Comparison Analysis of Acorn Algorithm and Snow Algorithm on Smart Card using Java']Java Card

被引:0
|
作者
Nurwarsito, Heru [1 ]
Ayu, Sarah Kusuma [1 ]
机构
[1] Univ Brawijaya, Fac Comp Sci, Malang, Indonesia
关键词
smart card; cryptography; data security; data optimization; acorn algorithm; snow algorithm;
D O I
10.1109/IC2IE53219.2021.9649079
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data theft and manipulation are threats that often occur in the use of smart cards. The data stored on the smart card will be changed when the data exchange is carried out, so that data with different contents will be received by the recipient. Cryptography is a solution that can be used to secure data on a smart card so that its contents cannot be changed. Acorn's algorithm is an algorithm that can guarantee its security aspects in terms of confidentiality and authentication. Snow's algorithm is an algorithm that is designed to be implemented on hardware. Acorn's Algorithm and Snow's Algorithm can be implemented on resource-limited devices such as smart cards because both algorithms are lightweight. The encrypted data on the smart card is the user ID and user balance, the data will be converted into ciphertext so that it cannot be read or changed by unauthorized parties. Test vector testing, and encryption and decryption performance testing are carried out to ensure the system can run properly. The results of the average performance of encryption and decryption time in the Acorn algorithm are 5.3ms of encryption time and 5.9ms of decryption time, while the meantime of encryption in the snow algorithm is 5.4ms and 2.4ms of decryption time.
引用
收藏
页码:429 / 434
页数:6
相关论文
共 50 条
  • [1] The synthesis of a Java']Java Card tokenisation algorithm
    Denney, E
    [J]. 16TH ANNUAL INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2001), PROCEEDINGS, 2001, : 43 - 50
  • [2] Developing smart card-based applications using Java']Java Card
    Vandewalle, JJ
    Vétillard, E
    [J]. SMART CARD RESEARCH AND APPLICATIONS, PROCEEDINGS, 2000, 1820 : 105 - 124
  • [3] An asymmetric fingerprint matching algorithm for Java']Java Card™
    Bistarelli, S
    Santini, F
    Vaccarelli, A
    [J]. AUDIO AND VIDEO BASED BIOMETRIC PERSON AUTHENTICATION, PROCEEDINGS, 2005, 3546 : 279 - 288
  • [4] An asymmetric fingerprint matching algorithm for Java']Java Card™
    Bistarelli, Stefano
    Santini, Francesco
    Vaccarelli, Anna
    [J]. PATTERN ANALYSIS AND APPLICATIONS, 2006, 9 (04) : 359 - 376
  • [5] Using contour marking bytecode verification algorithm on the java']java card
    Jiang, Longlong
    Li, Daiping
    [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 4120 - +
  • [6] Reverse engineering a Java']Java Card memory management algorithm
    Mesbah, Abdelhak
    Lanet, Jean-Louis
    Mezghiche, Mohamed
    [J]. COMPUTERS & SECURITY, 2017, 66 : 97 - 114
  • [7] Improved Adaptive Generational Garbage Collection Algorithm for Java']Java Card
    Yang Fubiao
    Li Daiping
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON LOGISTICS, ENGINEERING, MANAGEMENT AND COMPUTER SCIENCE, 2014, 101 : 699 - 702
  • [8] Biometric Hash Algorithm for Dynamic Handwriting Embedded on a Java']Java Card
    Kuemmel, Karl
    Vielhauer, Claus
    [J]. BIOMETRICS AND ID MANAGEMENT, 2011, 6583 : 61 - 72
  • [9] A Java']Java processor suitable for applications of Smart Card
    Zhang, JJ
    Li, FH
    Ge, YQ
    Yue, ZW
    Yang, ZL
    [J]. 2001 4TH INTERNATIONAL CONFERENCE ON ASIC PROCEEDINGS, 2001, : 736 - 739
  • [10] A fast algorithm to compute heap memory bounds of Java']Java Card applets
    Pham, Tuan-Hung
    Truong, Anh-Hoang
    Truong, Ninh-Thuan
    Chin, Wei-Ngan
    [J]. SEFM 2008: SIXTH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND FORMAL METHODS, PROCEEDINGS, 2008, : 259 - +