possible to save the text displayed in the output
window and keep it safe in the form of an encrypted
file. When all input values are set normally,
decryption starts as shown in Figure 7 by clicking the
decryption button.
5 CONCLUSIONS
The encryption method presented in this paper is not
encryption by a single algorithm. Several types of
techniques that have already been verified are
converged. It is considered that it will be safely used
in fields that rely heavily on cryptographic algorithms
used in virtual currency and blockchain fields. In the
future, encryption-decryption will be more threatened
by easily accessible cloud computing than by
quantum computers. Later, through the combination
of various passwords, functions such as data
confidentiality and integrity, authentication and non-
repudiation (Nam, Kim, and Park, 2015), as well as
stability and robustness of cryptography (Kim, Kim,
and Kim, 2002; Song, Ko, and Chung, 2000; Abu-
Faraj, and Alqadi, 2020), resistance (Song, Kang, and
Sung, 2014; Jang, 2013; Kim, Jang, and Chang,
2014), and efficiency We will continue to study how
(Lee, You, and Yim, 2015; Lee, You, and Yim, K.
2016; Kwon, Kim, and Hong, 2014) is improved. In
addition, it would be a differentiated significance of
this thesis that encryption of documents was easily
realized not only in institutions and companies, but
also in electronic devices for the general public (Jeon,
Shin, Jung, Lee, and Yoo, 2015), which are already
becoming common.
REFERENCES
Abu-Faraj, M. M., and Alqadi, Z. A. (2020). Using Highly
Secure Data Encryption Method for Text File
Cryptography, In IJCSNS International Journal of
Computer Science and Network Security, 20(11):53-60.
Jang, S. (2013). Design of the File Security Function Using
Encryption Algorithm in the Windows Operating
System, In The Korea Institute of Information and
Communication Engineering, 17(3):612-618. (in
Korean)
Jeon, B. Shin, S., Jung, K., Lee, J. and Yoo, K. (2015).
Reversible Secret Sharing Scheme Using Symmetric
Key Encryption Algorithm in Encrypted Images, In
Journal of Korea Multimedia Society, 18(11):1332-
1341. (in Korean)
Kim, B., Kim, T. and Kim, J. (2002). FPGA
Implementation of the AES Cipher Algorithm by using
Pipelining, In KIISE Transactions on Computing
Practices, 8(6):717-726. (in Korean)
Kim, T., Jang, M. and Chang, J. (2014). Hilbert-curve based
Multi-dimensional Indexing Key Generation Scheme
and Query Processing Algorithm for Encrypted
Databases, In Journal of Korea Multimedia Society,
17(10):1182-1188. (in Korean)
Kwon, T., Kim, H. and Hong, S. (2014). SEED and ARIA
Algorithm Design Methods Using GEZEL, In Journal
of the Korea Institute of Information Security and
Cryptology, 24(1):15-29. (in Korean)
Lee, K., You, I., and Yim, K. (2015). An Analysis of Agility
of the Cryptography API Next Generation in Microsoft:
Based on Implementation Example of Applying
Cryptography Algorithm HAS-160 in South Korea, In
Journal of the Korea Institute of Information Security
and Cryptology, 25(6):1327-1339. (in Korean)
Lee, K., You, I., and Yim, K. (2016). An Analysis of a
Structure and Implementation of Error-Detection Tool
of Cryptography API-Next Generation (CNG) in
Microsoft, In Journal of the Korea Institute of
Information Security and Cryptology, 26(1):153-168.
(in Korean)
Lee, M., Yeom, H., Song, Y., and Kim, J. (2005). Modern
Information Protection, Korean Publishing Company
Hongreung, Seoul. (in Korean)
Nakov, S. (2018). Practical Cryptography for
Development, Software University, Sofia.
Nam, H., Kim, D., and Park, N. (2015). Implementation of
ARIA Encryption Algorithm based on WebCL, In The
42nd Annual Meeting and Proceedings of Korea
Computer Conference, 42(2):49-51, 2015. (in Korean)
Paar, C., and Pelzl, J. (2010). Understanding
Cryptography: A Textbook for Students and
Practitioners, Springer, Germany.
Richard E. S., (2001) Authentication from Passwords to
Publish Keys, Addison-Wesley Professional, Boston.
(in Korean)
Seo, H. (2017). Implementing Software Passwords over the
Internet, In Communications of the Korean Institute of
Information Scientists and Engineers,
35(1):8-15. (in
Korean)
Song, K., Kang, H., and Sung, J. (2014). An Efficient New
Format Preserving Encryption Algorithm to Encrypt
the Personal Information, In Journal of the Korea
Institute of Information Security and Cryptology,
24(4):753-763. (in Korean)
Song, M., Ko, M., and Chung, Y. (2000). Hardware Using
of the SEED Algorithm, In The 24th Conference of the
KIPS, 7(2):1453-1456. (in Korean)