| The existing security equipment is usually fixed cryptographic algorithms on thedevice. This approach provides flexibility, subject to resource constraints, securityequipment cryptographic algorithm replacement cycle is long and disadvantages. In thispaper, the technical concept of the programmable cryptographic algorithms andsolutions in-depth study and research, learn from its design concept, of which less thanthe proposed solutions. The thesis is given a preliminary concept of the programmablecryptographic algorithms, and a brief description of the subject to carry out the purposeand significance, and programmable cryptographic algorithms, the current situation,introduce the concept of programmable cryptography at home and abroad relatedresearch. There is a programmable cryptography technology to do a more detailedpresentation and analysis, and give new ideas. Also analyzed the potential securitythreat facing the protection of the process of algorithm application of programmableinformation and appropriate protective measures for these potential security threats. Inthe theoretical study on the basis of detailed programmable algorithm simulation systemprototype design and validation of the proposed design, and results were analyzed,raised the prospect of further research.Programmable cryptographic algorithms can betimely and flexible manner to change the algorithms in the cryptographic equipment toprovide technical support so that the cryptographic module or cryptographic equipmentdeveloped with multi-level security encryption capabilities, shorten the cycle of designiterations of cryptographic equipment, easy to upgrade and easy to use management andadapt to the confidentiality of communications demand in the future.In this paper, theanalysis of the advantages and disadvantages of the existing domestic and foreignprogrammable cryptographic algorithm, a new programmable cryptographicalgorithms.The main content of this study include the following aspects:1) Domestic and foreign research track and learn to analyze the advantages anddisadvantages.2) At present, programmable cryptographic algorithms to track and study and analyze the advantages and disadvantages of various techniques.3) Programmable cryptographic algorithms and trends.4) A programmable protection algorithm in the confidentiality of a communicationprogram. |