4.6 Article

A novel secure cryptography model for data transmission based on Rotor64 technique

期刊

出版社

SPRINGER
DOI: 10.1007/s11042-023-16889-3

关键词

Rotor64; Cryptography; Data transmission; Cyber Security; Authintication

向作者/读者索取更多资源

The paper discusses the importance of protecting user information and the vulnerabilities that exist in security. It proposes an improved ancient rotor machine based on base64 encoding and a key exchange method based on OTP to encrypt data, and experiments show promising results.
In recent years, there have been many Security vulnerabilities that threaten user security, these threats have led to the finding of user files, so the use of the Internet has become unlimited, and the number of digital network devices has increased,Therefore, maintaining the confidentiality and integrity of information has become an urgent necessity to preserve user information, due to the increase in hackers and intruders, and the innovation of modern methods of penetration every day. Data cryptography has proven to be a secure way to protect a user's data. Many current cryptography algorithms are considered weak regarding data transmission over the Internet, so newly updated algorithms are in high demand. In this paper, we proposed to develop the ancient rotor machine depending on the base64 codding technique, in which we replaced the alphabets of the ancient rotor machine with the alphabets of base64 that contain 64 characters. Furthermore, we proposed a key exchange based on One-time password OTP code via SMS, OTP is mechanism for logging on to a network using unique password that can only be used once, to overcome the static password method that is least secure, and used it to generate the subkeys for rotor machines based on hash and random permutation techniques. MD5 algorithm function is used to authenticate the original message, Finally, we experimented with these techniques of secure sending e-mails by encrypting the contents of them with the proposed technique. However, the proposed security technique got promising results.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据