Title :
Iterative Composite Encryption Algorithm Based on Tea and Elgamal
Author :
Bing-cheng, Qiu ; Yang-xin, Yao ; Xi-min, Zhang ; Yin-dong, Chen
Author_Institution :
Guangdong Polytech. Inst., Guangzhou, China
fDate :
March 31 2009-April 2 2009
Abstract :
Complex structure and low efficiency are the deficiencies exist in the traditional composite encryption algorithm. This paper comes up with an iterative composite encryption algorithm based on TEA and ELGamal. ElGalam is applied to the encryption process using TEA 32-time cyclic iteration by group. This kind of algorithm has better encryption efficiency and higher encryption strength together with smaller amount of keys, simpler operation and more convenient modification method, it totally adapts to an environment which requires high level of security but low consumption of system resource.
Keywords :
iterative methods; private key cryptography; public key cryptography; ElGamal; Iterative composite encryption algorithm; TEA; asymmetric encryption; symmetric encryption; Computational complexity; Computer science; Cryptography; Equations; Iterative algorithms; Iterative methods; Public key; Security; Uncertainty; ELGamal; TEA; TEAEG; composite encryption;
Conference_Titel :
Computer Science and Information Engineering, 2009 WRI World Congress on
Conference_Location :
Los Angeles, CA
Print_ISBN :
978-0-7695-3507-4
DOI :
10.1109/CSIE.2009.744