Information security based on sub-system keys generator by utilizing polynomials method and logic gate

IF 1.2 Q2 MATHEMATICS, APPLIED
K. K. Jabbar, Hussain A. Hailal, Aysar Thamer Naser
{"title":"Information security based on sub-system keys generator by utilizing polynomials method and logic gate","authors":"K. K. Jabbar, Hussain A. Hailal, Aysar Thamer Naser","doi":"10.47974/jdmsc-1549","DOIUrl":null,"url":null,"abstract":"Information security is the biggest and most complex problem at present because of its great impact on modern software in all fields. Therefore, many researchers are working to develop modern methods of protecting data from modification or theft or even accessing it in one way or another. As dealing with data is a very sensitive matter in terms of sending this data from one party to another through the Internet or social media. The protection of that data requires the use of algorithms to encrypt or conceal the data with the proposed and used algorithms, and these algorithms work based on the proposed key exchange principle, so many of these algorithms need a key generator to work with other than the key is public or private for encryption or decryption the blade. Our proposed developed a key generation sub-system, as this system consists of two parts, the first part aimed to generate the first key (the first 64-bit subkey), while the second part (the second subsystem) will generate the second key (the second subkey is 64-bit). As the two sub-systems work to generate keys in different ways, the first system uses the principle of electronic gates to generate the keys randomly, while the second system uses binary text and LFSR. The idea in these sub-systems is that they work together in encrypting and decrypting data, requiring that the sender and receiver have the keys to complete the process. The results obtained from the two subsystems show the power in protecting data from reading or decoding its code, as the message consists of only a part of the key and the second part is at the receiver, and this gives stronger immunity in this encrypted data.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"28 1","pages":""},"PeriodicalIF":1.2000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47974/jdmsc-1549","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"MATHEMATICS, APPLIED","Score":null,"Total":0}
引用次数: 0

Abstract

Information security is the biggest and most complex problem at present because of its great impact on modern software in all fields. Therefore, many researchers are working to develop modern methods of protecting data from modification or theft or even accessing it in one way or another. As dealing with data is a very sensitive matter in terms of sending this data from one party to another through the Internet or social media. The protection of that data requires the use of algorithms to encrypt or conceal the data with the proposed and used algorithms, and these algorithms work based on the proposed key exchange principle, so many of these algorithms need a key generator to work with other than the key is public or private for encryption or decryption the blade. Our proposed developed a key generation sub-system, as this system consists of two parts, the first part aimed to generate the first key (the first 64-bit subkey), while the second part (the second subsystem) will generate the second key (the second subkey is 64-bit). As the two sub-systems work to generate keys in different ways, the first system uses the principle of electronic gates to generate the keys randomly, while the second system uses binary text and LFSR. The idea in these sub-systems is that they work together in encrypting and decrypting data, requiring that the sender and receiver have the keys to complete the process. The results obtained from the two subsystems show the power in protecting data from reading or decoding its code, as the message consists of only a part of the key and the second part is at the receiver, and this gives stronger immunity in this encrypted data.
基于多项式法和逻辑门的子系统密钥生成器的信息安全
信息安全对现代软件的各个领域产生了巨大的影响,是当前最大、最复杂的问题。因此,许多研究人员正在努力开发现代方法来保护数据免受修改或盗窃,甚至以某种方式访问它。因为处理数据是一个非常敏感的问题,通过互联网或社交媒体将数据从一方发送到另一方。数据的保护需要使用算法来加密或隐藏数据,这些算法基于所建议的密钥交换原则工作,因此许多这些算法需要一个密钥生成器来使用,而不是公钥或私钥来加密或解密刀片。我们建议开发一个密钥生成子系统,因为该系统由两部分组成,第一部分旨在生成第一个密钥(第一个64位子密钥),而第二部分(第二个子系统)将生成第二个密钥(第二个子密钥是64位)。由于两个子系统生成密钥的方式不同,第一个系统使用电子门原理随机生成密钥,第二个系统使用二进制文本和LFSR。这些子系统的思想是,它们在加密和解密数据时协同工作,要求发送方和接收方拥有完成该过程的密钥。从这两个子系统得到的结果显示了保护数据不被读取或解码的能力,因为消息仅由一部分密钥组成,而另一部分在接收方,这使得加密数据具有更强的免疫力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
3.10
自引率
21.40%
发文量
126
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信