A novel secure cryptography model for data transmission based on Rotor64 technique

In recent years, there have been many Security vulnerabilities that threaten user security, these threats have led to the finding of user files, so the use of the Internet has become unlimited, and the number of digital network devices has increased,Therefore, maintaining the confidentiality and int...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Multimedia tools and applications 2024-04, Vol.83 (13), p.37295-37314
Hauptverfasser: Obeidat, Ibrahim, Mughaid, Ala, AlZu’bi, Shadi, AL-Arjan, Ahmed, AL-Amrat, Rula, AL-Ajmi, Rathaa, AL-Hayajneh, Razan, Abuhaija, Belal, Abualigah, Laith
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:In recent years, there have been many Security vulnerabilities that threaten user security, these threats have led to the finding of user files, so the use of the Internet has become unlimited, and the number of digital network devices has increased,Therefore, maintaining the confidentiality and integrity of information has become an urgent necessity to preserve user information, due to the increase in hackers and intruders, and the innovation of modern methods of penetration every day. Data cryptography has proven to be a secure way to protect a user's data. Many current cryptography algorithms are considered weak regarding data transmission over the Internet, so newly updated algorithms are in high demand. In this paper, we proposed to develop the ancient rotor machine depending on the base64 codding technique, in which we replaced the alphabets of the ancient rotor machine with the alphabets of base64 that contain 64 characters. Furthermore, we proposed a key exchange based on One-time password OTP code via SMS, OTP is mechanism for logging on to a network using unique password that can only be used once, to overcome the static password method that is least secure, and used it to generate the subkeys for rotor machines based on hash and random permutation techniques. MD5 algorithm function is used to authenticate the original message, Finally, we experimented with these techniques of secure sending e-mails by encrypting the contents of them with the proposed technique. However, the proposed security technique got promising results.
ISSN:1573-7721
1380-7501
1573-7721
DOI:10.1007/s11042-023-16889-3