4.6 Article

A novel secure cryptography model for data transmission based on Rotor64 technique

Journal

MULTIMEDIA TOOLS AND APPLICATIONS
Volume -, Issue -, Pages -

Publisher

SPRINGER
DOI: 10.1007/s11042-023-16889-3

Keywords

Rotor64; Cryptography; Data transmission; Cyber Security; Authintication

Ask authors/readers for more resources

The paper discusses the importance of protecting user information and the vulnerabilities that exist in security. It proposes an improved ancient rotor machine based on base64 encoding and a key exchange method based on OTP to encrypt data, and experiments show promising results.
In recent years, there have been many Security vulnerabilities that threaten user security, these threats have led to the finding of user files, so the use of the Internet has become unlimited, and the number of digital network devices has increased,Therefore, maintaining the confidentiality and integrity of information has become an urgent necessity to preserve user information, due to the increase in hackers and intruders, and the innovation of modern methods of penetration every day. Data cryptography has proven to be a secure way to protect a user's data. Many current cryptography algorithms are considered weak regarding data transmission over the Internet, so newly updated algorithms are in high demand. In this paper, we proposed to develop the ancient rotor machine depending on the base64 codding technique, in which we replaced the alphabets of the ancient rotor machine with the alphabets of base64 that contain 64 characters. Furthermore, we proposed a key exchange based on One-time password OTP code via SMS, OTP is mechanism for logging on to a network using unique password that can only be used once, to overcome the static password method that is least secure, and used it to generate the subkeys for rotor machines based on hash and random permutation techniques. MD5 algorithm function is used to authenticate the original message, Finally, we experimented with these techniques of secure sending e-mails by encrypting the contents of them with the proposed technique. However, the proposed security technique got promising results.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available