Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.
Digital Object Identifier (DOI) : 10.14569/IJACSA.2016.070110
Article Published in International Journal of Advanced Computer Science and Applications(IJACSA), Volume 7 Issue 1, 2016.
Abstract: The need for fast and attack resistance crypto algorithm is challenging issue in the era of the revolution in the information and communication technologies. The previous works presented by the authors “Dynamic Crypto Algorithm for Real-Time Applications DCA_RTA”, still need more enhancements to bring up the DCA_RTA into acceptable security level. In this work, the author added more enhancements on the Transformation-Table that is generated by the Initial-Table IT, which affects the overall encryption/decryption process. The new TT generation proven to be less correlated with the IT than using the previous TT generation processes. The simulated result indicates more randomness in the TT, which means better attack resistance algorithm. More room for algorithm enhancements is still needed.
Ahmad H. Al-Omari, “Dynamic Crypto Algorithm for Real-Time Applications DCA-RTA, Key Shifting” International Journal of Advanced Computer Science and Applications(IJACSA), 7(1), 2016. http://dx.doi.org/10.14569/IJACSA.2016.070110