2020
DOI: 10.19072/ijet.755570
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Fast Encryption Routine+: Evaluation by Software Application

Abstract: Nowadays, the Internet era and its components are based on the collection, exchange, and storage of information which represent a sever security concern. Many cipher algorithms have been developed, evaluated, and implemented to increase the protection of data for various applications. The most known strategy of data securing has been the implementation of symmetrical key encryption standards. Secrecy, robustness, reliability, and software/ hardware implementation, are among the most important properties of goo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 12 publications
(11 reference statements)
0
1
0
Order By: Relevance
“…M is a predefined invertable (16×16) matrix used as base for the final transformation stage in every round to ensure the fast diffusion and to make the algorithm resistant to differential cryptanalysis [32]. The decryption process begins with the input transformation layer operating on the ciphertext and the key K 2R+1 with a subtraction (sub) as the inverse operation of add and xor operation in opposite locations of their peer operations in the output encryption layer.…”
Section: Safer+mentioning
confidence: 99%
“…M is a predefined invertable (16×16) matrix used as base for the final transformation stage in every round to ensure the fast diffusion and to make the algorithm resistant to differential cryptanalysis [32]. The decryption process begins with the input transformation layer operating on the ciphertext and the key K 2R+1 with a subtraction (sub) as the inverse operation of add and xor operation in opposite locations of their peer operations in the output encryption layer.…”
Section: Safer+mentioning
confidence: 99%