Research Article

Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard

Algorithm 2

Key transformation.
(1)Key generation
(2)The key division into chunks
(3)From HCF, get a single chunk
(4)Fix polynomial division to get standardized form
(5)Four bytes’ reduction to a single bit
(6)Single-bit processing with the output of step 5
(7)The output of step 7 will XNOR with key obtained from step 1
(8)Resulting key
(9)Exit