Research Article

Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard

Algorithm 1

Data encryption.
(1)Key selection out of five keys based upon identification and classification
(2)Entropy-based key generation through the autogenerated key module
(3)Extension of 56-bit data chunks to 64-bit through the extender
(4)Key transformation
(5)Expansion of 64-bit to 128-bit data
(6)XNOR key 0 with expanded 128-bit data
(7)128-bit data contraction to 64-bit
(8)if the round is odd then
(9)Odd round permutation
(10)else
 Even round permutation
(11)end if
(12)Shifting of the 64-bit matrix in “×” like manner
(13)Substitution of the 64-bit matrix through substitution-boxes
(14)Key addition
(15)Key subtraction
(16)Repeat steps 8 to 15 till 9 rounds
(17)Exit