Open Access iconOpen Access


Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks

Muhammad Nadeem1, Ali Arshad2, Saman Riaz2, Syeda Wajiha Zahra1, Shahab S. Band3, Amir Mosavi4,5,6,*

1 Department of Computer Science, Abasyn University, Islamabad, 44000, Pakistan
2 Department of Computer Science, National University of Technology, Islamabad, 44000, Pakistan
3 Future Technology Research Center, National Yunlin University of Science and Technology, Douliu, Yunlin, 64002, Taiwan
4 Institute of Information Society, University of Public Service, Budapest, 1083, Hungary
5 John Von Neumann Faculty of Informatics, Obuda University, Budapest, Hungary
6 Institute of Information Engineering, Automation and Mathiltics, Slovak University of Technology in Bratislava, Slovakia

* Corresponding Author: Amir Mosavi. Email:

Computers, Materials & Continua 2023, 74(2), 2625-2640.


Many organizations have insisted on protecting the cloud server from the outside, although the risks of attacking the cloud server are mostly from the inside. There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks. Still, the attackers have designed even better mechanisms to break these security algorithms. Cloud cryptography is the best data protection algorithm that exchanges data between authentic users. In this article, one symmetric cryptography algorithm will be designed to secure cloud server data, used to send and receive cloud server data securely. A double encryption algorithm will be implemented to send data in a secure format. First, the XOR function will be applied to plain text, and then salt technique will be used. Finally, a reversing mechanism will be implemented on that data to provide more data security. To decrypt data, the cipher text will be reversed, salt will be removed, and XOR will be implemented. At the end of the paper, the proposed algorithm will be compared with other algorithms, and it will conclude how much better the existing algorithm is than other algorithms.


Cite This Article

APA Style
Nadeem, M., Arshad, A., Riaz, S., Zahra, S.W., Band, S.S. et al. (2023). Two layer symmetric cryptography algorithm for protecting data from attacks. Computers, Materials & Continua, 74(2), 2625-2640.
Vancouver Style
Nadeem M, Arshad A, Riaz S, Zahra SW, Band SS, Mosavi A. Two layer symmetric cryptography algorithm for protecting data from attacks. Comput Mater Contin. 2023;74(2):2625-2640
IEEE Style
M. Nadeem, A. Arshad, S. Riaz, S.W. Zahra, S.S. Band, and A. Mosavi "Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks," Comput. Mater. Contin., vol. 74, no. 2, pp. 2625-2640. 2023.

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1146


  • 480


  • 0


Share Link