{"title":"New Proposed Z-Transform Based Encryption Algorithm","authors":"Fawaz S. Al-Anzi, Mohamed Al-Enezi, J. Soni","doi":"10.1109/ICITCS.2016.7740356","DOIUrl":null,"url":null,"abstract":"The foremost aim of designing of any encryption algorithm must be security against unlawful attacks. However, performance and the cost of implementation could be some another important concerns as well. Encryption algorithms should be secure enough to crack. Encryption is a basic technique of information security to protect information. We have different encryption algorithms so far such as RSA, DES, Triple DES, AES and Blowfish. Each and every algorithm has their own advantages in achieving data security. In this paper, we propose a new encryption algorithm which is using the concept of XOR operation and Z transformation for encryption process at the sender side. At the receiving end we are using inverse Z transform and XOR operation to get plain text. In this paper, we are trying to invent a new encryption model which is not only secure but very fast as well.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on IT Convergence and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITCS.2016.7740356","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The foremost aim of designing of any encryption algorithm must be security against unlawful attacks. However, performance and the cost of implementation could be some another important concerns as well. Encryption algorithms should be secure enough to crack. Encryption is a basic technique of information security to protect information. We have different encryption algorithms so far such as RSA, DES, Triple DES, AES and Blowfish. Each and every algorithm has their own advantages in achieving data security. In this paper, we propose a new encryption algorithm which is using the concept of XOR operation and Z transformation for encryption process at the sender side. At the receiving end we are using inverse Z transform and XOR operation to get plain text. In this paper, we are trying to invent a new encryption model which is not only secure but very fast as well.