A Study of Z-Transform Based Encryption Algorithm

Mohammed N. Alenezi(1*), Fawaz S. Al-Anzi(2)
(1) Computer Science and Information Systems Department The Public Authority for Applied Education & Training
(2) Computer Engineering Department Kuwait University
(*) Corresponding Author
DOI : 10.54039/ijcnis.v13i2.5052

Abstract

It has become increasingly important to ensure the protection of information, especially data in transit. Therefore, it is the primary goal of any encryption algorithm to safeguard the protection of information against security attacks. It is equally important to design high-performance solutions with affordable cost of implementation. Encryption algorithms are used to transform plain text to the ciphertext in order to protect privacy, prevent data fraud, and prevent unauthorized access of data in daily transactions. There are multiple types of encryption algorithms, each with its niche tactics to enhance security. For instance, different kinds of algorithms include but are not limited to the following: Blowfish, RSA, AES, DES, Triple DES. This paper contributes an efficient and secure encryption algorithm technique for information security based on Z transformation and XOR function known as the Z Transformation Encryption (ZTE) technique. To elaborate, this technique implements concepts of Z transformation and XOR operations at the source. The reverse process is applied at the receiving end of the transaction wherein the inverse of Z transformation and XOR is applied to reveal the original plain text message. The simulation of the proposed algorithm is conducted using the R language. The results show a promising performance comparing to other symmetric algorithms.

Article Statistic

Abstract view : 38 times
PDF views : 12 times

How To Cite This :

Refbacks

  • There are currently no refbacks.


International Journal of Communication Networks and Information Security (IJCNIS)               ISSN: 2073-607X (Online)