Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1)
  • Open Access

    ARTICLE

    Triple Key Security Algorithm Against Single Key Attack on Multiple Rounds

    Muhammad Akram1, Muhammad Waseem Iqbal2,*, Syed Ashraf Ali3, Muhammad Usman Ashraf4, Khalid Alsubhi5, Hani Moaiteq Aljahdali6

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 6061-6077, 2022, DOI:10.32604/cmc.2022.028272

    Abstract In cipher algorithms, the encryption and decryption are based on the same key. There are some limitations in cipher algorithms, for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwise it will be repeated and if the key is known then encryption becomes useless. This paper aims to improve the said limitations by designing of Triple key security algorithm (TKS) in which the key is modified on polyalphabetic substitution cipher to maintain the size of the key and plaintext. Each plaintext character is substituted by an alternative message. The mode of substitution is transformed cyclically… More >

Displaying 1-10 on page 1 of 1. Per Page