11
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Two phases encryption and its applications

Pages 303-328 | Received 01 Jul 2002, Published online: 03 Jun 2013
 

Abstract

Using the enciphering technique to improve the security of an exist cryptosystem is the major purpose of this paper. We propose “two phases encryption model” as an enhanced cipher. It includes three basic encryption techniques that are confusion, diffusion and product. The two phases encryption model is being used for the user authentication and the resources sharing applications to provide a secure service.

If a security system is affected by the working environmental requirement and it claims to use the cryptosystem which can withstand the chosen-plaintext attack, then we can consider using the two phases encryption addressed in this article to enhance the security of a cryptosystem. So it only needs to use the cryptosystem that can resist to the known-plaintext attack in order to achieve the function of resisting the chosen-plaintext attack. Therefore, it makes the original application system more secured, economical and practical.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.