Research Article

Mimic Encryption Box for Network Multimedia Data Security

Algorithm 1

KOA multiplication.
Input: A, B, n//n is the bit width
Output: C
(1)if (n = = 64) return C = A × B;
(2);
(3);
(4)C1 = KOA (AH, BH, n/2);
(5)C2 = KOA (AL, BL, n/2);
(6)C3 = KOA (AH + AL, BH + BL, n/2);
(7)C = C1 << n + (C3 – C2 – C1) << (n/2) + C2;