remah

logo

European Development  And Research Academy (EDARA)

Data Security Algorithm Using Magic Square With Order Five Based on GF(28) Numbers

Written by Ibrahim Malik ALattar1 *, Abdul Monem S. Rahma2
(0 votes)
Share:
Share:

 Data Security Algorithm Using Magic Square With Order Five Based on GF(28) Numbers

Ibrahim Malik ALattar1 *, Abdul Monem S. Rahma2
1, Department of Computer Science, University of Technology, Baghdad, Iraq.
2, Computer Science Department, college of Science ,Al-Maarif University, Anbar, Iraq.
ibrahiminter@yahoo.com1
Monem.rahma@uoa.edu.iq 2
Abstract
Development this paper aims to develop a Cryptography algorithms based upon the advantages of magic squares to obtain high speed and high complexity. In the paper work on Magic Square of Order 5 was relied upon to generate an algorithm of encryption for the data specified with GF(P) or GF(28). The process done by put the key in the positions that agreed and put the message in the remaining positions at the Magic Square then the sum is found for each row, Column and diameter. The block encryption algorithm uses a block of size 10 and 14 element. The complexity obtained by the algorithm was (256)10×(P)15 and (256)14×(P)11 respectively, and the speed of each proposed algorithm was calculated and the results indicated that the first proposed method was better than the second method in terms of complexity, especially when using a high number prime in GF(P) compared.
Keywords: Magic Square, Cryptography, linear equation system, finite field, GF(28).

 

Read 62 times Last modified on Thursday, 13 March 2025 12:09