Indonesian Journal of Electrical Engineering and Computer Science
Vol. 19, No. 1, July 2020, pp. 248~256
ISSN: 2502-4752, DOI: 10.11591/ijeecs.v19.i1.pp248-256 248
Journal homepage: http://ijeecs.iaescore.com
Fast and robust approach for data security in communication
channel using pascal matrix
Oday Kamil Hamid, Riyadh Bassil Abduljabbar, Nazar Jabbar Alhyani
Dijlah University College, Department of Computer Techniques Engineering, Iraq
Article Info ABSTRACT
Article history:
Received Jun 21, 2019
Revised Dec 26, 2019
Accepted Jan 27, 2020
This paper described fast and robust approach of text encryption and
decryption based on Pascal matrix. The technique of encryption can be
applied on both Arabic and English text. The results shows that the ciphered
text unintelligible and rubush for the interuder or hukers. The encryption
scheme usually uses a pseudo-random encryption key generated by an
algorithm. All this done by using Pascal matrix. Encryption and decryption
simulated using MATLAB version 10 and notepad ++to write the input text.
Keywords:
Decryption
Encryption
English
Pascal matrix
Copyright © 2020 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Oday Kamil Hamid,
Department of Computer Techniques Engineering,
Dijlah University College, Iraq, Baghdad.
Email: oday.kamil@duc.edu.iq
1. INTRODUCTION
The exchange data have been advanced in the recent decay, such as e- mail, social mediea and
messages between banks and customers…etc. And these informations require protecting from unathurized
persons. Therefore, the secure information becomes necessary to protect data through storage or transmition.
The technique of transmitting and storing information in particular form that could read and process by only
who intended is called cryptography. In same time, the associated methods with scrambling plaintext into
cipher text and return back again is called decryption techniques [1]. Figure 1 illustrates this concept of
cryptography and decryption [2].
The cryptography meaning if firstly settle and study the technique of massage sending in clandestine
methods specifically enciphered shape or disguised shape. Hence, the planned receiver is only having
the automation to eliminate the mask of this message and examine it. The cryptography methods has its
etymology and krypton from Greek which mean graphing and hidden to write [3]. The plaintext and cipher
text is refer to original and disguised message respectively. The encapsulated and sent message is the final
form of cryptogram methods and the transform plaintext addicted to code wording process call enciphering
or encryption [4]. While, the method of turning the code text addicted to plaintext is call deciphering or
decryption technique which is talented by receiver that have familiarity to eliminate camouflage [5].
The cryptography include two types namely symmetric key based on classic algorithms for cryptography
using same keys for plaintext encryption and decryption of ciphering wording [6]. These key might be
matching or simple transformation among two keys which is in perform stand for the common covert among
two or more party which is used to keeping confidential data link [7]. The party's access to the secret key
required symmetric key encryption compared with public key of encryption [8] as illustrated in Figure 2 [9].