Beruflich Dokumente
Kultur Dokumente
Algorithm
CS-627-1
Fall 2004
By
How-Shen Chang
International Data Encryption Algorithm 2
Table of Contents:
Introduction..........................................................................................................................3
Description of IDEA............................................................................................................3
Key Generation....................................................................................................................4
Encryption............................................................................................................................4
Decryption............................................................................................................................5
Modes of operation..............................................................................................................5
Weak keys for IDEA............................................................................................................6
Implementation....................................................................................................................6
Applications.........................................................................................................................7
Conclusion...........................................................................................................................8
International Data Encryption Algorithm 3
Introduction
Description of IDEA
Key Generation
Encryption
International Data Encryption Algorithm 5
Decryption
Implementation
Applications
– Audio and video data for cable TV, pay TV, video
conferencing, distance learning, business TV, VoIP
– Sensitive financial and commercial data
– Email via public networks
– Transmission links via modem, router or ATM link, GSM
technology
– Smart cards
Conclusion
Bibliography
[8] M.P. Leong, O.Y.H. Cheung, K.H. Tsoi and P.H.W. Leong,
“A Bit-Serial Implementation of the International Data
Encryption Algorithm IDEA,” 2000 IEEE Symposium on Field-
Programmable Custom Computing Machines, IEEE (2000), pp.
122-131.