OTP-Based Hybrid Cipher Using for Mobile e-Learning

Multimedia streaming a form of security through encryption, based on the format and parameters of different, there are many different forms. This paper presents a layered security fast encryption/decryption algorithm. Digital content confused by this proposed index and this research the operation of the stream-cipher encryption algorithms. The confusion index block is encrypted by the existing protection. The encryption and decryption can improve 8 to 10 times the performance and reduce the need to decrypt the user to pay for the waiting time to 1/12. This technique is applicable to the terminal device with low computing power to run. System security is equivalent to the existing encryption methods. There exist about 20kbits additional cost to the confusion for the index block encryption and transmissions.

[1]  Christof Paar,et al.  New Light-Weight Crypto Algorithms for RFID , 2007, 2007 IEEE International Symposium on Circuits and Systems.

[2]  Ghassan Al-Regib,et al.  Evaluation of selective encryption techniques for secure transmission of MPEG-compressed bit-streams , 1999, ISCAS'99. Proceedings of the 1999 IEEE International Symposium on Circuits and Systems VLSI (Cat. No.99CH36349).

[3]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[4]  Sandra Dominikus,et al.  Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.

[5]  Andreas Uhl,et al.  SELECTIVE BITPLANE ENCRYPTION FOR SECURE TRANSMISSION OF IMAGE DATA IN MOBILE ENVIRONMENTS , 2002 .

[6]  Lintian Qiao,et al.  A New Algorithm for MPEG Video Encryption , 2007 .

[7]  Ghassan Al-Regib,et al.  Improved selective encryption techniques for secure transmission of MPEG video bit-streams , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[8]  Xiaoyun Wang,et al.  How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.

[9]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[10]  Johannes Wolkerstorfer,et al.  Strong Crypto for RFID Tags - A Comparison of Low-Power Hardware Implementations , 2007, 2007 IEEE International Symposium on Circuits and Systems.

[11]  Marc Joye,et al.  Cryptographic Hardware and Embedded Systems - CHES 2004 , 2004, Lecture Notes in Computer Science.

[12]  Ronald Cramer,et al.  Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.

[13]  Enrico Magli,et al.  Selective encryption of JPEG 2000 images by means of randomized arithmetic coding , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..

[14]  Long Nguyen,et al.  ISO/IEC 9798−6. Information technology – Security techniques – Entity authentication – Part 6: Mechanisms using manual data transfer , 2010 .