This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
2009 WRI World Congress on Computer Science and Information Engineering
Iterative Composite Encryption Algorithm Based on Tea and Elgamal
Los Angeles, California USA
March 31-April 02
ISBN: 978-0-7695-3507-4
Complex structure and low efficiency are the deficiencies exist in the traditional composite encryption algorithm. This paper comes up with an iterative composite encryption algorithm based on TEA and ELGamal. ElGalam is applied to the encryption process using TEA 32-time Cyclic Iteration by group. This kind of algorithm has better encryption efficiency and higher encryption strength together with smaller amount of keys, simpler operation and more convenient modification method, it totally adapts to an environment which requires high level of security but low consumption of system resource.
Index Terms:
composite encryption, TEA, ELGamal, TEAEG
Citation:
Qiu Bing-cheng, Yao Yang-xin, Zhang Xi-min, Chen Yin-dong, "Iterative Composite Encryption Algorithm Based on Tea and Elgamal," csie, vol. 1, pp.435-438, 2009 WRI World Congress on Computer Science and Information Engineering, 2009
Usage of this product signifies your acceptance of the Terms of Use.