Proceedings of the 2017 2nd International Conference on Control, Automation and Artificial Intelligence (CAAI 2017)

The Fountain-codes-based Encryption and Decryption Algorithm Research

Authors
Ming Hu, Wen Li, Fagao Yu, Xinrong Hu
Corresponding Author
Ming Hu
Available Online June 2017.
DOI
https://doi.org/10.2991/caai-17.2017.88How to use a DOI?
Keywords
fountain code; keys-lengths; encryption efficiency
Abstract
Fountain code uses randomized coding to ensure the reliability of data, the paper uses the randomized coding of fountain code to enhance the security of encryption algorithm. FEA is a symmetric encryption algorithm, and its keys-lengths are variable and expansive to meet users' requirement with the setting of keys-lengths according to the important degree of information, so users can effectively manage keys and information. FEA carries out encryption operation by table to reduce calculative amount and improve encryption efficiency, so it meets user's requirement with encryption efficiency.
Open Access
This is an open access article distributed under the CC BY-NC license.

Download article (PDF)

Proceedings
2017 2nd International Conference on Control, Automation and Artificial Intelligence (CAAI 2017)
Part of series
Advances in Intelligent Systems Research
Publication Date
June 2017
ISBN
978-94-6252-360-9
ISSN
1951-6851
DOI
https://doi.org/10.2991/caai-17.2017.88How to use a DOI?
Open Access
This is an open access article distributed under the CC BY-NC license.

Cite this article

TY  - CONF
AU  - Ming Hu
AU  - Wen Li
AU  - Fagao Yu
AU  - Xinrong Hu
PY  - 2017/06
DA  - 2017/06
TI  - The Fountain-codes-based Encryption and Decryption Algorithm Research
BT  - 2017 2nd International Conference on Control, Automation and Artificial Intelligence (CAAI 2017)
PB  - Atlantis Press
SP  - 386
EP  - 389
SN  - 1951-6851
UR  - https://doi.org/10.2991/caai-17.2017.88
DO  - https://doi.org/10.2991/caai-17.2017.88
ID  - Hu2017/06
ER  -