ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: Science and world (Vol.1, No. 68)

Publication Date:

Authors : ;

Page : 58-62

Keywords : complementary number; security; frequency attack; Encryption.;

Source : Downloadexternal Find it from : Google Scholarexternal


The role of mathematics in all fields of science is very clear; one of these areas is data security. In this paper, a method of coding data based on a simple mathematical process is proposed. This method depends on the use of the complementary number, which represents the key. The encrypted message, which is a series of numbers, is sent via the transmitter channel, the recipient of the encrypted message extract the explicit text from the encrypted message using the value of the complement. This method has been tested using many testing tools like decimalization attack, M-138 attack, factorization attack. The results show the strength of the proposed encryption algorithm.

Last modified: 2019-04-30 18:36:18