{"title":"新型分组密码:对称密钥包围元技术","authors":"Baqer M. Merzah","doi":"10.1109/IT-ELA52201.2021.9773639","DOIUrl":null,"url":null,"abstract":"In recent years, technology advanced rapidly. Therefore, ensuring the security of information transmitted over the Internet is necessary. To increase data security and confidentiality, different encryption algorithms were developed. In this study, to enhance security, a new symmetric key encryption algorithm is proposed by generating key blocks based on random numbers sent from a sender to a receiver. For encryption, the XOR operation is performed on the surrounding elements of the plaintext block with the key block and on the middle elements of the plaintext block with the new elements generated after the previous XOR operation. The proposed encryption technique was evaluated and the results show the efficiency of the proposed technology in generating keys. The proposed technique tested on different data sizes and results obtained that show the effectiveness and efficiency in the time of encryption and decryption.","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Novel Block Cipher: Surrounding Elements Technique using Symmetric Key\",\"authors\":\"Baqer M. Merzah\",\"doi\":\"10.1109/IT-ELA52201.2021.9773639\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, technology advanced rapidly. Therefore, ensuring the security of information transmitted over the Internet is necessary. To increase data security and confidentiality, different encryption algorithms were developed. In this study, to enhance security, a new symmetric key encryption algorithm is proposed by generating key blocks based on random numbers sent from a sender to a receiver. For encryption, the XOR operation is performed on the surrounding elements of the plaintext block with the key block and on the middle elements of the plaintext block with the new elements generated after the previous XOR operation. The proposed encryption technique was evaluated and the results show the efficiency of the proposed technology in generating keys. The proposed technique tested on different data sizes and results obtained that show the effectiveness and efficiency in the time of encryption and decryption.\",\"PeriodicalId\":330552,\"journal\":{\"name\":\"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)\",\"volume\":\"89 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IT-ELA52201.2021.9773639\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IT-ELA52201.2021.9773639","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Novel Block Cipher: Surrounding Elements Technique using Symmetric Key
In recent years, technology advanced rapidly. Therefore, ensuring the security of information transmitted over the Internet is necessary. To increase data security and confidentiality, different encryption algorithms were developed. In this study, to enhance security, a new symmetric key encryption algorithm is proposed by generating key blocks based on random numbers sent from a sender to a receiver. For encryption, the XOR operation is performed on the surrounding elements of the plaintext block with the key block and on the middle elements of the plaintext block with the new elements generated after the previous XOR operation. The proposed encryption technique was evaluated and the results show the efficiency of the proposed technology in generating keys. The proposed technique tested on different data sizes and results obtained that show the effectiveness and efficiency in the time of encryption and decryption.