{"title":"New Block Cipher Encryption Based On OTP Algorithm","authors":"Joy Huda Al-Nemri, Mu'awya Naser","doi":"10.1109/ICEMIS56295.2022.9914376","DOIUrl":null,"url":null,"abstract":"The current world revolves around encryption. Every time a mobile phone call is made, a credit card is used in a store or on the Internet, or to withdraw cash from an ATM, encryption ensures the transaction’s secrecy and security. In this paper, we propose a high secure practical OTP Algorithm using CTR encryption. In this paper, we provide a solution that is unbreakable by quantum computing. Quantum computing is the highest threat facing encryption nowadays. SHA-512 and PRNG are applied in this paper within the proposed mathematical model. and the model was deeply analyzed. Also, security and practicality were proven.","PeriodicalId":191284,"journal":{"name":"2022 International Conference on Engineering & MIS (ICEMIS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Engineering & MIS (ICEMIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEMIS56295.2022.9914376","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The current world revolves around encryption. Every time a mobile phone call is made, a credit card is used in a store or on the Internet, or to withdraw cash from an ATM, encryption ensures the transaction’s secrecy and security. In this paper, we propose a high secure practical OTP Algorithm using CTR encryption. In this paper, we provide a solution that is unbreakable by quantum computing. Quantum computing is the highest threat facing encryption nowadays. SHA-512 and PRNG are applied in this paper within the proposed mathematical model. and the model was deeply analyzed. Also, security and practicality were proven.