Research Article
Mimic Encryption Box for Network Multimedia Data Security
| Input: A, B, n//n is the bit width | | Output: C | (1) | if (n = = 64) return C = A × B; | (2) | ; | (3) | ; | (4) | C1 = KOA (AH, BH, n/2); | (5) | C2 = KOA (AL, BL, n/2); | (6) | C3 = KOA (AH + AL, BH + BL, n/2); | (7) | C = C1 << n + (C3 – C2 – C1) << (n/2) + C2; |
|