Research Article
Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard
(1) | Key selection out of five keys based upon identification and classification | (2) | Entropy-based key generation through the autogenerated key module | (3) | Extension of 56-bit data chunks to 64-bit through the extender | (4) | Key transformation | (5) | Expansion of 64-bit to 128-bit data | (6) | XNOR key 0 with expanded 128-bit data | (7) | 128-bit data contraction to 64-bit | (8) | if the round is odd then | (9) | Odd round permutation | (10) | else | | Even round permutation | (11) | end if | (12) | Shifting of the 64-bit matrix in “×” like manner | (13) | Substitution of the 64-bit matrix through substitution-boxes | (14) | Key addition | (15) | Key subtraction | (16) | Repeat steps 8 to 15 till 9 rounds | (17) | Exit |
|