A Novel Data Encryption Algorithm Design and Implementation in Information Security Scope

02/09/2019
by   Nurettin Topaloglu, et al.
0

Today, the protection of information, ensuring of the safety and the recall in lossless in case of need is highly significant and it is seen as a major threat in the field. Information security is possible by hiding the available data, by encrypting, saving, transmitting and sharing. At this point, cryptology subject comes up. Cryptology called as password science includes with the encrypting according to a certain technique of different texts and the transmitting these messages to the recipient in a secure environment. In this study, in information security scope, an original data encryption algorithm was developed. Algorithm developed according to the "Single Characters Relocation" technique is designed. In the creation process of the algorithm, was also utilized from Caesar encryption algorithm, multi-alphabet algorithms and Enigma. The purpose of the study is to store the text written in a safe manner and thus to ensure information security is by deciphering upon request. In the study, an algorithm that is very difficult for its decryption was developed and this is clearly emerging when considering the number used passwords alphabet. This study is expected to contribute to the field of information security.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/27/2018

Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy

Recently, a chaotic image encryption algorithm based on information entr...
research
09/02/2022

Data Encryption based on 7D Complex Chaotic System with Cubic Memristor for Smart Grid

The information security has an irreplaceable position in the smart grid...
research
04/30/2020

A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix

The study of sending and receiving secret messages is called cryptograph...
research
12/15/2019

Implementation of encryption on telemedicine

In the era of technology, data security is one of the most important thi...
research
03/26/2021

Limitations on Uncloneable Encryption and Simultaneous One-Way-to-Hiding

We study uncloneable quantum encryption schemes for classical messages a...
research
07/14/2022

On the Feasibility of Unclonable Encryption, and More

Unclonable encryption, first introduced by Broadbent and Lord (TQC'20), ...
research
03/26/2019

BSEA-1 - A Stream Cipher Backdooring Technique

Recent years have shown that more than ever governments and intelligence...

Please sign up or login with your details

Forgot password? Click here to reset