128x Filetype PDF File size 0.54 MB Source: www.koreascience.or.kr
제40회 한국정보처리학회 추계학술발표대회 논문집 제20권 2호 (2013. 11) A Symmetric Key Cryptography Algorithm by Using 3-Dimensional Matrix of Magic Squares 이상호*, 김시호*, 정광호** *연세대학교 글로벌융합공학부 **한국게임과학고등학교 e-mail : sangholee@yonsei.ac.kr Sangho Lee *, Shiho Kim*, Kwangho Jung** *School of Integrated Technology, Yonsei University **Korea Game Science High school 요 약 We propose a symmetric key based cryptography algorithm to encode and decode the text data with limited length using 3-dimensional magic square matrix. To encode the plain text message, input text will be translated into an index of the number stored in the key matrix. Then, Caesar’s shift with pre-defined constant value is fabricated to finalize an encryption algorithm. In decode process, Caesar’s shift is applied first, and the generated key matrix is used with 2D magic squares to replace the index numbers in ciphertext to restore an original text. 1. Introduction feasibility of the proposal. Cryptography and encrypting the text message have A. Generation of 3-dimensional key matrix become an important issue for industry social network A 3-dimensional key matrix is fabricated by stacking 2D service in a mobile platform. Traditional methods of magic squares. symmetric key encryption, such as Caesar’s algorithm, are not an appropriate way in the modern cryptography. More void Dim3MatrixGeneration(int*** &Dim3Matrix, int m, int complex algorithms with a combination of substitution and &max_magicsquare_size) bit operation are popular techniques in symmetric key { algorithms to communicate the messages securely. Although // 2D magic square size generation and max value calculation a performance of modern encryption and decryption int* magicsquare_size = (int*)malloc(sizeof(int)*m); algorithm is reasonable, it cannot be applied to a specific use for(int i=0; imax_magicsquare_size) max_magicsquare_size = magicsquare_size[i]; symmetric key based encryption. Because of competitive } time complexity, it has become very popular. Despite of its wide usage with 16 iterations of substitution and bit //Allocation operations, its key is just bytes data converted from the Dim3Matrix = (int***)malloc(m*sizeof(int)); for(int x=0; x =magicsquare_size[x]?0:magicsquare_size[x]); algorithm by using 3D matrix with 2D magic squares [2] as a z
no reviews yet
Please Login to review.