Hackers should be prevented from disclosing sensitive data when sent from one device to another over the network. Therefore, the proposed method was established to prevent the attackers from exploiting the vulnerabilities of the redundancy in the ciphertext and enhances the substitution and permutation operations of the encryption process the solution was performed by eliminates these duplicates by hiding the ciphertext into a submatrix 4x4 that chooses randomly from magic square 16x16 in each ciphering process. Two techniques of encrypted and hiding were executed in the encryption stage by using a magic square size 3×3 and Latin square size 3x3 to providing more permutation and also to ensure an inverse matrix of decryption operation be av...
This paper represents a developed cryptographic information protection algorithm based on an substit...
This paper proposes a new block encryption algorithm for cryptographic information protection. It de...
At the heart of the creation of modern cryptographic systems is the use of cryptographic primitives....
Digital communication is becoming an essential part of modern way of life. In some cases it is desir...
At present, security is significant for individuals and organizations. All information need security...
Secured Communication involves Encryption process at the sending end and Decryption process at the r...
Secured Communication involves Encryption process at the sending end and Decryption process at the r...
Cloud cryptography is the art of converting plain text into an unreadable format, which protects dat...
The efficiency of a cryptographic algorithm is based on its time taken for encryption / decryption ...
This paper describes the development of encryption algorithms using the magic square of order 5 and ...
In this paper conventional Playfair Cipher is being modified by encrypting the plaintext in blocks. ...
There are some good combinatorial structures suitable for image encryption. In this study, a new cha...
AbstractSecurity has become an inseparable issue as information technology is of vital importance. I...
The Hill cipher, also known as matrix encryption, is a polygraphic substitution cipher, developed by...
In this study an encryption/decryption algorithm is proposed and developed. The developed algorithm ...
This paper represents a developed cryptographic information protection algorithm based on an substit...
This paper proposes a new block encryption algorithm for cryptographic information protection. It de...
At the heart of the creation of modern cryptographic systems is the use of cryptographic primitives....
Digital communication is becoming an essential part of modern way of life. In some cases it is desir...
At present, security is significant for individuals and organizations. All information need security...
Secured Communication involves Encryption process at the sending end and Decryption process at the r...
Secured Communication involves Encryption process at the sending end and Decryption process at the r...
Cloud cryptography is the art of converting plain text into an unreadable format, which protects dat...
The efficiency of a cryptographic algorithm is based on its time taken for encryption / decryption ...
This paper describes the development of encryption algorithms using the magic square of order 5 and ...
In this paper conventional Playfair Cipher is being modified by encrypting the plaintext in blocks. ...
There are some good combinatorial structures suitable for image encryption. In this study, a new cha...
AbstractSecurity has become an inseparable issue as information technology is of vital importance. I...
The Hill cipher, also known as matrix encryption, is a polygraphic substitution cipher, developed by...
In this study an encryption/decryption algorithm is proposed and developed. The developed algorithm ...
This paper represents a developed cryptographic information protection algorithm based on an substit...
This paper proposes a new block encryption algorithm for cryptographic information protection. It de...
At the heart of the creation of modern cryptographic systems is the use of cryptographic primitives....