Abstract

The advanced technology in the internet and social media, communication companies, health care records and cloud computing applications made the data around us increase dramatically every minute and continuously. These renewals big data involve sensitive information such as password, PIN number, credential numbers, secret identifications and etc. which require maintaining with some high secret procedures. The present paper involves proposing a secret multi-dimensional symmetric cipher with six dimensions as a cubic algorithm. The proposed algorithm works with the substitution permutation network (SPN) structure and supports a high processing data rate in six directions. The introduced algorithm includes six symmetry rounds transformations for encryption the plaintext, where each dimension represents an independent algorithm for big data manipulation. The proposed cipher deals with parallel encryption structures of the 128-bit data block for each dimension in order to handle large volumes of data. The submitted cipher compensates for six algorithms working simultaneously each with 128-bit according to various irreducible polynomials of order eight. The round transformation includes four main encryption stages where each stage with a cubic form of six dimensions.

Highlights

  • The cryptographic algorithms are a set of rules and mathematical procedures that are used to convert the clear text to an unintelligible text and vice-versa

  • The submitted algorithm is dedicated to big data applications and it inherited most of its good characteristics from previously published algorithms [2,3,4]

  • The cubic algorithm is designed with a solid round transformation that has six separate paths each of them traverses an independent algorithm

Read more

Summary

Introduction

The cryptographic algorithms are a set of rules and mathematical procedures that are used to convert the clear text to an unintelligible text and vice-versa. There are basically two types of the first is cryptographic algorithms of public key cryptography (PKC) or what is called asymmetric cipher where the sender and receiver use two keys one for encryption and the other for the decryption process. The symmetric cipher plays an effective role for a trusted bock of data where the sender and receiver own the same secret key [1]. The big data is unlike traditional data because it needs a high potential that outweighs the conventional data from all aspects. It should take into consideration the designing of a large cipher to meet the growth of data and the cipher should be convenient for the big Journal homepage: http://beei.org

Methods
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.