2021
DOI: 10.15587/1729-4061.2021.225508
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of modified GSO based magic cube keys generation in cryptography

Abstract: Over the last few decades, tremendous and exponential expansion in digital contents together with their applications has emerged. The Internet represents the essential leading factor for this expansion, which provides low-cost communication tools worldwide. However, the main drawback of the Internet is related to security problems. In order to provide secure communication, enormous efforts have been spent in the cryptographic field. Recently, cryptographic algorithms have become essential for increasing inform… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…The use of magic squares in encryption mainly depends on the known features of magic squares, but the difference is that the magic sum is not required to be equal for each row sum, column sum, or diameter sum [10].…”
Section: Previouly Existing Technologies That Have Been Relied Uponmentioning
confidence: 99%
See 1 more Smart Citation
“…The use of magic squares in encryption mainly depends on the known features of magic squares, but the difference is that the magic sum is not required to be equal for each row sum, column sum, or diameter sum [10].…”
Section: Previouly Existing Technologies That Have Been Relied Uponmentioning
confidence: 99%
“…Invertible matrix has been adopted in advanced encryption, which has been considered as a time-consuming process. The search based on magic squares has been developed to speed up time and get rid of the time consumption, and at the same time, it depends on matrices as well [10].…”
Section: Introductionmentioning
confidence: 99%
“…The implementation of cryptography has helped different information forms for being legally accessed via an authentic user with the assist of its typical processes of encryption. But, there are several differences when implementing encryption on ordinary files and on digital images [11]. The pixels' contents inside any digital image are infinite and so, the encryption algorithm relies on the sampling process as well.…”
Section: Lightweight Cryptographic Algorithmsmentioning
confidence: 99%