| There are two major ciphes in cryptology symmetric key and asymmetric key asymmetric key . Symmetric key encipher merit is quickly encryption speed , it' s demerit is same encryption key and decryption key , the keys can' t be transfered in unreliable chunnels. Asymmetric key encipher merit is differt encryption key and decryption key , the keys can be transfered in unreliable chunnels, it' s demerit is lowly encryption speed . Based on the foregoing actuality , research a new encryption which has quickly encrypt speed and good security has been became a most intresting Problem for many scholars. The research work in this papper is to solve this problem.This article investigatione major encloses :1 ) Researched cryptological basic idea and symmetric key encryption algorithm encipher fundamentals , analysed streams encipher capability and limitation , that it has good encrypt performance and quickly encrypt speed . gave out improved symmetric key encryption algorithm .2) Researched transposition encryption algorithm basic idea and transposition fundamentals, analysed transposition encipher capability and limitation, that it is belong to symmetric key algorithm , the transposition fundamentals are simply, performs are easier, gave out improved transposition encryption algorithm.3 ) Researched asymmetric key encryption algorithm basic idea , as well as elliptic curve encipher fundamentals , explorated investigation Elliptic Curve Encryption algorithm performance , corrected in some respects about improved elliptic curve encryption algorithm.4 ) Researched the fusion probability about streams encipher and elliptic curve encipher , streams encipher is belong to symmetric key , it' s feature is quickly encryption speed , it' s inadequacy is that the key can' t be transfered in unreliable tunnels ; Elliptic curve encryption is belong to asymmetric key , it' s feature is public key can transfered in unreliable channels , has more high security. It' s inadequacy is lower encryption speed ; consider both feature about streams encipher and elliptic curve encipher , encryption process would divided into two steps to carry out , brings up a fresher Triaxiality CA Stream Encipher Algorithms Use Ellipse Curve Cipher Key(ECCTCA), analysed some significance natures about the fusion algorithm, and performanced the fusion algorithm. |