Dynamic Permutations

Article ID

CSTSDE9A1EG

Dynamic Permutations

Dr. Saleh N. Abdullah
Dr. Saleh N. Abdullah
Dr. Sharaf A. Alhomdy
Dr. Sharaf A. Alhomdy Faculty of Computer and Information Technology, Sanaa University
DOI

Abstract

The confidentiality, integrity and authentication of anelectronic documentare necessary in many application systems. The security of confidentiality, integrity and authentication of an electronic document are based on nonlinear functions, in which there is no directrelationship between the inputs and the outputs. This means that the inputs cannot be extracted from the outputs. Indeed, all modern cyphers are based on the concept of substitution transposition. In data encryption standard algorithm, DES, which consists of many functions, only one nonlinear function is used in the algorithm, called substitution boxes, and all other functions are linear, one of these linear functions is called IP, initial permutation function, which performs static permutations. The permutations are replaced by transpositions, based on predefined positions, and the permutation function is used several times in DES algorithm.

Dynamic Permutations

The confidentiality, integrity and authentication of anelectronic documentare necessary in many application systems. The security of confidentiality, integrity and authentication of an electronic document are based on nonlinear functions, in which there is no directrelationship between the inputs and the outputs. This means that the inputs cannot be extracted from the outputs. Indeed, all modern cyphers are based on the concept of substitution transposition. In data encryption standard algorithm, DES, which consists of many functions, only one nonlinear function is used in the algorithm, called substitution boxes, and all other functions are linear, one of these linear functions is called IP, initial permutation function, which performs static permutations. The permutations are replaced by transpositions, based on predefined positions, and the permutation function is used several times in DES algorithm.

Dr. Saleh N. Abdullah
Dr. Saleh N. Abdullah
Dr. Sharaf A. Alhomdy
Dr. Sharaf A. Alhomdy Faculty of Computer and Information Technology, Sanaa University

No Figures found in article.

Dr. Sharaf A. Alhomdy. 2015. “. Global Journal of Computer Science and Technology – C: Software & Data Engineering GJCST-C Volume 15 (GJCST Volume 15 Issue C1): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Issue Cover
GJCST Volume 15 Issue C1
Pg. 26- 29
Classification
G.2.1
Keywords
Article Matrices
Total Views: 8267
Total Downloads: 2059
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Dynamic Permutations

Dr. Saleh N. Abdullah
Dr. Saleh N. Abdullah
Dr. Sharaf A. Alhomdy
Dr. Sharaf A. Alhomdy Faculty of Computer and Information Technology, Sanaa University

Research Journals