Comparison Analysis of Acorn Algorithm and Snow Algorithm on Smart Card using Java']Java Card

被引:0
|
作者
Nurwarsito, Heru [1 ]
Ayu, Sarah Kusuma [1 ]
机构
[1] Univ Brawijaya, Fac Comp Sci, Malang, Indonesia
关键词
smart card; cryptography; data security; data optimization; acorn algorithm; snow algorithm;
D O I
10.1109/IC2IE53219.2021.9649079
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data theft and manipulation are threats that often occur in the use of smart cards. The data stored on the smart card will be changed when the data exchange is carried out, so that data with different contents will be received by the recipient. Cryptography is a solution that can be used to secure data on a smart card so that its contents cannot be changed. Acorn's algorithm is an algorithm that can guarantee its security aspects in terms of confidentiality and authentication. Snow's algorithm is an algorithm that is designed to be implemented on hardware. Acorn's Algorithm and Snow's Algorithm can be implemented on resource-limited devices such as smart cards because both algorithms are lightweight. The encrypted data on the smart card is the user ID and user balance, the data will be converted into ciphertext so that it cannot be read or changed by unauthorized parties. Test vector testing, and encryption and decryption performance testing are carried out to ensure the system can run properly. The results of the average performance of encryption and decryption time in the Acorn algorithm are 5.3ms of encryption time and 5.9ms of decryption time, while the meantime of encryption in the snow algorithm is 5.4ms and 2.4ms of decryption time.
引用
收藏
页码:429 / 434
页数:6
相关论文
共 50 条
  • [31] Java']Java card application development
    Barnes, D
    [J]. DR DOBBS JOURNAL, 1999, 24 (02): : 72 - +
  • [32] ECC programming in Java']Java Card
    Gayoso Martinez, V.
    Hernandez Encinas, L.
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2014, 9 (06):
  • [33] Implementing FISCIC card specification and developing health care application using Java']Java card
    Ma, TY
    Hou, TW
    [J]. INTERNATIONAL SYMPOSIUM ON MULTIMEDIA SOFTWARE ENGINEERING, PROCEEDINGS, 2000, : 184 - 190
  • [34] Evaluation of Java']Java Card performance
    Bouzefrane, Samia
    Cordry, Julien
    Meunier, Herve
    Paradinas, Pierre
    [J]. SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2008, 5189 : 228 - +
  • [35] Object lifetimes in Java']Java Card
    Oestreicher, M
    Krishna, K
    [J]. PROCEEDINGS OF THE USENIX WORKSHOP ON SMARTCARD TECHNOLOGY (SMARTCARD '99), 1999, : 129 - 137
  • [36] An efficient small sized on-card verifier for Java']Java Card
    Cho, JB
    Jung, MS
    Jun, SK
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2003, PT 2, PROCEEDINGS, 2003, 2668 : 552 - 561
  • [37] 8-bit Java']Java: the Java']Java card
    Grehan, R
    [J]. COMPUTER DESIGN, 1997, 36 (05): : 80 - 80
  • [38] Design of objects sharing mechanism with security domain in Java']Java smart card
    Xu Yixin
    Zhang Qishan
    [J]. ICECT: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMPUTER TECHNOLOGY, PROCEEDINGS, 2009, : 64 - 68
  • [39] Develop Java']Java Card applications using security policy
    Xu, Junwu
    Niu, Zhimei
    [J]. ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, : 6281 - 6283
  • [40] Develop Java']Java Card applications using the OpenCard framework
    Xu, JW
    Liang, JL
    [J]. ISTM/2005: 6th International Symposium on Test and Measurement, Vols 1-9, Conference Proceedings, 2005, : 7821 - 7822