Message Binary Matrix Reshaping and Rotating Left to Encrypt-Decrypt Secret Message
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.13, No. 2)Publication Date: 2024-02-28
Authors : E. Bassam Moh'd Saleem Subaih; E. Mazen Abdel Aziz Hamdan; Ziad AlQadi;
Page : 46-57
Keywords : SM; cryptography; PK; blocking; MBM; reshaping; ROTL;
Abstract
Secret messages are the most circulated via communication environments digital data, these messages may be secret, private, and the communication environment may unsafe, so they need protection from being hacked. In this paper research a simple method of message cryptography will be proposed, the method will use one round and simplified set of instruction to apply message encryption-decryption. The method will use a simple private key to determine the reshaping factor and the number of rotating left digits. The message binary matrix will be reshaped to a number of columns equal the reshaping factor, and each columns will be rotated left for a selected number of digits to apply message encryption-decryption. The reshaping factor will be tested to show the best choice of the reshaping factor, which will provide the best performance, the message length will be tested and some recommendations will be provided. The quality of the proposed method will tested by implementing various messages and examining the quality parameters values to prove that the proposed method will satisfy the quality requirements of good crypto system.
Other Latest Articles
- Proposed LSB4 of Data Steganography
- Efficacy and Contextual Dimensions of Task-Based Language Teaching: A Study on Bangladeshi Learners'
- IMPACT OF ANTIMICROBIAL STEWARDSHIP PROGRAMMES ONBACTERIAL RESISTANCE LEVEL IN THE UAE: A SYSTEMATICREVIEW
- MICROPHOTOGRAPHY- A REVIEW
- ASSESSMENT OF RADIATION RISK LEVELS ASSOCIATED WITH NATURAL (226RA, 232TH, AND 40K) AND ARTIFICIAL (137CS) RADIONUCLIDES PRESENT IN POWDERED MILK SOLD AND CONSUMED IN SENEGAL
Last modified: 2024-02-19 14:57:09