ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Triple Rounds to Protect Text Files

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.12, No. 4)

Publication Date:

Authors : ; ; ; ;

Page : 24-41

Keywords : Cryptography; CLMM; PK; key; MSE; PSNR; CC; throughput;

Source : Downloadexternal Find it from : Google Scholarexternal


Text file may be confidential and it can contain secret information that required protection from being hacked. In this research paper a simple method of text files cryptography will be introduced, this method will suit any text file with any size; the sequence of required operations will remain the same without any change even if we change the text file and the private key. The introduced method of data cryptography will provide a high level of security; the private key will provide a huge key space making the hacking process impossible. The private key will have a complicated structure with multiple components, these components are to be used to generate three keys needed to apply three rounds of encryption-decryption, the keys will be very sensitive to any minor changes, any changes in the private key components in the decryption phase will be considered as a hacking attempt. The private key will base on chaotic logistic map model to generate 2D chaotic keys. The proposed method will be implemented and the obtained results will be analyzed using various types of analysis to prove the efficiency enhancement provide by the proposed method.

Last modified: 2023-04-14 23:01:36