基于z变换的加密算法研究

M. Alenezi, Fawaz S. Al-Anzi
{"title":"基于z变换的加密算法研究","authors":"M. Alenezi, Fawaz S. Al-Anzi","doi":"10.54039/IJCNIS.V13I2.5052","DOIUrl":null,"url":null,"abstract":"It has become increasingly important to ensure the protection of information, especially data in transit. Therefore, it is the primary goal of any encryption algorithm to safeguard the protection of information against security attacks. It is equally important to design high-performance solutions with affordable cost of implementation. Encryption algorithms are used to transform plain text to the ciphertext in order to protect privacy, prevent data fraud, and prevent unauthorized access of data in daily transactions. There are multiple types of encryption algorithms, each with its niche tactics to enhance security. For instance, different kinds of algorithms include but are not limited to the following: Blowfish, RSA, AES, DES, Triple DES. This paper contributes an efficient and secure encryption algorithm technique for information security based on Z transformation and XOR function known as the Z Transformation Encryption (ZTE) technique. To elaborate, this technique implements concepts of Z transformation and XOR operations at the source. The reverse process is applied at the receiving end of the transaction wherein the inverse of Z transformation and XOR is applied to reveal the original plain text message. The simulation of the proposed algorithm is conducted using the R language. The results show a promising performance comparing to other symmetric algorithms.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"139 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Study of Z-Transform Based Encryption Algorithm\",\"authors\":\"M. Alenezi, Fawaz S. Al-Anzi\",\"doi\":\"10.54039/IJCNIS.V13I2.5052\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It has become increasingly important to ensure the protection of information, especially data in transit. Therefore, it is the primary goal of any encryption algorithm to safeguard the protection of information against security attacks. It is equally important to design high-performance solutions with affordable cost of implementation. Encryption algorithms are used to transform plain text to the ciphertext in order to protect privacy, prevent data fraud, and prevent unauthorized access of data in daily transactions. There are multiple types of encryption algorithms, each with its niche tactics to enhance security. For instance, different kinds of algorithms include but are not limited to the following: Blowfish, RSA, AES, DES, Triple DES. This paper contributes an efficient and secure encryption algorithm technique for information security based on Z transformation and XOR function known as the Z Transformation Encryption (ZTE) technique. To elaborate, this technique implements concepts of Z transformation and XOR operations at the source. The reverse process is applied at the receiving end of the transaction wherein the inverse of Z transformation and XOR is applied to reveal the original plain text message. The simulation of the proposed algorithm is conducted using the R language. The results show a promising performance comparing to other symmetric algorithms.\",\"PeriodicalId\":232613,\"journal\":{\"name\":\"Int. J. Commun. Networks Inf. Secur.\",\"volume\":\"139 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-08-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Commun. Networks Inf. Secur.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.54039/IJCNIS.V13I2.5052\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Commun. Networks Inf. Secur.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54039/IJCNIS.V13I2.5052","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

确保信息,特别是传输中的数据的保护变得越来越重要。因此,保护信息不受安全攻击是任何加密算法的首要目标。设计具有可承受的实现成本的高性能解决方案同样重要。在日常交易中,为了保护隐私、防止数据欺诈、防止未经授权的数据访问,使用加密算法将明文转换为密文。有多种类型的加密算法,每种算法都有其增强安全性的利基策略。例如:Blowfish、RSA、AES、DES、Triple DES等算法。本文提出了一种基于Z变换和异或函数的高效安全的信息安全加密算法技术,称为Z变换加密(ZTE)技术。为了详细说明,该技术在源上实现了Z变换和异或操作的概念。在事务的接收端应用反向过程,其中应用Z变换的逆和异或来显示原始纯文本消息。采用R语言对所提出的算法进行了仿真。结果表明,与其他对称算法相比,该算法具有良好的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Study of Z-Transform Based Encryption Algorithm
It has become increasingly important to ensure the protection of information, especially data in transit. Therefore, it is the primary goal of any encryption algorithm to safeguard the protection of information against security attacks. It is equally important to design high-performance solutions with affordable cost of implementation. Encryption algorithms are used to transform plain text to the ciphertext in order to protect privacy, prevent data fraud, and prevent unauthorized access of data in daily transactions. There are multiple types of encryption algorithms, each with its niche tactics to enhance security. For instance, different kinds of algorithms include but are not limited to the following: Blowfish, RSA, AES, DES, Triple DES. This paper contributes an efficient and secure encryption algorithm technique for information security based on Z transformation and XOR function known as the Z Transformation Encryption (ZTE) technique. To elaborate, this technique implements concepts of Z transformation and XOR operations at the source. The reverse process is applied at the receiving end of the transaction wherein the inverse of Z transformation and XOR is applied to reveal the original plain text message. The simulation of the proposed algorithm is conducted using the R language. The results show a promising performance comparing to other symmetric algorithms.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信