An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms

被引:2
作者
Nadeem, Muhammad [1 ]
Arshad, Ali [2 ]
Riaz, Saman [2 ]
Zahra, Syeda Wajiha [1 ]
Dutta, Ashit Kumar [3 ]
Al Moteri, Moteeb [4 ]
Almotairi, Sultan [5 ]
机构
[1] Abasyn Univ, Dept Comp, Islamabad, Pakistan
[2] Natl Univ Technol, Dept Comp Sci, Islamabad, Pakistan
[3] AlMaarefa Univ, Coll Appl Sci, Dept Comp Sci & Informat Syst, Riyadh 13713, Saudi Arabia
[4] King Saud Univ, Business Adm Coll, Dept Management Informat Syst, Riyadh 11451, Saudi Arabia
[5] Majmaah Univ, Fac Community Coll, Dept Nat & Appl Sci, Majmaah 11952, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 74卷 / 02期
关键词
Symmetric; cryptography; ciphertext; encryption; decryption; cloud security; matrix cipher; DATA-SECURITY; CLOUD;
D O I
10.32604/cmc.2023.032882
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form. Cloud cryptography is a data encryption mechanism that consists of different steps and prevents the attacker from misusing the data. This paper has developed an efficient algorithm to protect the data from invaders and secure the data from misuse. If this algorithm is applied to the cloud network, the attacker will not be able to access the data. To encrypt the data, the values of the bytes have been obtained by converting the plain text to ASCII. A key has been generated using the Non-Deterministic Bit Generator (NRBG) mechanism, and the key is XNORed with plain text bits, and then Bit toggling has been implemented. After that, an efficient matrix cipher encryption algorithm has been developed, and this algorithm has been applied to this text. The capability of this algorithm is that with its help, a key has been obtained from the plain text, and only by using this key can the data be decrypted in the first steps. A plain text key will never be used for another plain text. The data has been secured by implementing different mechanisms in both stages, and after that, a ciphertext has been obtained. At the end of the article, the latest technique will be compared with different techniques. There will be a discussion on how the present technique is better than all the other techniques; then, the conclusion will be drawn based on comparative analysis.
引用
收藏
页码:4059 / 4079
页数:21
相关论文
共 28 条
[1]  
Abdullah MZ, 2017, I C ENG TECHNOL
[2]  
Ahmad Sagheer., 2019, 2019 IEEE HOT CHIPS, P1, DOI DOI 10.1109/HOTCHIPS.2019.8875639
[3]   Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey [J].
Ahmad, Waqas ;
Rasool, Aamir ;
Javed, Abdul Rehman ;
Baker, Thar ;
Jalil, Zunera .
ELECTRONICS, 2022, 11 (01)
[4]  
Al-Shabi M. A., 2019, INT J SCI RES PUBLIC, V9, P576
[5]  
Al-Shabi M. A., 2021, J PHYS C SERIES, V1899, P1
[6]  
Alawiyah T., 2020, J PHYS C SERIES, V1641, P1
[7]  
Biswas C., 2019, 2019 INT C EL COMP C, P1, DOI [10.1109/ECACE.2019.8679136, DOI 10.1109/ECACE.2019.8679136]
[8]  
Boland D., 2020, ARTICLE REGARDING AM
[9]  
Chinnasamy P, 2018, PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), P1717, DOI 10.1109/ICICCT.2018.8473107
[10]  
Dahanukar DS, 2021, International Journal of Advanced Research in Science Communication and Technology, P108, DOI 10.48175/ijarsct-2156