Research Article
Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard
(1) | Key generation | (2) | The key division into chunks | (3) | From HCF, get a single chunk | (4) | Fix polynomial division to get standardized form | (5) | Four bytes’ reduction to a single bit | (6) | Single-bit processing with the output of step 5 | (7) | The output of step 7 will XNOR with key obtained from step 1 | (8) | Resulting key | (9) | Exit |
|