) An encryption scheme using chaotic map and genetic operations for wireless sensor networks. IEEE Sensors Journal, 15(5), pp. 2801-2809
    · Guo, P., Wang, J., Ji, S., Geng, X. H., Xiong, N. N. (2015) A lightweight encryption scheme combined with trust management for privacy-preserving in body sensor networks. Journal of medical systems, 39(12), pp. 190-198
    · Verma, S., Pal, S. K., Muttoo, S. K. (2014) A new tool for lightweight encryption on android. In: Proceeding of Advance Computing Conference (IACC), 2014 IEEE International, IEEE, pp. 306-311
    · Peng, C., Du, X., Li, K., Li, M. (2016) An Ultra-Lightweight Encryption Scheme in Underwater Acoustic Networks. Journal of Sensors, 2016, pp 1-10
    · Bansod, G., Patil, A., Sutar, S., Pisharoty, N. (2016) An Ultra Lightweight Encryption Design for Security in Pervasive Computing. In: Proceeding of 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), IEEE. pp. 79-84
    · Buja, A. G., Latip, S. F. A. (2015) The direction of lightweight ciphers in mobile big data computing. Procedia Computer Science, 72, pp. 469-476
    · Shelby, Z., Hartke, K., Bormann, C. (2014) The constrained application protocol (CoAP), pp. 1-110
    · Lee, J. H., & Lim, D. G. (2014). Parallel architecture for high-speed block cipher, HIGHT. International Journal of Security and its Applications, 8(2), pp. 59-66
    · Huang, Q., Yang, Y., Shen, M. (2016) Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing. Future Generation Computer Systems, pp.1-11
    · Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S., Yang, G., & Yang, A. (2015) A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Future Generation Computer Systems, 52, pp. 95-108
    · Fugkeaw, S., Sato, H. (2016) Improved Lightweight Proxy Re encryption for Flexible and scalable Mobile Revocation Management in Cloud Computing. In: Proceeding of 2016 IEEE 9th International Conference on Cloud Computing (CLOUD), IEEE, pp. 894-899
    · Liang, C., Ye, N., Malekian, R., Wang, R. (2016) The hybrid encryption algorithm of lightweight data in cloud storage. In: Proceeding of 2016 2nd International Symposium on, Agent, Multi-Agent Systems and Robotics (ISAMSR), IEEE, pp. 160-166
    · Baharon, M. R., Shi, Q., Llewellyn-Jones, D. (2015) A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing. In: Proceeding of 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), IEEE. pp. 618-625
    · Zegers, W., Chang, S. Y., Park, Y., & Gao, J. (2015) A Lightweight Encryption and Secure Protocol for Smartphone Cloud. In: Proceeding of 2015 IEEE Symposium on Service-Oriented System Engineering (SOSE), IEEE, pp. 259-266
    · Yao, X., Chen, Z., Tian, Y. (2015) A lightweight attribute-based encryption scheme for the Internet of Things. Future Generation Computer Systems, 49, pp. 104-112
    · Yang, Y., Zheng, X., Tang, C. (2016) Lightweight distributed secure data management system for health internet of things. Journal of Network and Computer Applications, pp.1-12
    · Sahraoui, S., & Bilami, A. (2015) Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things. Computer Networks, 91, pp. 26-45
    · Al Salami, S., Baek, J., Salah, K., & Damiani, E. (2016). Lightweight Encryption for Smart Home. In: Proceeding of 2016 11th International Conference on Availability, Reliability and Security (ARES), , IEEE, pp. 382-388
    · Baskar, C., Balasubramaniyan, C., Manivannan, D. (2016) Establishment of Light Weight Cryptography for Resource Constraint Environment Using FPGA. Procedia Computer Science, 78, pp. 165-171
    · ERNEST W., Light primitives and new technologies are driving the next generation of lightweight
    · cryptography, http://semiengineering.com/lightweight-cryptography-for-the-ioe/ , accessed online Feb. 2017
    · Kar, J., Mishra, M. R. (2016) Mitigating Threats and Security Metrics in Cloud Computing, Journal of Information Processing Systems, 12(2), PP. 226-233
    · Mohd, B. J., Hayajneh, T., Khalaf, Z. A. (2015, April). Optimization and modeling of FPGA implementation of the Katan Cipher. In: Proceeding of 2015 6th International Conference on Information and Communication Systems (ICICS), IEEE, pp. 68-72
    · Bhunia, S., Abramovici, M., Agrawal, D., Bradley, P., Hsiao, M. S., Plusquellic, J., Tehranipoor, M. (2013) Protection against hardware trojan attacks: Towards a comprehensive solution. IEEE Design and Test, 30(3), pp. 6-17
    · Hayajneh, T., Doomun, R., Al‐Mashaqbeh, G., Mohd, B. J. (2014) An energy‐efficient and security aware route selection protocol for wireless sensor networks. Security and Communication Networks, 7(11), pp. 2015-2038
    · Negash, B., Rahmani, A. M., Westerlund, T., Liljeberg, P., & Tenhunen, H. (2016). LISA 2.0: lightweight internet of things service bus architecture using node centric networking. Journal of Ambient Intelligence and Humanized Computing, 7(3), pp. 305-319
    · Maity, S., Park, J. H. (2016) Powering IoT Devices: A Novel Design and Analysis Technique. Journal of Convergence, 7, pp. 1-18
    · Naruse, T., Mohri, M., Shiraishi, Y. (2015) Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating. Human-centric Computing and Information Sciences, 5(1), pp. 8-25
  • 자료후기

      Ai 리뷰
      이 자료는 깊이 있는 내용과 함께 과제에 적용 가능한 내용이 많아 도움이 되었습니다. 과제에 바로 활용할 수 있어 매우 만족스러웠습니다. 감사합니다.
    • 자주묻는질의 답변을 확인해 주세요

      해피캠퍼스 FAQ 더뵖기

      꼭 알아주세요

      • 자료의 정보 및 내용의 진실성에 대하여 해피캠퍼스는 보증하지 않으며, 해당 정보 및 게시물 저작권과 기타 법적 책임은 자료 등록자에게 있습니다.
        자료 및 게시물 내용의 불법적 이용, 무단 전재∙배포는 금지되어 있습니다.
        저작권침해, 명예훼손 등 분쟁 요소 발견 시 고객비바카지노 Viva의 저작권침해 신고비바카지노 Viva를 이용해 주시기 바랍니다.
      • 해피캠퍼스는 구매자왿 판매자 모두가 만족하는 서비스가 되도록 노력하고 있으며, 아래의 4가지 자료환불 조건을 꼭 확인해주시기 바랍니다.
        파일오류 중복자료 저작권 없음 설명과 실제 내용 불일치
        파일의 다운로드가 제대로 되지 않거나 파일형식에 맞는 프로그램으로 정상 작동하지 않는 경우 다른 자료왿 70% 이상 내용이 일치하는 경우 (중복임을 확인할 수 있는 근거 필요함) 인터넷의 다른 사이트, 연구기관, 학껓, 서적 등의 자료를 도용한 경우 자료의 설명과 실제 자료의 내용이 일치하지 않는 경우
    문서 초안을 생성해주는 EasyAI
    안녕하세요. 해피캠퍼스의 방대한 자료 중에서 선별하여 당신만의 초안을 만들어주는 EasyAI 입니다.
    저는 아래왿 같이 작업을 도왿드립니다.
    - 주제만 입력하면 목차부터 본내용까지 자동 생성해 드립니다.
    - 장문의 콘텐츠를 쉽고 빠르게 작성해 드립니다.
    - 스토어에서 무료 캐시를 계정별로 1회 발급 받을 수 있습니다. 지금 바로 체험해 보세요!
    이런 주제들을 입력해 보세요.
    - 유아에게 적합한 문학작품의 기준과 특성
    - 한국인의 가치관 중에서 정신적 가치관을 이루는 것들을 문화적 문법으로 정리하고, 현대한국사회에서 일어나는 사건과 사고를 비교하여 자신의 의견으로 기술하세요
    - 작별인사 독후감
    해캠 AI 챗봇과 대화하기
    챗봇으로 간편하게 상담해보세요.
    2025년 06월 27일 금요일
    AI 챗봇
    안녕하세요. 해피캠퍼스 AI 챗봇입니다. 무엇이 궁금하신가요?
    12:04 오전