Abstract
Since most cryptographic systems are PCI type, it is not suitable for users except experts to handle security system. In particular, most security programs used have not been verified against crack and are exposed to attack of virus or hacker. In this regard, this thesis designed Twofish cryptographic algorithm that uses USB, which can be easily used by users at general computers. Users can use security system easily using USB. In addition, Twofish cryptographic algorithm with various variable key lengths can be applied to various security system. Such Twofish cryptographic algorithm can improve performance for encryption and decryption, and increase efficiency of mobile security system in addition to USB.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., New York (1994)
AES3 Proceedings of Third AES Candidate Conference, , pp. 44–54 (April 2000), http://csrc.nist.gov/encryption/aes/round2/conf3/papers/
http://www.jetico.com/bcve_web_help/html/02_standards/02_algorithms.htm
http://www.encryptionanddecryption.com/algorithms/symmetric_algorithms.html#Twofish
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, SK., Kim, SY., Ra, YC. (2011). A Study on the Twofish Security Processor Design Using USB Interface Device. In: Lee, G., Howard, D., Ślęzak, D. (eds) Convergence and Hybrid Information Technology. ICHIT 2011. Communications in Computer and Information Science, vol 206. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24106-2_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-24106-2_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24105-5
Online ISBN: 978-3-642-24106-2
eBook Packages: Computer ScienceComputer Science (R0)