Axes-Based Encryption Key

Security has always been a privilege for governments and banks, from the old Egyptian civilization to the latest technologies. Nowadays, security has become an essential part in our daily life; from protecting mobile chats to bank accounts to confidential data. It is everywhere due to the huge amoun...

Full description

Saved in:
Bibliographic Details
Main Author: Haidar, Imane (author)
Other Authors: Haidar, Ali Massoud (author), Haraty, Ramzi A. (author)
Format: conferenceObject
Published: 2018
Subjects:
Online Access:http://hdl.handle.net/10725/10228
http://dx.doi.org/10.1109/AICCSA.2018.8612814
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
https://ieeexplore.ieee.org/abstract/document/8612814/keywords#keywords
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Security has always been a privilege for governments and banks, from the old Egyptian civilization to the latest technologies. Nowadays, security has become an essential part in our daily life; from protecting mobile chats to bank accounts to confidential data. It is everywhere due to the huge amount of data stored and transmitted over public and unsecure networks. On the other hand, computers are advancing so fast that some cryptosystems may vanish in the upcoming years. For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. The approach is based on concepts: transforming data, distributing data, and XORing it with other data. Several algorithms are applied to serve the goal, and promising results have been recuperated. Security has been maximized although there are limits concerning time and space.