Research Article
Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard
(1) | From the 4 chunks of the key, we will have 4 bits | (2) | Convert them to decimal and get a remainder with 26 | (3) | The remainder will be used for forward and backward intervals | (4) | Begin | (5) | Convert each nibble to decimal | (6) | Match that nibble in the alphabetic table | (7) | The matched number will be forwarded to the times the number was obtained as the remainder | (8) | Resulting ciphertext | (9) | Resulting key | (10) | Exit |
|