The Scheme for Improving the Efficiency of Block Cipher Algorithm

被引:0
|
作者
Zheng Ying [1 ]
Bai Qinghai [2 ,3 ]
机构
[1] Inner Mongolia Univ Nationalities, Journal Editorial Dept, Tongliao, Peoples R China
[2] Inner Mongolia Univ Nationalities, Coll Comp Sci & Technol, Tongliao, Peoples R China
[3] Inner Mongolia Univ Nationalities, Inst Comp Applicat Technol, Tongliao, Peoples R China
关键词
component; Block encryption; Efficiency of algorithm; Optimization; IDEA;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The most important network and communication security automation tool is encryption. Two forms of encryption widely used are symmetric and asymmetric encryption. The article expounds the fundamental principles of symmetric encryption algorithm IDEA firstly, then studies the implementation technique to improve the speed of algorithm under the situation that the algorithm is confirmed and gives some effective methods to optimize block cipher algorithm, and optimizes the implementation of IDEA encryption algorithm and obtains the test results.
引用
收藏
页码:824 / 826
页数:3
相关论文
共 50 条
  • [1] Energy Efficiency Model and Mapping Algorithm of Block Cipher for Cipher Specific Programmable Logic Array
    Li Wei
    Gao Jiahao
    Du Yiran
    Chen Tao
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (05) : 1372 - 1380
  • [2] The block cipher square algorithm
    Daemen, J
    Knudsen, LR
    Rijmen, V
    DR DOBBS JOURNAL, 1997, 22 (10): : 54 - &
  • [3] Steganographic scheme using a block cipher
    Yu, JJ
    Jung, CH
    Yoon, SK
    Lee, S
    DIGITAL WATERMARKING, 2005, 3304 : 163 - 170
  • [4] A High Speed Block Cipher Algorithm
    Do Thi, Bac
    Hieu, Minh Nguyen
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 43 - 53
  • [5] Hardware implementation of block cipher algorithm
    School of Computer, Wuhan University, Wuhan 430079, China
    不详
    Harbin Gongye Daxue Xuebao, 2006, 9 (1558-1562):
  • [6] A Scheme to Base a Hash Function on a Block Cipher
    Hirose, Shoichi
    Kuwakado, Hidenori
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5381 : 262 - +
  • [7] A block cipher algorithm identification scheme based on hybrid k-nearest neighbor and random forest algorithm
    Yuan K.
    Yu D.
    Feng J.
    Yang L.
    Jia C.
    Huang Y.
    PeerJ Computer Science, 2022, 8
  • [8] A block cipher algorithm identification scheme based on hybrid k-nearest neighbor and random forest algorithm
    Yuan, Ke
    Yu, Daoming
    Feng, Jingkai
    Yang, Longwei
    Jia, Chunfu
    Huang, Yiwang
    PEERJ COMPUTER SCIENCE, 2022, 8
  • [9] Chaotic encryption algorithm based on alternant of stream cipher and block cipher
    Wang, Xingyuan
    Wang, Xiaojuan
    Zhao, Jianfeng
    Zhang, Zhenfeng
    NONLINEAR DYNAMICS, 2011, 63 (04) : 587 - 597
  • [10] Chaotic encryption algorithm based on alternant of stream cipher and block cipher
    Xingyuan Wang
    Xiaojuan Wang
    Jianfeng Zhao
    Zhenfeng Zhang
    Nonlinear Dynamics, 2011, 63 : 587 - 597