I. Introduction
With the rapid development of big data and cloud computing, information networks have entered the era of big data, and information security has been given more attention. At the same time, the rapid development of cryptanalysis technology and information technology has had a great impact on the security of cryptographic algorithms. Traditional symmetric and asymmetric encryption methods cannot guarantee the speed of large data transmission and the confidentiality of information at the same time, so it has become a new research direction in the field of cryptography to adopt different cryptographic algorithm design methods.