2022
DOI: 10.21123/bsj.2022.19.3.0619
|View full text |Cite
|
Sign up to set email alerts
|

Text Multilevel Encryption Using New Key Exchange Protocol

Abstract: The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…Sensor networks collect data and send it to the cloud via smart gateways for Mechanical and electronic gadgets connected to the web. The data collected from these numerous sources is then used to power the many user-facing services that make up cloud computing [49,50]. Considering Fog's meager resources, a Fog computing communication protocol must be highly effective, lightweight, and flexible.…”
Section: The Construction Of Fog Computingmentioning
confidence: 99%
“…Sensor networks collect data and send it to the cloud via smart gateways for Mechanical and electronic gadgets connected to the web. The data collected from these numerous sources is then used to power the many user-facing services that make up cloud computing [49,50]. Considering Fog's meager resources, a Fog computing communication protocol must be highly effective, lightweight, and flexible.…”
Section: The Construction Of Fog Computingmentioning
confidence: 99%
“…This test is considered a generalization for the SST and it is based on a special recursive sequence called Luca's sequence 3,11 . If P and Q are any integers and if 𝛼 = (𝑃 + √𝐷)/2 and 𝛽 = (𝑃 βˆ’ √𝐷)/2 are the roots of the quadratic equation π‘₯ 2 βˆ’ 𝑃π‘₯ + 𝑄 = 0 whose discriminant 𝐷 = 𝑃 2 βˆ’ 4𝑄 is positive, then the following relations are obtained: 𝑃 = 𝛼 + 𝛽, 𝑄 = 𝛼𝛽, and 𝐷 = (𝛼 βˆ’ 𝛽) 2 . Assume that 𝐷 ≑ 0 (π‘šπ‘œπ‘‘4), or 𝐷 ≑ 1 (π‘šπ‘œπ‘‘4).…”
Section: Lucas Sequence Primality Testingmentioning
confidence: 99%
“…It is based on selecting the discriminant 𝐷 as the first element in the sequence of the odd positive numbers with common difference 4 and ( 𝐷 𝑛 ) = βˆ’1. Then, 𝑃 is selected to be the least odd number greater than 𝐷 1 2 and 𝑄 = (𝑃 2 βˆ’ 𝐷)/4. For example, if 𝑛 = 5559, it selects 𝐷 = 13 and {𝑃, 𝑄} = {3, βˆ’1} where the Lucas test fails.…”
Section: Lucas Sequence Primality Testingmentioning
confidence: 99%
See 2 more Smart Citations