Indonesian Journal of Electrical Engineering and Computer Science Vol. 19, No. 1, July 2020, pp. 248~256 ISSN: 2502-4752, DOI: 10.11591/ijeecs.v19.i1.pp248-256 248 Journal homepage: http://ijeecs.iaescore.com Fast and robust approach for data security in communication channel using pascal matrix Oday Kamil Hamid, Riyadh Bassil Abduljabbar, Nazar Jabbar Alhyani Dijlah University College, Department of Computer Techniques Engineering, Iraq Article Info ABSTRACT Article history: Received Jun 21, 2019 Revised Dec 26, 2019 Accepted Jan 27, 2020 This paper described fast and robust approach of text encryption and decryption based on Pascal matrix. The technique of encryption can be applied on both Arabic and English text. The results shows that the ciphered text unintelligible and rubush for the interuder or hukers. The encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption simulated using MATLAB version 10 and notepad ++to write the input text. Keywords: Decryption Encryption English Pascal matrix Copyright © 2020 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Oday Kamil Hamid, Department of Computer Techniques Engineering, Dijlah University College, Iraq, Baghdad. Email: oday.kamil@duc.edu.iq 1. INTRODUCTION The exchange data have been advanced in the recent decay, such as e- mail, social mediea and messages between banks and customers…etc. And these informations require protecting from unathurized persons. Therefore, the secure information becomes necessary to protect data through storage or transmition. The technique of transmitting and storing information in particular form that could read and process by only who intended is called cryptography. In same time, the associated methods with scrambling plaintext into cipher text and return back again is called decryption techniques [1]. Figure 1 illustrates this concept of cryptography and decryption [2]. The cryptography meaning if firstly settle and study the technique of massage sending in clandestine methods specifically enciphered shape or disguised shape. Hence, the planned receiver is only having the automation to eliminate the mask of this message and examine it. The cryptography methods has its etymology and krypton from Greek which mean graphing and hidden to write [3]. The plaintext and cipher text is refer to original and disguised message respectively. The encapsulated and sent message is the final form of cryptogram methods and the transform plaintext addicted to code wording process call enciphering or encryption [4]. While, the method of turning the code text addicted to plaintext is call deciphering or decryption technique which is talented by receiver that have familiarity to eliminate camouflage [5]. The cryptography include two types namely symmetric key based on classic algorithms for cryptography using same keys for plaintext encryption and decryption of ciphering wording [6]. These key might be matching or simple transformation among two keys which is in perform stand for the common covert among two or more party which is used to keeping confidential data link [7]. The party's access to the secret key required symmetric key encryption compared with public key of encryption [8] as illustrated in Figure 2 [9].