A Study on the Cryptography Algorithm Performance Comparison Used in Modulation and Forgery 


Vol. 42,  No. 1, pp. 250-256, Jan.  2017


PDF
  Abstract

Recently, the use of mobile devices has increased in order to provide a variety of services, and thus there has been a surge in the number of application malicious attacks on the Android platform. To resolve the problem, the domestic financial sector has been introducing the app anti-tamper solution based on cryptographic algorithms. However, since the capacity of apps installed in smartphones continues to increase and environments with limited resources as wearables and IoTs spread, there are limitations to the processing speed of the anti-tamper solutions. In this paper, we propose a novel anti-tamper solution by using lightweight hash function LEA and LSH. We also present the test results of a simulation program that implements this method and compare the performance with anti-tamper solutions based on the previous cryptographic algorithms.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

J. Y. Lee and N. S. Chang, "A Study on the Cryptography Algorithm Performance Comparison Used in Modulation and Forgery," The Journal of Korean Institute of Communications and Information Sciences, vol. 42, no. 1, pp. 250-256, 2017. DOI: .

[ACM Style]

Jun Yeong Lee and Nam Su Chang. 2017. A Study on the Cryptography Algorithm Performance Comparison Used in Modulation and Forgery. The Journal of Korean Institute of Communications and Information Sciences, 42, 1, (2017), 250-256. DOI: .

[KICS Style]

Jun Yeong Lee and Nam Su Chang, "A Study on the Cryptography Algorithm Performance Comparison Used in Modulation and Forgery," The Journal of Korean Institute of Communications and Information Sciences, vol. 42, no. 1, pp. 250-256, 1. 2017.