Please use this identifier to cite or link to this item: http://hdl.handle.net/123456789/3774
DC FieldValueLanguage
dc.contributor.authorHussain, H.Sen_US
dc.contributor.authorEden Baruaen_US
dc.contributor.authorNik Zulkarnaen Khidziren_US
dc.contributor.authorCheang Kah Waien_US
dc.contributor.authorGhazali M. Fen_US
dc.date.accessioned2022-12-22T03:45:17Z-
dc.date.available2022-12-22T03:45:17Z-
dc.date.issued2022-
dc.identifier.isbn978-967-26939-0-1-
dc.identifier.urihttp://hdl.handle.net/123456789/3774-
dc.descriptionOthersen_US
dc.description.abstractThe word ‘Cryptography’ according to Stallings (2017), is derived from a Greek word meaning secret writing. In cryptography plain text is transferred to cipher text using encryption techniques, this process is called encryption. And converting cipher text to plain text using decryption techniques, this process is called decryption. There are several conventional cryptographic methods, and because it is possible to crack cipher text. Many cipher techniques have developed but the Rail Fence Cipher (RFC) is the simplest and amusing cryptographic algorithm until now (Nahar & Chakraborty, 2020). RFC is a type of transposition techniques. Meanwhile, there is another technique called Advanced Encryption Standard (AES). The AES algorithm is one of the symmetric key block digits with block sizes varying from 64 to 256 bits (Burr, 2003). Some AES applications continue to struggle for low performance areas such as smart cards and cellular phone-related hardware. Therefore, encryption speed and execution times are two important factors for the real-time use of AES algorithms. The problem with the use of AES is the compromise between the speed of encryption and decryption and execution time where there is more confusion and diffusion. Furthermore, AES is said to use an algebraic structure which is too simple and each block is always encrypted in the same way that making it easy to break (Tillich et al., 2008; Stalling, 2017). Therefore, this paper proposes a new approach called the RAES technique, which results from redesigning the current RFC using two basic phases, first using the AES technique and then using the potential of the RFC technique to protect confidential messages for more secure information security.en_US
dc.language.isoenen_US
dc.publisherQuest International Universityen_US
dc.subjectCipheren_US
dc.subjectEncryptionen_US
dc.subjectPlaintexten_US
dc.subjectRFCen_US
dc.subjectAESen_US
dc.subjectRAESen_US
dc.titleA Modified RAES Technique for a Secured Information Securityen_US
dc.typeNationalen_US
dc.relation.conferenceQuest Intervarsity Science Symposiumen_US
dc.volume2022en_US
dc.relation.seminarQuest Intervarsity Science Symposium 2022en_US
dc.date.seminarstartdate2022-07-23-
dc.date.seminarenddate2022-07-24-
dc.description.placeofseminarQuest International University, Peraken_US
dc.description.typeProceeding Papersen_US
item.languageiso639-1en-
item.openairetypeNational-
item.grantfulltextopen-
item.fulltextWith Fulltext-
crisitem.author.deptUniversiti Malaysia Kelantan-
Appears in Collections:Faculty of Creative Technology & Heritage - Proceedings
Files in This Item:
File Description SizeFormat
Extended Abstract_Quest International Science Symposium (QISS) 2022_QISS COOP03.pdf240.67 kBAdobe PDFView/Open
Show simple item record

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.