Vol.9, No.3, August 2020.                                                                                                                                                                                ISSN: 2217-8309

                                                                                                                                                                                                                        eISSN: 2217-8333

 

TEM Journal

 

TECHNOLOGY, EDUCATION, MANAGEMENT, INFORMATICS

Association for Information Communication Technology Education and Science


Maintaining the Integrity of Encrypted Data by Using the Improving Hash Function Based on GF (𝟐𝟖)

 

Sahab Dheyaa Mohammed, Abdul Monem S. Rahma, Taha Mohammed Hasan

 

© 2020 Sahab Dheyaa Mohammed, published by UIKTEN. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. (CC BY-NC-ND 4.0)

 

Citation Information: TEM Journal. Volume 9, Issue 3, Pages 1277-1284, ISSN 2217-8309, DOI: 10.18421/TEM93-57, August 2020.

 

Received: 29 April 2020.

Revised:   11 August 2020.
Accepted: 17 August 2020
Published: 28 August 2020.

 

Abstract:

 

The issue of protecting the information from penetration has become an important issue. The system that depends on the encryption ensures the confidentiality of the information non-disclosure of sensitive information but does not ensure the integrity of data from destruction and change. In this paper, a proposed system is designed to protect the confidentiality and integrity of data from penetration, disclosure, and destruction. The proposed system based on the polynomial numbers of GF (𝟐𝟖) is achieved by improving the encryption approach using the idea of the magic square and the linear equation system also uses improving the digital signature method for ensuring that data is not changed or modified. The system has higher encryption and decryption throughput (548.924Kb /sec), (548.924 Kb /sec) and acceptable value 0.759294 of the randomness data according to the NIST randomness tests as well as a high confusion and diffusion in cipher text based on the ratio of Avalanche effect test.

 

Keywords –Gaussian Elimination, hash function, integrity, Magic Square, Finite Field.

 

-----------------------------------------------------------------------------------------------------------

Full text PDF >  

-----------------------------------------------------------------------------------------------------------

 


Copyright © 2012-2020 UIKTEN, All Rights reserved
Copyright licence: All articles are licenced via Creative Commons CC BY-NC-ND 4.0 licence