Research Article

Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard

Algorithm 3

Key encryption.
(1)From the 4 chunks of the key, we will have 4 bits
(2)Convert them to decimal and get a remainder with 26
(3)The remainder will be used for forward and backward intervals
(4)Begin
(5)Convert each nibble to decimal
(6)Match that nibble in the alphabetic table
(7)The matched number will be forwarded to the times the number was obtained as the remainder
(8)Resulting ciphertext
(9)Resulting key
(10)Exit