Comparison Analysis of Acorn Algorithm and Snow Algorithm on Smart Card using Java']Java Card

被引:0
|
作者
Nurwarsito, Heru [1 ]
Ayu, Sarah Kusuma [1 ]
机构
[1] Univ Brawijaya, Fac Comp Sci, Malang, Indonesia
关键词
smart card; cryptography; data security; data optimization; acorn algorithm; snow algorithm;
D O I
10.1109/IC2IE53219.2021.9649079
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data theft and manipulation are threats that often occur in the use of smart cards. The data stored on the smart card will be changed when the data exchange is carried out, so that data with different contents will be received by the recipient. Cryptography is a solution that can be used to secure data on a smart card so that its contents cannot be changed. Acorn's algorithm is an algorithm that can guarantee its security aspects in terms of confidentiality and authentication. Snow's algorithm is an algorithm that is designed to be implemented on hardware. Acorn's Algorithm and Snow's Algorithm can be implemented on resource-limited devices such as smart cards because both algorithms are lightweight. The encrypted data on the smart card is the user ID and user balance, the data will be converted into ciphertext so that it cannot be read or changed by unauthorized parties. Test vector testing, and encryption and decryption performance testing are carried out to ensure the system can run properly. The results of the average performance of encryption and decryption time in the Acorn algorithm are 5.3ms of encryption time and 5.9ms of decryption time, while the meantime of encryption in the snow algorithm is 5.4ms and 2.4ms of decryption time.
引用
收藏
页码:429 / 434
页数:6
相关论文
共 50 条
  • [41] Measurement Analysis When Benchmarking Java']Java Card Platforms
    Paradinas, Pierre
    Cordry, Julien
    Bouzefrane, Samia
    [J]. INFORMATION SECURITY THEORY AND PRACTICE: SMART DEVICES, PERVASIVE SYSTEMS, AND UBIQUITOUS NETWORKS, PROCEEDINGS, 2009, 5746 : 84 - +
  • [42] Experimental Comparison of Concolic and Random Testing for Java']Java Card Applets
    Kahkonen, Kari
    Kindermann, Roland
    Heljanko, Keijo
    Niemela, Ilkka
    [J]. MODEL CHECKING SOFTWARE, 2010, 6349 : 22 - 39
  • [43] Verification of JAVA']JAVA CARD applets behavior with respect to transactions and card tears
    Marche, Claude
    Rousset, Nicolas
    [J]. SEFM 2006: FOURTH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND FORMAL METHODS, PROCEEDINGS, 2006, : 137 - +
  • [44] An advanced Java card system architecture for smart card based on large RAM memory
    Yang, Yoon-Sim
    Choi, Won-Ho
    Jin, Min-Sik
    Hwang, Cheul-Jun
    Jung, Min-Soo
    [J]. Proc. Int. Conf. Hybrid Info. Technol., 1600, (646-650):
  • [45] Performance evaluation of Java']Java card bytecodes
    Paradinas, Pierre
    Cordry, Julien
    Bouzefrane, Samia
    [J]. INFORMATION SECURITY THEORY AND PRACTICES: SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4462 : 127 - +
  • [46] Formalizing the safety of Java']Java, the Java']Java virtual machine, and Java']Java card
    Hartel, PH
    Moreau, L
    [J]. ACM COMPUTING SURVEYS, 2001, 33 (04) : 517 - 558
  • [47] Implementation of Java']Java Card Virtual Machine
    Liu, SY
    Mao, ZG
    Ye, YZ
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2000, 15 (06) : 591 - 596
  • [48] Building an "impossible" verifier on a Java']Java Card
    Deville, D
    Grimaud, G
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 2ND WORKSHOP ON INDUSTRIAL EXPERIENCES WITH SYSTEMS SOFTWARE (WIESS 02), 2002, : 15 - 24
  • [49] An integrated development environment for Java']Java Card
    Attali, I
    Caromel, D
    Courbis, C
    Henrio, L
    Nilsson, H
    [J]. COMPUTER NETWORKS, 2001, 36 (04) : 391 - 405
  • [50] Developing Java']Java Card Applications with B
    Gurgel Gomes, Bruno Emerson
    Moreira, Anamaria Martins
    Deharbe, David
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 184 (SPEC. ISS.) : 81 - 96