[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3661638.3661660acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaisnsConference Proceedingsconference-collections
research-article

Research of Hybrid Encryption Algorithm with RSA and improved SM4

Published: 01 June 2024 Publication History

Abstract

With the development of information technology, information security has gradually become the focus that can't be ignored. Information Protection has become an important part of people's work. The encryption technology has the vital significance to the information protection [1]. Cryptography is the core component of information security technology. With the development of cryptography, the single-system cryptosystem has reached the bottleneck, and the hybrid encryption and decryption system has been paid more and more attention. This paper presents a hybrid encryption algorithm based on improved SM4 algorithm and RSA algorithm. This method combines the advantages of symmetric cryptography and public key cryptography to ensure the security of large data encryption. At the same time, it improves the problem of key management and distribution, and makes up for the limitations of a single cryptographic algorithm. This algorithm is a faster and more secure encryption and decryption algorithm.

References

[1]
Manish G, Kamlesh K G, Plyush K S. Session key based fast, secure and lightweight image encryption algorithm[J]. Multimedia Tools and Applications, 2021 (80): 10391–10416
[2]
Faten H M S A, Huda A M, Nevart A M. Speed Up Image Encryption by Using RSA Algorithm[C]. 6th International Conference on Advanced Computing and Communication Systems (ICACCS), 2020: 1302-1307.
[3]
Chen J, You F. An image encryption algorithm based on SM4 and Base64[C]Journal of Physics: Conference Series. IOP Publishing, 2021, 1812(1): 012041.
[4]
Jin Y, Shen H, You R. Implementation of SMS4 Block Cipher on FPGA[C]. First International Conference on Communications and NETWORKING in China. IEEE, 2006. 1-4.
[5]
Kwon H, Kim H, Eum S, Optimized implementation of SM4 on AVR microcontrollers, RISC-V mrocessors, and ARM processors[J]. IEEE Access, 2022, 10: 80225-80233
[6]
He Shiyang, Li Hui, Li Fenghua. Optimization and implementation of the SM4 on FPGA [J]. Journal of Xidian University, 2021, 48 (3): 155-162.
[7]
SUN Y, XU J F, WANG Y, Encryption scheme of Beidou short messages based on national secret algorithm[J]. Data Communications, 2022 (2):1-3.
[8]
O. jha, N, Padhye S. Cryptanalysis of Multi Prime RSA with Secret Key Greater than Public Key[J].International Journal of Network Security, 2014, 16 (1):53-57
[9]
Atsushi Taka ya su, Yao Lu, Li Qiang-peng. Small CRT-Exponent RSA Revisited[J]. Journal of Cryptology, 2019, 32 (4).
[10]
Zhang Lei, Zhang Wen-tao, Wu Wen-ling. Cryptanalysis of reduced-round SM4 block cipher [C] //Proc of ACISP 2008. Berlin: Springer, 2008: 216-229
[11]
Zao X, Yin-chenguang L, JIAOZI W, Sensitivity of energy eigenstates to perturbation in quantum integrable and chaotic systems[J]. Communications in Theoretical Physics, 2021, 73 (01): 44-48
[12]
CHEN L, YIN H,HUANG T, etal. Chaos in fractional-order discrete neural networks with application to image encryption[J]. Neural Networks, 2020, 125:174-184.
[13]
Suo S, Cui C,Jian G, Implementation of the high-speed sm4 cryptographic algorithm based on random pseudo rounds[C]2020 IEEE International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA). IEEE, 2020, 1:112-117
[14]
HSIAO F H. Chaotic synchronization cryptosystems combined with RSA encryption algorithm[J].Fuzzy Sets and Systems, 2018, 342:109-137.
[15]
CHEN Chen, GUO Hua, A Fast Software Implementation of SM4 Based on Composite Fields[J]. Journal of Cryptologic Research, 2023, 10(2): 289–305.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
AISNS '23: Proceedings of the 2023 International Conference on Artificial Intelligence, Systems and Network Security
December 2023
467 pages
ISBN:9798400716966
DOI:10.1145/3661638
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 2024

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

AISNS 2023

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 19
    Total Downloads
  • Downloads (Last 12 months)19
  • Downloads (Last 6 weeks)2
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media