Text Multilevel Encryption Using New Key Exchange Protocol

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by c...

Full description

Saved in:
Bibliographic Details
Main Authors: Zaid Nidhal Khudhair, Ahmed Nidhal, Nidhal K. El Abbadi
Format: Article
Language:English
Published: University of Baghdad, College of Science for Women 2022-06-01
Series:مجلة بغداد للعلوم
Online Access:https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/5751
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849416199954235392
author Zaid Nidhal Khudhair
Ahmed Nidhal
Nidhal K. El Abbadi
author_facet Zaid Nidhal Khudhair
Ahmed Nidhal
Nidhal K. El Abbadi
author_sort Zaid Nidhal Khudhair
collection DOAJ
description The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime numbers and the possibility of using integer numbers. While the second branch of the proposal is the multi-key encryption algorithm. The current algorithm provides the ability to use more than two keys. Keys can be any kind of integer number (at least the last key is a prime number), not necessarily to be of the same length. The Encryption process is based on converting the text characters to suggested integer numbers, and these numbers are converted to other numbers by using a multilevel mathematical model many times (a multilevel process depending on the number of keys used), while the decryption process is a one-level process using just one key as the main key, while the other keys used as secondary keys. The messages are encoded before encryption (coded by ASCII or any suggested system). The algorithm can use an unlimited number of keys with a very large size (more than 7500 bytes), at least one of them a prime number. Exponentiation is also used for keys to increase complexity. The experiments proved the robustness of the key exchange protocol and the encryption algorithm in addition to the security. Comparing the suggested method with other methods ensures that the suggested method is more secure and flexible and easy to implement.
format Article
id doaj-art-3b4ec2b8dc6c451bbce2e54c35a9ee2a
institution Kabale University
issn 2078-8665
2411-7986
language English
publishDate 2022-06-01
publisher University of Baghdad, College of Science for Women
record_format Article
series مجلة بغداد للعلوم
spelling doaj-art-3b4ec2b8dc6c451bbce2e54c35a9ee2a2025-08-20T03:33:15ZengUniversity of Baghdad, College of Science for Womenمجلة بغداد للعلوم2078-86652411-79862022-06-0119310.21123/bsj.2022.19.3.0619Text Multilevel Encryption Using New Key Exchange ProtocolZaid Nidhal Khudhair0Ahmed Nidhal1Nidhal K. El Abbadi2Faculty of Information Technology, Imam Ja'afar Al-Sadiq University, Al-Najaf El-Ashraf, Iraq.Electrical Engineering Dep., Faculty of Engineering, University of Kufa, Al-Najaf El-Ashraf, Iraq. Computer Science Dep., Faculty of Education, University of Kufa, Al Najaf El-Ashraf, Iraq. The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime numbers and the possibility of using integer numbers. While the second branch of the proposal is the multi-key encryption algorithm. The current algorithm provides the ability to use more than two keys. Keys can be any kind of integer number (at least the last key is a prime number), not necessarily to be of the same length. The Encryption process is based on converting the text characters to suggested integer numbers, and these numbers are converted to other numbers by using a multilevel mathematical model many times (a multilevel process depending on the number of keys used), while the decryption process is a one-level process using just one key as the main key, while the other keys used as secondary keys. The messages are encoded before encryption (coded by ASCII or any suggested system). The algorithm can use an unlimited number of keys with a very large size (more than 7500 bytes), at least one of them a prime number. Exponentiation is also used for keys to increase complexity. The experiments proved the robustness of the key exchange protocol and the encryption algorithm in addition to the security. Comparing the suggested method with other methods ensures that the suggested method is more secure and flexible and easy to implement. https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/5751
spellingShingle Zaid Nidhal Khudhair
Ahmed Nidhal
Nidhal K. El Abbadi
Text Multilevel Encryption Using New Key Exchange Protocol
مجلة بغداد للعلوم
title Text Multilevel Encryption Using New Key Exchange Protocol
title_full Text Multilevel Encryption Using New Key Exchange Protocol
title_fullStr Text Multilevel Encryption Using New Key Exchange Protocol
title_full_unstemmed Text Multilevel Encryption Using New Key Exchange Protocol
title_short Text Multilevel Encryption Using New Key Exchange Protocol
title_sort text multilevel encryption using new key exchange protocol
url https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/5751
work_keys_str_mv AT zaidnidhalkhudhair textmultilevelencryptionusingnewkeyexchangeprotocol
AT ahmednidhal textmultilevelencryptionusingnewkeyexchangeprotocol
AT nidhalkelabbadi textmultilevelencryptionusingnewkeyexchangeprotocol