Skip to Main content Skip to Navigation
Conference papers

A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation

Abstract : Currently, electronic documents are commonly exchanged between/among government offices in many countries. When a government office would like to transmit a high-security-level-electronic document to another office, the sending end officer needs to encrypt it so as to protect the document from being known to hackers. AES and DES have been commonly and widely invoked to protect documents in recent years. However, the two algorithms have so far faced the threats of Brute-Force cracks. To avoid the threats, in this study, we proposed a new data encryption approach, called the Secure Data Encryption Method (SeDEM for short), in which plaintext and system keys are encrypted by using a sequential-logic style encryption approach which further employs a three-dimensional operation and a feedback encryption mechanism to effectively protect encrypted data from brute-force and cryptanalysis attacks. The feedback encryption mechanism is a feedback process in which each of its calculation iteration generates three internally-used dynamic feedback keys for the next calculation iteration. The purpose is to effectively improve the security level and unpredictability of generated ciphertext. The three-dimensional operation is employed to further increase the computational complexity of the encryption technique so as to enhance the security level of the ciphertext, and difficulty of cracking the keys.
Complete list of metadata

Cited literature [13 references]  Display  Hide  Download
Contributor : Hal Ifip <>
Submitted on : Monday, June 19, 2017 - 5:01:24 PM
Last modification on : Thursday, March 5, 2020 - 4:47:34 PM
Long-term archiving on: : Friday, December 15, 2017 - 6:08:00 PM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Yi-Li Huang, Fang-Yie Leu, Cheng-Ru Dai. A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation. International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.578-592, ⟨10.1007/978-3-642-32498-7_44⟩. ⟨hal-01542445⟩



Record views


Files downloads