{"title":"Security Cryptanalysis in High-Order Improved Fast Encryption Algorithm for Multimedia","authors":"Shiuh-Jeng Wang, Hung Hsuan Chen, Pin-You Chen, Yuh-Ren Tsai","doi":"10.1109/FGCN.2007.199","DOIUrl":null,"url":null,"abstract":"This paper describes the rapid multimedia encryption method (fast encryption algorithm for multimedia FEA-M) and the evolutions of encryption, decryption structure. In present paper the method to analyze and explain for the latest encryption laws has already been advanced. This paper presents an improved way to increase strength and toughness to improve the security of encryption to make it difficult to break through such attacks. In addition, this paper will refer to the background utilized by FEA-M over the years and its attack methodologies and enhancements.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Future Generation Communication and Networking (FGCN 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FGCN.2007.199","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
This paper describes the rapid multimedia encryption method (fast encryption algorithm for multimedia FEA-M) and the evolutions of encryption, decryption structure. In present paper the method to analyze and explain for the latest encryption laws has already been advanced. This paper presents an improved way to increase strength and toughness to improve the security of encryption to make it difficult to break through such attacks. In addition, this paper will refer to the background utilized by FEA-M over the years and its attack methodologies and enhancements.