{"title":"RC6算法的并行实现","authors":"Artan Berisha, Hektor Kastrati","doi":"10.32996/jcsts.2021.3.2.1","DOIUrl":null,"url":null,"abstract":"Data security is very important in the field of Computer Science. In this paper the encryption algorithm called RC6 will be analyzed and its standard and parallel implementation will be done. \nFirst the field of Cryptology is discussed in general terms, then the classification of encryption algorithms according to operation and techniques is explained. \nRC6 is a symmetric block algorithm derived from the RC5 algorithm. RC6 operates on 128-bit blocks and accepts 128, 192, 256-bit keys until 2040 bytes. In the Advanced Encryption Standard (AES) competition, RC6 managed to rank among the five finalists. \nThe structure of the RC6 algorithm will be analyzed also the encryption and decryption methods. The comparison between standard and parallel implementation will be made.","PeriodicalId":417206,"journal":{"name":"Journal of Computer Science and Technology Studies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Parallel impelementation of RC6 algorithm\",\"authors\":\"Artan Berisha, Hektor Kastrati\",\"doi\":\"10.32996/jcsts.2021.3.2.1\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data security is very important in the field of Computer Science. In this paper the encryption algorithm called RC6 will be analyzed and its standard and parallel implementation will be done. \\nFirst the field of Cryptology is discussed in general terms, then the classification of encryption algorithms according to operation and techniques is explained. \\nRC6 is a symmetric block algorithm derived from the RC5 algorithm. RC6 operates on 128-bit blocks and accepts 128, 192, 256-bit keys until 2040 bytes. In the Advanced Encryption Standard (AES) competition, RC6 managed to rank among the five finalists. \\nThe structure of the RC6 algorithm will be analyzed also the encryption and decryption methods. The comparison between standard and parallel implementation will be made.\",\"PeriodicalId\":417206,\"journal\":{\"name\":\"Journal of Computer Science and Technology Studies\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-06-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Computer Science and Technology Studies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.32996/jcsts.2021.3.2.1\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer Science and Technology Studies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32996/jcsts.2021.3.2.1","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data security is very important in the field of Computer Science. In this paper the encryption algorithm called RC6 will be analyzed and its standard and parallel implementation will be done.
First the field of Cryptology is discussed in general terms, then the classification of encryption algorithms according to operation and techniques is explained.
RC6 is a symmetric block algorithm derived from the RC5 algorithm. RC6 operates on 128-bit blocks and accepts 128, 192, 256-bit keys until 2040 bytes. In the Advanced Encryption Standard (AES) competition, RC6 managed to rank among the five finalists.
The structure of the RC6 algorithm will be analyzed also the encryption and decryption methods. The comparison between standard and parallel implementation will be made.