Skip to main content

2018 | OriginalPaper | Buchkapitel

Optimization of AES and RSA Algorithm and Its Mixed Encryption System

verfasst von : Jia Liu, Chunlei Fan, Xingyu Tian, Qun Ding

Erschienen in: Advances in Intelligent Information Hiding and Multimedia Signal Processing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

An improved key expansion method is proposed to improve the security performance in AES key expansion. There is large difference of operation time between Mixcolumns and Inverse Mixcolumns, we propose the simplest form of MixColumn and InvMixColumn operation on finite field \(GF(2^{N})\) which consumes same computing resources in the process of encryption and decryption. In terms of the defection of RSA operation efficiency, traditional double prime number is replaced by four prime number, Chinese remainder theorem combined with Montgomery modular multiplication is also presented to optimize modular exponentiation. On this basis, we adopt message digest, digital signature, digital envelope and other technologies to build a mixed encryption system which encompasses convenient key management and high-efficiency encryption and decryption, combined with the advantages of AES and RSA. The experimental results show that optimized algorithm has high speed and feasibility.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wenling, W., Dengguo, F.: Research status of block cipher mode. Chin. J. Comput. 29, 22–25 (2006) Wenling, W., Dengguo, F.: Research status of block cipher mode. Chin. J. Comput. 29, 22–25 (2006)
2.
Zurück zum Zitat Qiuyu, Z., Pengfei, X., Yibo, H., Ruihong, D.: An efficient speech perceptual hashing authentication algorithm based on wavelet packet decomposition. J. Inf. Hiding Multimed. Sig. Process. 6, 311–322 (2015) Qiuyu, Z., Pengfei, X., Yibo, H., Ruihong, D.: An efficient speech perceptual hashing authentication algorithm based on wavelet packet decomposition. J. Inf. Hiding Multimed. Sig. Process. 6, 311–322 (2015)
3.
Zurück zum Zitat Guihua, C., Xuemei, Q., Yonglong, L.: Polynomial modulo operation in AES algorithm and its performance analysis. Comput. Technol. Dev. 20, 115–118 (2010) Guihua, C., Xuemei, Q., Yonglong, L.: Polynomial modulo operation in AES algorithm and its performance analysis. Comput. Technol. Dev. 20, 115–118 (2010)
4.
Zurück zum Zitat Wiener, M.J.: Cryptoanalysis of short RSA secret exponents. IEEE Inf. Theory Soc. 36, 553–558 (1990)CrossRefMATH Wiener, M.J.: Cryptoanalysis of short RSA secret exponents. IEEE Inf. Theory Soc. 36, 553–558 (1990)CrossRefMATH
5.
Zurück zum Zitat Boneh, D., Durffe, G.: Cryptanalysis of RSA with private key d less than \(N^{0.292}\). IEEE Inf. Theory Soc. 46, 1339–1349 (2000)MathSciNetCrossRef Boneh, D., Durffe, G.: Cryptanalysis of RSA with private key d less than \(N^{0.292}\). IEEE Inf. Theory Soc. 46, 1339–1349 (2000)MathSciNetCrossRef
6.
Zurück zum Zitat Keying, H.: Research on Improved RSA Algorithm. University of Electronic Science and Technology, Chengdu (2010) Keying, H.: Research on Improved RSA Algorithm. University of Electronic Science and Technology, Chengdu (2010)
7.
Zurück zum Zitat Yang, B.: Modern Cryptography. Tsinghua University Press, Beijing (2007)MATH Yang, B.: Modern Cryptography. Tsinghua University Press, Beijing (2007)MATH
8.
Zurück zum Zitat Xiaofei, F., Huanying, H.: Security analysis of CRT - RSA algorithm. Microcomput. Inf. 25, 36–38 (2009) Xiaofei, F., Huanying, H.: Security analysis of CRT - RSA algorithm. Microcomput. Inf. 25, 36–38 (2009)
9.
Zurück zum Zitat An, W.: A Fast Implementation of RSA Public Key Cryptography. Shandong University, Jinan (2008) An, W.: A Fast Implementation of RSA Public Key Cryptography. Shandong University, Jinan (2008)
10.
Zurück zum Zitat Gongliang, C.: Information Security Mathematical Basis. Tsinghua University Press, Beijing (2011) Gongliang, C.: Information Security Mathematical Basis. Tsinghua University Press, Beijing (2011)
11.
Zurück zum Zitat Stalling, W.: Cryprography and Network Security Principles and Practice. Publishing House of Eletronics Industry, Beijing (2011) Stalling, W.: Cryprography and Network Security Principles and Practice. Publishing House of Eletronics Industry, Beijing (2011)
12.
Zurück zum Zitat Couveigne, J.M., Ezome, T., Lercier, R.: A faster pseudo-primality test. Rendiconti del Circolo Matematico di Palermo 61, 261–278 (2012)MathSciNetCrossRefMATH Couveigne, J.M., Ezome, T., Lercier, R.: A faster pseudo-primality test. Rendiconti del Circolo Matematico di Palermo 61, 261–278 (2012)MathSciNetCrossRefMATH
Metadaten
Titel
Optimization of AES and RSA Algorithm and Its Mixed Encryption System
verfasst von
Jia Liu
Chunlei Fan
Xingyu Tian
Qun Ding
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-63859-1_48