Loading [MathJax]/extensions/MathZoom.js
Axes-Based Encryption Key | IEEE Conference Publication | IEEE Xplore

Abstract:

Security has always been a privilege for governments and banks, from the old Egyptian civilization to the latest technologies. Nowadays, security has become an essential ...Show More

Abstract:

Security has always been a privilege for governments and banks, from the old Egyptian civilization to the latest technologies. Nowadays, security has become an essential part in our daily life; from protecting mobile chats to bank accounts to confidential data. It is everywhere due to the huge amount of data stored and transmitted over public and unsecure networks. On the other hand, computers are advancing so fast that some cryptosystems may vanish in the upcoming years. For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. The approach is based on concepts: transforming data, distributing data, and XORing it with other data. Several algorithms are applied to serve the goal, and promising results have been recuperated. Security has been maximized although there are limits concerning time and space.
Date of Conference: 28 October 2018 - 01 November 2018
Date Added to IEEE Xplore: 17 January 2019
ISBN Information:

ISSN Information:

Conference Location: Aqaba, Jordan

I. Introduction

Cryptography is where security engineering meets mathematics. It provides us with the tools that underlie most modern security protocols [1]. Cryptography includes data encryption and decryption using a key. While encryption transforms a plaintext into an incomprehensible cipher text, decryption reverses the process. Almost all life fields use secure systems to store and transfer data: banking, military, wireless sensor network, communication and embedded systems, etc. Along history, many algorithms have been used; Caesar cipher is known as the first cryptography algorithm, it consists on shifting the letters of a message by three using alphabetical order to obtain an encrypted message. Also, many machines were used to decipher telegrams during the wars; for instance, the German Enigma and the Japanese Purple [2].

References

References is not available for this document.