2022
DOI: 10.32604/cmc.2022.028272
|View full text |Cite
|
Sign up to set email alerts
|

Triple Key Security Algorithm Against Single Key Attack on Multiple Rounds

Abstract: In cipher algorithms, the encryption and decryption are based on the same key. There are some limitations in cipher algorithms, for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwise it will be repeated and if the key is known then encryption becomes useless. This paper aims to improve the said limitations by designing of Triple key security algorithm (TKS) in which the key is modified on polyalphabetic substitution cipher to maintain the size of the key and plainte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…A number of reviews has been introduced to compare between various symmetric and nonsymmetric cryptography algorithms [11][12][13][14][15][16][17][18][19].…”
Section: Related Workmentioning
confidence: 99%
“…A number of reviews has been introduced to compare between various symmetric and nonsymmetric cryptography algorithms [11][12][13][14][15][16][17][18][19].…”
Section: Related Workmentioning
confidence: 99%
“…The security mechanism using blockchain technology's decentralization feature in two conditions has been discussed in the remote cloud, network terminal, and devices [80,81]. Bitcoin currency is a modern and visibly growing blockchain-based technology [82,83]. IoT devices are progressively inclined to assault and cannot ensure themselves [84].…”
Section: Intrusion Detection System 03 2020mentioning
confidence: 99%
“…It gives a less sophisticated, less structured environment and provides the process with complex management tools [10]. LMS educational content in the form of text or video is associated with the Shareable content object reference model (SCORM), and the central repository allows the teachers to upload the content into multiple courses for the students [11,12]. After uploading the educational content, interactivity must be a continuum for course selection.…”
Section: Introductionmentioning
confidence: 99%