Triple Key Security Algorithm Against Single Key Attack on Multiple Rounds

9Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

In cipher algorithms, the encryption and decryption are based on the same key. There are some limitations in cipher algorithms, for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwise it will be repeated and if the key is known then encryption becomes useless. This paper aims to improve the said limitations by designing of Triple key security algorithm (TKS) in which the key is modified on polyalphabetic substitution cipher to maintain the size of the key and plaintext. Each plaintext character is substituted by an alternative message. The mode of substitution is transformed cyclically which depends on the current position of the modified communication. Three keys are used in the encryption and decryption process on 8 or 16 rounds with the Exclusively-OR (XOR) of the 1stkey. This study also identifies a single-key attack on multiple rounds block cipher in mobile communications and applied the proposed technique to prevent the attack. By utilization of the TKS algorithm, the decryption is illustrated, and security is analyzed in detail with mathematical examples.

Cite

CITATION STYLE

APA

Akram, M., Iqbal, M. W., Ali, S. A., Ashraf, M. U., Alsubhi, K., & Aljahdali, H. M. (2022). Triple Key Security Algorithm Against Single Key Attack on Multiple Rounds. Computers, Materials and Continua, 72(3), 6061–6077. https://doi.org/10.32604/cmc.2022.028272

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free