Published 2016
“…Personal computers has become one of the important part of human life, especially when they using the Internet or any public networks.So, the information or data may still be deliberately or inadvertently leaked out by the insiders or customers.In this paper, we proposing new
algorithm to protect any type of data, depending on the substitution techniques, using
dynamic key (DK) and reveres string for each character in the text (or field in the file of the database) and each string .A special equation was
developed to generate the DK, it’s depend on the length of string, order the character in the string,ASCII code of the character, and string sequence.The proposed
algorithm using the reverse string before
encryption, also, there are two
actions after that, for the purpose of increasing the complexity of the
algorithm.The results showed that The
developed algorithm was successes to remove any duplicate
encryption, for each character and each record even when the text duplicated.…”
Get full text
Get full text
Conference or Workshop Item