Author(s):
1. Mohammed N. Alenezi:
Computer Science & Information System Department, Public Authority for Applied Education & Training, Kuwait
2. Fawaz S. Al-Anzi:
Computer Engineering Department, Kuwait University, Kuwait
Abstract:
It has become increasingly important to ensure the protection of information, especially data in transit. Therefore, it is the primary goal of any encryption algorithm to safeguard information protection against security attacks. It is equally important to design high-performance solutions with affordable cost of implementation. Encryption algorithms are used to transform plain text to ciphertext to protect privacy, prevent data fraud, and prevent unauthorized access of data in daily transactions. There are multiple types of encryption algorithms, each with its niche tactics to enhance security. This paper contributes an efficient and secure encryption algorithm for information security based on Z-transformation and XOR function known as the Z-Transformation Encryption (ZTE) technique. ZTE converts the encryption from the regular discretetime domain into a complex frequency domain representation. It implements the concept of Z-transformation and XOR operations at the source. The reverse process is applied at the receiving end of the transaction, wherein the inverse of Z-Transformation and XOR are applied to reveal the original plain text message. The simulation of the proposed algorithm is conducted using the R language. The results show a promising performance comparing to other symmetric algorithms.
Page(s):
302-309
DOI:
DOI not available
Published:
Journal: International Journal of Communication Networks and Information Security, Volume: 13, Issue: 2, Year: 2021
Keywords:
cryptography
,
information security
,
Encryption
,
Decryption
,
Ztransformation
,
Inverse Ztransformation
References:
References are not available for this document.
Citations
Citations are not available for this document.