The Fountain-codes-based Encryption and Decryption Algorithm Research
Authors
Ming Hu, Wen Li, Fagao Yu, Xinrong Hu
Corresponding Author
Ming Hu
Available Online June 2017.
- DOI
- 10.2991/caai-17.2017.88How to use a DOI?
- Keywords
- fountain code; keys-lengths; encryption efficiency
- Abstract
Fountain code uses randomized coding to ensure the reliability of data, the paper uses the randomized coding of fountain code to enhance the security of encryption algorithm. FEA is a symmetric encryption algorithm, and its keys-lengths are variable and expansive to meet users' requirement with the setting of keys-lengths according to the important degree of information, so users can effectively manage keys and information. FEA carries out encryption operation by table to reduce calculative amount and improve encryption efficiency, so it meets user's requirement with encryption efficiency.
- Copyright
- © 2017, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Ming Hu AU - Wen Li AU - Fagao Yu AU - Xinrong Hu PY - 2017/06 DA - 2017/06 TI - The Fountain-codes-based Encryption and Decryption Algorithm Research BT - Proceedings of the 2017 2nd International Conference on Control, Automation and Artificial Intelligence (CAAI 2017) PB - Atlantis Press SP - 386 EP - 389 SN - 1951-6851 UR - https://doi.org/10.2991/caai-17.2017.88 DO - 10.2991/caai-17.2017.88 ID - Hu2017/06 ER -