期刊名称:International Journal of Advanced Research In Computer Science and Software Engineering
印刷版ISSN:2277-6451
电子版ISSN:2277-128X
出版年度:2013
卷号:3
期号:11
出版社:S.S. Mishra
摘要:Personal privacy is of utmost importance in the global networked world. One of the best tools to help people safeguard their personal information is the use of cryptography. The IDEA algorithm is an interesting one. It consists of a certain number of steps which, primarily, make it seem like having a non -reversible hash function in place of a block cipher. IDEA utilizes 52 sub keys, each of which is 16 bits long. Two bits are employed during each proper round while four are utilized prior to each round and after the completion of the last one. It has a total of eight rounds. The block plain text of IDEA is split i nto four separate 16 bit-long quarters. Three functions are employed in IDEA to bring together two 16 bit values to create a 16 bit outcome, totaling, XOR and multiplication. For decryption of data encoded with IDEA, the receiving machine's connection needs to identify a ma tching IDEA key, the key phrase of which can be even 255 characters long. IDEA encryption is considerably quicker and usually thought to be significantly more secure than any DES encryption. Depending on the fastness of a CPU, any permutation of DES, IDEA and key file encryption ca n be successfully enabled. To measure the power of IDEA against differential crypto analysis, designers have conducted repeated and thorough analyses and the research co mmunity has brought it under numerous attacks at the time of rigorous testing. It was found that IDEA is indeed safe and protected under most assumptions. This is because no weak links, be of the algebraic or linear kinds have been found in IDEA. IDEA is one of the most secure and fastest algorithms that the public could possibly use
关键词:Cryptographic Algorithm; ;International data encryption algorithm(IDEA);etc