{"title":"A block cipher based on Boolean matrices using bit level operations","authors":"P. VidhyaSaraswathi, M. Venkatesulu","doi":"10.1109/ICIS.2014.6912108","DOIUrl":null,"url":null,"abstract":"The security of multimedia data especially in video on demand and video conferencing applications are more important over networks. Traditional algorithms like DES, AES and IDEA are not suitable for real time applications because of large data size. From the process architecture view point, the bit level operations have ability to design very fast encryption algorithms and to secure next generation multimedia processing. This paper proposes a block cipher based on Boolean matrix theory and bit level permutation operations. The cipher is so designed that it can be implemented in hardware and software.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIS.2014.6912108","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The security of multimedia data especially in video on demand and video conferencing applications are more important over networks. Traditional algorithms like DES, AES and IDEA are not suitable for real time applications because of large data size. From the process architecture view point, the bit level operations have ability to design very fast encryption algorithms and to secure next generation multimedia processing. This paper proposes a block cipher based on Boolean matrix theory and bit level permutation operations. The cipher is so designed that it can be implemented in hardware and software.