Int
ern
at
i
onal
Journ
al of Ele
ctrical
an
d
Co
mput
er
En
gin
eeri
ng
(IJ
E
C
E)
Vo
l.
10
,
N
o.
3
,
June
2020
,
pp. 3
295~
3306
IS
S
N: 20
88
-
8708
,
DOI: 10
.11
591/
ijece
.
v10
i
3
.
pp3295
-
33
06
3295
Journ
al h
om
e
page
:
http:
//
ij
ece.i
aesc
or
e.c
om/i
nd
ex
.ph
p/IJ
ECE
Effici
ent
two
-
sta
ge cr
ypt
ograph
y schem
e for s
ec
u
re dist
ributed
data st
orage in cl
oud com
pu
ting
Rabab F.
Abd
el
-
Kader
1
, Sa
mar
H.
El
-
S
he
ri
f
2
, Rawy
a Y.
R
iz
k
3
1,3
Depa
rtment
of
Elec
tr
ical Engi
n
ee
ring
,
Port
-
Sa
id
Univer
sit
y
,
Eg
ypt
2
Facul
t
y
of
Man
age
m
ent
Techno
lo
g
y
and
Inform
at
ion
S
y
st
ems
,
Port
-
Sa
id
Univ
ersity
,
Eg
y
pt
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
Oct
23
, 201
9
Re
vised
Dec
18
,
2019
Accepte
d
Ja
n
8
, 2020
Cloud
computing
envi
ronm
ent
req
uire
s
sec
ure
a
cc
ess
for
dat
a
from
the
cl
oud
serve
r,
sm
al
l
ex
e
cution
ti
m
e
,
an
d
low
ti
m
e
complexi
t
y
.
Exi
sting
tra
di
ti
on
a
l
cr
y
p
togra
ph
y
algorithms
are
no
t
suita
bl
e
for
c
l
oud
storage
.
In
thi
s
pape
r
,
an
eff
i
ci
en
t
two
-
stage
cr
y
ptog
rap
h
y
sche
m
e
is
pr
oposed
to
ac
c
ess
and
store
dat
a
int
o
cl
oud
safe
l
y
.
It
comprises
both
user
au
the
ntica
ti
on
and
enc
r
y
p
ti
o
n
proc
esses.
First
,
a
two
-
factor
aut
hen
ti
c
at
ion
sche
m
e
one
-
ti
m
e
passw
ord
is
proposed.
It
over
comes
the
wea
knesses
in
t
he
exi
st
ing
au
t
hent
i
ca
t
ion
sche
m
es.
The
pr
oposed
aut
hen
ti
c
at
ion
m
et
hod
do
es
not
req
uir
e
sp
ec
if
ic
ex
tr
a
har
dw
are
or
a
ddit
ional
proc
e
ss
ing
ti
m
e
to
ide
ntit
y
the
us
er.
Second
,
the
pl
ai
nt
ext
is
divi
ded
int
o
two
par
ts
which
are
enc
r
y
pt
ed
sepa
r
at
e
l
y
using
a
unique
ke
y
fo
r
each.
Thi
s
div
ision
inc
r
ea
ses
t
he
sec
ur
ity
of
t
he
propose
d
sche
m
e
and
in
addi
ti
on
decre
ase
s
the
enc
r
ypti
on
ti
m
e.
Th
e
ke
y
s
ar
e
gene
ra
te
d
using
logi
sti
c
ch
aos
m
odel
the
or
y
.
Chaos
equatio
n
gene
ra
te
s
diffe
ren
t
val
u
es
of
ke
y
s
which
are
ver
y
sensit
ive
to
initial
co
ndit
ion
and
cont
rol
p
ara
m
eter
val
u
es
en
te
r
ed
b
y
th
e
use
r.
Th
is
sche
m
e
ac
hi
eve
s
high
-
sec
uri
t
y
l
ev
el
b
y
int
roduc
in
g
diffe
r
ent
se
cur
ity
proc
esses
wit
h
diffe
r
ent
stage
s.
The
sim
u
la
ti
on
result
s
d
e
m
onstrat
e
th
at
th
e
proposed
sch
e
m
e
red
uce
s
the
size
of
th
e
ci
pher
te
xt
and
both
enc
r
y
pt
ion
and
dec
r
y
pti
on
ti
m
es
tha
n
competi
ng
sch
e
m
es
without
add
ing
an
y
comp
le
x
ity
.
Ke
yw
or
d
s
:
Au
t
hen
ti
cat
io
n
Chaos m
od
el
Cl
oud
c
om
pu
ti
ng sec
ur
it
y
Crypto
gr
a
phy
Decr
y
ption
/E
nc
ryptio
n
Copyright
©
202
0
Instit
ut
e
o
f Ad
vanc
ed
Engi
n
ee
r
ing
and
S
cienc
e
.
Al
l
rights re
serv
ed
.
Corres
pond
in
g
Aut
h
or
:
Ra
bab F. A
bde
l
-
Ka
der
,
Dep
a
rtm
ent o
f El
ect
rical
En
gi
neer
i
ng,
Po
rt
-
Said
Univ
ersit
y,
Po
rt
-
Said
, 425
23, E
gypt.
Em
a
il
:
rab
abf
a
kad
e
r@
e
ng.
psu.e
du.eg
1.
INTROD
U
CTION
Crypto
gr
a
phy
is
ver
y
i
m
po
rta
nt
to
conve
rt
or
iginal
te
xt
(p
l
ai
ntext)
into
e
nc
rypt
ed
te
xt
(
c
i
ph
e
rtext)
to
keep
sen
sit
ive
data
m
or
e
secu
re.
T
his
proces
s
can
be
done
by
m
any
encr
ypti
on
te
ch
niqu
es,
an
d
t
he
in
ve
rse
of
this
process
is
done
to
get
ba
ck
the
plainte
xt
us
in
g
the
c
orres
pondin
g
de
crypti
on
te
chn
i
qu
e
s.
Crypt
ogr
aph
y
te
chn
iq
ues
use
a
sec
ret
key
to
e
ncr
ypt
an
d
dec
rypt
se
ns
i
ti
ve
data.
Cry
ptogra
phy
ach
ie
ves
m
any
secur
it
y
issues li
ke
d
at
a
integ
rity
, au
th
entic
at
ion
,
no
n
-
re
pudiati
on, a
nd con
fide
ntial
it
y, so
it
g
ai
ns
high im
po
rtanc
e
[
1]
.
Stand
a
r
d
c
rypt
ogra
ph
y
al
gori
thm
s
are
cl
assifi
ed
i
nto
t
hr
e
e
m
ai
n
cat
egorie
s
[
2
]
as
sho
wn
in
Fi
g
ure
1.
Firstl
y,
sy
m
m
e
tric
al
go
rithm
s
wh
ic
h
us
e
a
sing
le
secret
key
fo
r
enc
ryptio
n
and
dec
ryptio
n.
This
ke
y
is
know
n
to
the
sen
der
a
nd
recei
ver
.
T
her
e
are
m
any
fam
ou
s
sym
metri
c
al
gorithm
s
su
c
h
a
s
D
at
a
Enc
ryptio
n
St
and
a
r
d
(D
E
S)
,
3DE
S,
A
dv
a
nce
d
E
nc
ryptio
n
Sta
ndard
(
AES),
Bl
owfish
,
RC
6.
Seco
nd
ly
,
a
sym
m
e
tric
al
gorithm
s
wh
ic
h
us
e
t
wo
keys,
the
publ
ic
key
for
enc
r
ypti
on
a
nd
pr
i
vate
key
f
or
de
crypti
on.
T
he
se
al
gorithm
s
can
be
descr
i
bed
by
hi
gh
c
om
pu
ta
ti
on
al
cost
a
nd
slow
sp
ee
d
in
c
om
par
ison
wit
h
sym
m
et
ric
alg
ori
thm
s.
There
are
m
any
exam
ple
s
of
asy
m
m
et
ri
c
al
gorithm
s
su
ch
as
Ell
ipti
c
Curve
Cry
ptog
raphy
(ECC
),
Diff
ie
Hell
m
an
,
RSA
,
and
Ell
ipti
c
Curve
Digital
S
ign
at
ure
Algor
it
h
m
(ECDSA
).
T
hir
d,
Has
h
al
gorithm
s,
com
pr
ess
data
to
be
conve
rted fr
om ar
bitrary siz
e t
o fixe
d
siz
e.
S
om
e exa
m
ples o
f
h
as
h
al
gorithm
s ar
e MD
5 and S
HA.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
3
,
J
une
2020
:
32
95
-
3306
3296
Figure
1. The
thr
ee
m
ai
n
cat
e
gories
of stan
da
rd crypt
ogra
phy al
gorithm
s
Cl
oud
c
om
pu
ti
ng
I
nfrastr
uctu
re
as
a
Ser
vice
(I
A
AS)
pr
ese
nts
an
i
m
po
rta
nt
serv
ic
e
to
use
rs
thr
ou
gh
the
internet
w
hich
cal
le
d
cl
oud
st
or
a
ge
[
3
-
6
].
The
re
are
m
any
adv
a
ntages
to
this
ser
vice
su
c
h
as
possibl
e
rem
ote
data
ac
cess
at
any
tim
e
and
on
-
de
m
and
res
ource
dep
loym
ent.
Data
m
us
t
be
store
d
safely
into
cl
oud
stora
ge,
s
o
c
rypto
gr
a
phy
is
ve
ry
i
m
po
rta
nt.
Encr
y
ptio
n
pr
ocess
m
us
t
be
done
on
file
s
befor
e
sto
rin
g
into
the
cl
oud.
I
n
a
dd
it
io
n,
a
uth
e
nt
ic
at
ion
in
cl
ou
d
is
a
ver
y
im
po
rta
nt
ste
p
wh
i
ch
prov
e
s
that
the
acce
ssin
g
use
r
is
the
real
us
e
r
[
7
-
9
]
.
Ma
ny
a
ut
hen
ti
cat
ion
sc
hem
es
wer
e
propose
d
to
aut
he
ntica
te
us
er
s
i
n
cl
ou
d,
but
a
lot
of
them
had
s
om
e
secur
it
y
tro
uble
s.
T
he
pr
e
vious
w
ork
in
a
uth
e
ntica
ti
on
process
su
f
fer
e
d
from
so
m
e
pro
blem
s
[
10
,
11
]
.
T
hese
pro
blem
s
can
be
su
m
m
arized
in
us
in
g
m
obil
e
ph
one
a
pp
l
ic
at
ion
s,
us
in
g
extra
hard
war
e,
r
ece
iving
m
essage throug
h
the
int
ern
et
,
and e
xtr
a tim
e to iden
ti
ty
the u
se
r.
In
this
pa
per,
a
two
-
sta
ge
crypto
gr
a
phy
schem
e
fo
r
secur
e
dist
rib
uted
data
stora
ge
(TCS_DD
)
is
propose
d
t
o
enc
rypt
file
s
befo
re
sen
di
ng
them
into
the
cl
oud.
It
include
s
bot
h
aut
hen
ti
cat
io
n
a
nd
crypto
gr
a
phy
s
ta
ges.
Fir
st,
a
two
-
fact
or
a
ut
hen
ti
cat
ion
s
c
hem
e
is
pr
esented
t
o
overc
om
e
the
weakn
esses
fou
nd
in
e
xisti
ng
a
uth
e
ntica
ti
on
sc
hem
es.
Second,
t
he
pla
intext
is
div
i
de
d
into
t
wo
pa
rts
sent
to
different
cl
oud
ser
ve
rs
in ord
e
r
to
guar
antee m
o
re s
ecur
it
y. I
n
each
pa
rt, only half
of the ch
a
racters
are
enc
rypted
.
Each
par
t
is
enc
rypt
ed
us
in
g
a
un
i
qu
e
ke
y
that
is
ge
ner
at
e
d
us
in
g
lo
gisti
c
c
haos
m
od
el
the
or
y
.
U
sers
can
down
l
oa
d
the
two
pa
rts
of
his
file
at
any
tim
e.
Each
char
act
e
r
in
ea
ch
pa
rt
is
de
c
r
ypte
d
usi
ng
it
s
un
i
qu
e
key
w
hich
is
gen
e
rated
fro
m
the sam
e chaos eq
uatio
n use
d
in
the e
nc
ryp
ti
on
process
.
The
orga
nizat
ion
of
this
pa
per
is
as
f
ollo
ws:
a
bri
ef
ov
erv
ie
w
of
rela
te
d
w
ork
is
presente
d
in
s
ect
ion
2.
Th
e
pro
posed
two
-
sta
ge
cry
pt
ography
sc
he
m
e
is
introduc
ed
in
s
ect
io
n
3.
Sect
io
n
4
show
s
the
sim
ulati
on
res
ults
of
t
he
pro
posed
sc
hem
e
com
par
ed
to
the
exi
sti
ng
sc
hem
es.
Finall
y,
t
he
m
a
in
con
cl
us
io
ns
a
r
e presente
d
in
s
ect
ion
5.
2.
RELATE
D
W
ORK
Diff
e
re
nt
crypt
ogra
ph
y
sc
hem
es
wer
e p
r
opose
d
to
kee
p
da
ta
secur
e b
ut
eac
h
with
it
s
own
lim
it
at
ion
s
and
dr
a
wb
ac
ks.
Subarea
in
[
12
]
pr
ese
nted
a
sche
m
e
wh
ic
h
us
ed
ECC
to
encr
ypt
th
e
plainte
xt
an
d
then
com
m
un
ic
at
ed
with
the
des
ti
nation
thr
ou
gh
a
sec
ur
e
d
channel.
Sim
ultaneousl
y,
MD5
was
us
e
d
to
get
the
has
h
val
ue
from
the
sam
e
plainte
xt.
This
val
ue
wa
s
encr
y
pted
usi
ng
DUAL
R
SA
an
d
al
so
s
ent
to
the
destinat
io
n.
This
sc
hem
e
a
chieve
d
i
nteg
rity
by
com
par
in
g
t
he
new
hash
val
ue
with
t
he
dec
rypted
on
e
a
nd
al
so
ac
hieve
d
diff
ic
ulty
for
a
tt
ackers
to
ext
r
act
the
te
xt
f
r
om
th
e
encr
y
pte
d
on
e
,
bu
t
it
use
d
tw
o
a
sym
m
et
ri
c
encr
y
ption al
gorithm
s (
ECC
and DU
AL
RS
A)
w
hich
expl
oit extra
tim
e fo
r
en
c
ryptio
n.
Anothe
r
sche
m
e
that
us
ed
a
com
bin
at
ion
of
sy
m
m
et
ric
and
asy
m
m
etr
ic
crypto
gr
a
phy
al
go
rit
hm
s
was
prese
nted
in
[
13
]
.
In
t
his
schem
e,
AES
was
use
d
firstl
y
fo
r
e
nc
ryptio
n
an
d
the
n
EC
C.
MD5
was
use
d
to
get
the
has
h
value
f
r
om
th
e
c
iph
e
rtext
a
nd
t
hen
was
com
par
ed
with
one
w
hic
h
was
eval
uated
at
the
destinat
io
n.
The
decr
y
ption
process
wa
s
al
so
pe
rfor
m
ed
by
A
ES
a
nd
ECC
.
T
his
schem
e
req
uire
d
m
or
e
tim
e fo
r
e
ncr
y
ption an
d dec
r
ypti
on
beca
us
e
two cry
ptogra
ph
y al
gorithm
s
w
e
re
us
ed
se
quentia
ll
y.
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N: 20
88
-
8708
Eff
ic
ie
nt two
-
stag
e
cry
ptograp
hy
sc
he
me
for
secure
distri
bu
te
d
data
stor
ag
e…
(Raba
b
F.
Ab
del
-
Ka
der)
3297
A
hy
br
i
d
of
sy
m
m
e
tric
and
a
sy
m
m
e
tric
al
go
rithm
s
was
pr
opos
e
d
by
Zh
u
in
[
14
]
.
AES
was
us
ed
t
o
encr
y
pt
the
plainte
xt
an
d
ECC
was
us
ed
to
encr
y
pt
the
key
and
d
i
gital
sign
at
ure
be
longed
to
t
he
AE
S
al
gorithm
.
The
key
K
AES
be
longed
to
the
AES
was
us
ed
f
or
one
ti
m
e
on
ly
by
the
se
nd
e
r.
At
t
he
re
cei
ver
side,
sig
natu
re
ver
ific
at
io
n
was
do
ne
to
ob
ta
in
t
he
ori
gin
al
in
form
ation
.
T
his
sc
hem
e
su
ff
e
red
fro
m
a low
-
sec
ur
it
y
l
evel.
A
tw
o
-
phase
hy
br
id
c
rypt
ogr
aph
y
al
go
rith
m
(TH
CA
)
f
or
wireless
netw
orks
was
pr
ese
nted
in
[
1
5
]
.
This
schem
e
sp
li
ts
the
plainte
xt
into
tw
o
pa
rts.
The
first
pa
rt
was
enc
rypt
ed
by
the
AES
al
gorithm
and
it
s
key
was
enc
rypted
us
in
g
the
E
CC
al
go
rithm
.
Both
a
re
co
ns
ide
red
asy
m
m
et
ric
cryptog
ra
phy
al
go
rit
hm
s.
The
sec
ond
pa
rt
was
e
ncr
y
pted
us
in
g
the
RSA
al
gorit
hm
.
It
al
so
us
ed
the
M
D5
al
gorithm
fo
r
in
te
gr
it
y.
The reve
rse o
f t
he
pre
vious st
eps was
done
for dec
ryptio
n
a
nd r
et
rie
ving t
he plai
ntext.
A
sec
ure
cl
ust
er
-
based
r
outi
ng
protoc
ol
(S
CB
RP)
is
al
so
prese
nted
f
or
wi
r
el
ess
sens
or
netw
orks
[
1
6
]
.
It
us
es
ada
ptive
par
ti
cl
e
s
w
arm
op
tim
iz
at
i
on
(
PS
O)
with
opti
m
iz
ed
fire
fly
al
gorithm
s
durin
g
data
transm
issio
n.
Data
in
e
nc
ryptio
n
f
or
m
was
se
nt
to
the
sink
node.
Th
e
me
ssage
that
sh
ould
be
se
nt
was
div
ide
d
int
o
tw
o
sub
-
bl
ock
s
. Th
e
fi
rst
one
w
as
encr
y
pted
usi
ng
A
ES
al
gor
it
h
m
,
bu
t
the o
ther
one
is
encry
pted
us
in
g
RC
6
al
gorithm
.
MD5
al
gorithm
was
al
so
us
e
d
to
achieve
data
integ
rity
.
SCB
RP
aim
ed
to
r
edu
ce
energy
consu
m
pt
ion
over
a
n
ind
i
vidual
node
to
im
pr
ove
the
w
ho
le
network
li
fet
i
m
e.
Ener
gy
-
e
ff
ic
ie
nt
cl
us
te
rin
g,
sec
ur
e
routin
g,
a
nd
sec
ur
it
y
ve
rificat
ion
wer
e
us
e
d
to
desig
n
SCB
RP.
H
ow
ever,
this
al
go
rithm
us
es t
wo sym
m
et
ric al
go
rith
m
s w
hich
are
c
on
si
der
e
d
a
v
e
r
y weak
point i
n
it
s
desig
n.
Existi
ng
tra
diti
on
al
crypt
ogr
aph
y
al
gorith
m
s
are
no
t
sui
ta
ble
fo
r
cl
ou
d
stora
ge.
T
he
re
are
so
m
e
requirem
ents
m
us
t
be
achie
ved
for
the
cl
oud
com
pu
ti
ng
en
vir
on
m
ent
su
ch
as
sec
ure
acce
ss
fo
r
da
ta
fr
om
the
cl
oud
ser
ve
r,
sm
al
l
execu
ti
on
tim
e,
and
lo
w
ti
m
e
com
plexit
y.
Ma
ny
recent
e
ncr
y
ption
schem
es
wer
e
app
li
ed
to data
befor
e
uploa
di
ng into
clo
ud s
tora
ge,
s
om
e are d
isc
us
se
d ne
xt.
Ba
ns
al
in
[
1
7
]
,
pr
ese
nted
a
sc
hem
e
to
store
f
il
es
into
the
cl
oud
st
or
a
ge
in
a
secur
e
m
anner.
T
he
use
r
acce
sses
the
cl
oud
stora
ge
sa
fely
us
in
g
a
uniqu
e
key.
Im
age
m
a
tc
hin
g
wa
s
us
e
d
f
or
a
uthe
ntica
ti
on
for
m
or
e
secur
it
y.
T
hen,
the
us
e
r
co
uld
up
l
oad
his
file
into
the
cl
oud.
To
kee
p
data
safe
in
the
cl
oud
st
or
a
ge,
t
he
us
er
div
ide
s
the
file
into
blo
c
ks
and
c
hose
som
e
bits
fr
om
ea
ch
one;
thes
e
bits
wer
e
en
crypted
us
in
g
the
ECC
al
gorithm
.
Af
te
r
that,
the
file
was
store
d
in
the
cl
oud
safel
y.
In
this
sche
m
e,
Me
ta
data
was
ch
os
e
n
fro
m
each
blo
c
k
a
nd
e
nc
rypted
us
i
ng
ECC
,
an
d
t
he
n
st
or
e
d
at
t
he
bac
k
of
the
file
.
I
nteg
rity
cou
l
d
be
ac
hie
v
ed
by
com
par
ing
Me
ta
data
with
the
or
igi
nal
file
a
nd
m
aking
sur
e
that
no
cha
nges
ha
ve
occ
urred.
In
this
sc
hem
e,
the
w
hole
file
was
no
t
e
nc
rypted,
only
s
om
e
bits
so
it
a
chieve
d
le
ss
over
hea
d,
CP
U
powe
r
a
nd
exe
cutio
n
tim
e.
This
sch
e
m
e
did
n
o
t
ac
hieve
e
noug
h
secur
it
y
f
or
th
e
w
ho
le
data
i
n
the
file
.
It
m
igh
t
be
us
ef
ul
on
ly
to
check i
f data
ha
d been
m
od
ifie
d or n
ot.
A
hybri
d
of
th
e
sy
m
m
et
ric
a
nd
the
asy
m
metri
c
encr
ypti
on
al
gorithm
s
f
or
cl
oud
c
om
pu
ti
ng
sec
ur
it
y
was
pro
po
s
ed
in
[1
8
]
.
Af
te
r
sel
ect
in
g
one
file
to
b
e
uploa
ded
int
o
t
he
cl
ou
d,
t
he
sy
m
m
e
tric
Blo
w
fis
h
al
gorithm
is
app
li
ed
to
enc
r
ypt
the
file
.
T
he
sec
ret
key
of
the
Bl
owfis
h
al
go
rithm
was
enc
rypte
d
us
in
g
the
asym
m
e
tric
RSA
al
gorithm
.
Af
te
r
that,
secur
e
hash
a
lgorit
hm
-
2
(SHA
-
2)
wa
s
ap
plied
to
the
en
crypted
file
to
gen
erate
the
m
essage
dig
it
.
Nex
t,
the
dig
it
al
sign
at
ur
e
al
go
rithm
(D
SA
)
was
ap
plied
to
the
pr
e
vi
ou
sly
gen
e
rated
m
es
sage
dig
it
.
S
H
A
-
2
an
d
DSA
wer
e
us
e
d
to
achieve
secu
r
e
transm
issi
on
and
aut
horizat
ion
.
Using
a
c
om
bin
at
ion
of
sym
m
et
ric
and
asy
m
m
e
tr
ic
al
gorithm
s
m
ade
the
dec
ryptio
n
process
ver
y
dif
f
ic
ult
for
hack
e
rs
to
at
ta
ck.
Howe
ver
,
it
su
ff
e
rs
f
ro
m
high
com
plex
it
y
becau
se
of
us
in
g
a
hy
br
i
d
of
sym
m
et
ri
c
and
asym
m
e
tric
algo
rithm
s in
ad
di
ti
on
to
S
HA
-
2 and D
SA f
or a
uth
e
ntica
ti
on
.
Chu
e
h
et
al
.
de
sign
e
d
a
nd
i
m
ple
m
ented
a
secur
it
y
syst
em
fo
r
cl
oud
st
or
a
ge
[
1
9
]
.
T
he
schem
e
us
ed
the third
par
ty
au
dito
r
(T
PA)
with the A
E
S en
cry
ption
alg
or
it
h
m
f
or
sto
rin
g
file
s into
the
cl
oud
safely
. Before
up
l
oad
i
ng
a
file
into
the
cl
ou
d,
a
32
-
byte
pa
sswor
d
is
ge
ne
rated
ra
nd
om
ly
and
s
ubj
ect
e
d
to
a
pass
w
ord
-
base
d
key
de
rivati
on
functi
on
2
(PB
KD
F
2)
an
d
HMAC
-
SHA
256
t
o
pr
oduce
the
de
rive
d
en
crypti
on
key.
This
ke
y
was
us
ed
to
e
ncr
y
pt
the
ori
gin
al
file
us
in
g
the
AES
en
crypti
on
al
gori
thm
.
Af
te
r
the
encr
y
ption
pr
ocess,
the
us
er
c
ou
l
d
enter
a
pas
swor
d
w
hich
would
be
co
nsi
der
e
d
a
m
as
te
r
key
after
app
ly
in
g
(P
B
KDF2).
This
m
ast
er
key
was
us
ed
to
encr
ypt
the
e
ncr
y
ption
key.
Finall
y,
the
encr
y
pted
file
was
sent
to
th
e
cl
ou
d
stora
ge
prov
i
de
r
(CS
P),
an
d
the
enc
rypte
d
encr
y
ption
key
was
se
nt
to
th
e
TPA.
Using
the
TP
A
for
st
or
i
ng
the
enc
rypte
d
key
of
t
he
e
nc
rypted
file
pr
e
ven
te
d
a
ny
use
r
or
C
SP
it
sel
f
from
decr
ypti
ng
the
e
nc
rypt
ed
file
.
This
sc
hem
e
a
chieve
d
bette
r
key
m
anag
em
e
nt
in
a
ddit
ion
t
o
sa
fer
ve
rificat
ion
.
A
ny
tim
e
,
the
us
e
r
co
ul
d
get
t
he
enc
rypte
d
f
il
e
fr
om
the
CSP
an
d
t
he
e
nc
ryptio
n
key
fro
m
the
TPA.
T
he
n,
he
c
ou
l
d
de
crypt
the
e
nc
ryption
key
by
us
in
g
hi
s
pr
e
-
c
hosen
pa
sswor
d
to
get
the
m
ast
er
key.
Finall
y,
he
cou
l
d
dec
rypt
the
encr
ypte
d
file
and
get
the
s
ource
file
safely
.
I
n
t
his
sc
hem
e,
the
key
need
e
d
t
o
be
e
ncr
ypte
d
befo
re
sto
rin
g
into
t
he
TP
A
wh
ic
h
cause
d
m
or
e over
hea
d
a
nd in
creased
co
m
plexity
.
A
c
iph
e
rtext
P
olicy
Attribu
te
-
Ba
sed
E
ncr
y
pt
ion
(CP
-
ABE
)
schem
e
was
pro
po
se
d
by
K.
Ha
n
an
d
oth
e
rs
in
[
20
]
.
This
sc
hem
e
dep
en
de
d
on
ge
ner
at
in
g
keys
with
m
ulti
ple
at
tribu
te
s
us
in
g
m
ulti
ple
distrib
uted
par
ts.
It
al
s
o
a
chieve
d
backw
ard
secrecy
by
updatin
g
at
tri
bu
te
s
an
d
re
-
e
ncr
y
pted
ci
ph
e
rtext.
In
this
s
chem
e,
Diff
e
re
nt
crypt
ogra
ph
y
sche
m
es
wer
e
pro
po
s
ed
to
keep
data
secur
e
but
each
with
it
s
own
lim
it
a
tio
ns
a
nd
dr
a
w
back
s
.
S
ub
a
rea
in
[
12
]
pr
esented
a
schem
e
wh
ic
h
us
e
d
ECC
to
encr
ypt
th
e
plainte
xt
an
d
then
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
3
,
J
une
2020
:
32
95
-
3306
3298
com
m
un
ic
at
ed
with
the
des
ti
nation
thr
ou
gh
a
sec
ur
e
d
channel.
Sim
ultaneousl
y,
MD5
was
us
e
d
to
get
the
has
h
val
ue
from
the
sam
e
plainte
xt.
This
val
ue
wa
s
encr
y
pted
usi
ng
DUAL
R
SA
an
d
al
so
s
ent
to
the
destinat
io
n.
This
sc
hem
e
a
chieve
d
i
nteg
rity
by
com
par
in
g
t
he
new
hash
val
ue
with
t
he
dec
rypted
on
e
a
nd
al
so
ac
hieve
d
diff
ic
ulty
for
a
tt
ackers
to
ext
r
act
the
te
xt
f
r
om
the
encr
y
pte
d
on
e
,
bu
t
it
use
d
tw
o
a
s
ym
m
et
ri
c
encr
y
ption al
gorithm
s (
ECC
and DU
AL
RS
A)
w
hich
expl
oit extra
tim
e fo
r
en
c
ryptio
n.
Secu
rity
-
Aw
a
r
e
Ef
fici
ent
Distribu
te
d
St
or
a
ge
(SA
-
ED
S)
sc
hem
e
was
pr
opose
d
in
[
21
]
.
Ther
e
w
ere
three
al
gorith
m
s
us
ed
in
thi
s
schem
e.
The
first
is
cal
le
d
the
Alte
r
nati
ve
Data
Dist
rib
ution
(AD
2)
al
gorithm
wh
ic
h
was
use
d
to
kn
ow
if
the
plainte
xt
nee
ds
t
o
be
div
ide
d
a
nd
st
or
e
d
i
n
distrib
uted
cl
oud
ser
ver
s
.
The
sec
ond
on
e
is
cal
le
d
Secur
e
E
ff
ic
ie
nt
Data
Distrib
ution
s
(S
E
D
2)
al
gorithm
wh
ic
h
too
k
t
he
plain
te
xt
as
input
an
d
g
a
ve
two
se
par
at
e
ci
ph
erte
xts
as
ou
t
pu
t.
T
he
t
hir
d
one
is
cal
le
d
the
Eff
ic
i
ent
Data
Co
nfl
at
ion
(ED
C
on)
al
gorithm
wh
ic
h
was
us
e
d
to
enab
le
us
e
rs
t
o
ret
rieve
t
he
te
xt
by
m
ergi
ng
t
he
tw
o
s
epar
at
e
c
iph
e
rtexts
fro
m
distribu
te
d
cl
oud
ser
ver
s
.
It
too
k
the
tw
o
encr
y
pted
pa
rts
of
the
te
xt
and
the
ke
y
an
d
the
n
gav
e
the
plaint
ext.
In this sc
hem
e, u
sin
g
t
hr
e
e algori
thm
s caus
e
d
m
or
e ove
rh
ea
d
a
nd m
or
e com
plexity
.
Desig
n
a
nd
im
plem
entat
ion
of
the
sel
f
-
enc
r
ypti
on
m
et
ho
d
on
file
sec
ur
it
y
wer
e
pr
opose
d
i
n
[
22
].
The
sc
hem
e
was
a
pp
li
e
d
to
the
te
xt
befor
e
uploa
ding
it
into
the
c
loud.
It
di
vide
d
the
plainte
xt
an
d
the
ci
pherte
xt
into
1024
bits
chun
ks
us
in
g
t
he
XO
R
proce
ss.
T
he
sc
hem
e
us
e
d
the
date
an
d
sta
rtin
g
ti
m
e
of
the
enc
ryptio
n
process
as
a
s
eed
key.
It
al
s
o
us
ed
a
da
ta
ba
se
f
or
st
or
i
ng
the
I
D
of
the
file
wh
ic
h
c
onta
ine
d
the
plainte
xt
and
the
key.
At
the
dec
ryp
ti
on
ph
a
se,
t
he
key
was
re
trie
ved
f
ro
m
the
database
to
get
the
plainte
xt.
Stor
i
ng
the
ke
y
into
the
database
was
co
ns
i
der
e
d
a
dr
a
w
ba
ck
in
this
sch
e
m
e
becau
se
it
cou
ld
b
e att
acke
d.
3.
THE
PROPO
SED T
CS_DD
IN
CLO
U
D CO
MP
UTING
In
this
pa
per,
a
two
-
sta
ge
cr
yptogra
ph
y
sc
hem
e
is
pr
opose
d
to
acce
ss
and
sto
re
data
into
cl
ou
d
stora
ge
sa
fely
.
In
t
he
fi
rst
sta
ge,
t
he
sc
he
m
e
arch
ives
use
r
aut
he
ntica
ti
on
us
in
g
th
e
pro
po
se
d
T
w
o
-
Fact
or
Au
t
hen
ti
cat
io
n
Schem
e
(TFA
S)
t
o
prov
e
tha
t
the
acce
ssi
ng
us
e
r
is
t
he
rea
l
us
er
.
T
he
firs
t
factor
dep
e
nd
s
on
a
tradit
ion
al
use
r
nam
e
and
pa
sswor
d.
T
he
se
cond
fact
or
d
e
pends
on
the one
-
ti
m
e
passw
ord
(
OTP)
te
ch
nique.
The
us
er
acce
s
ses
his
cl
oud
a
ccount
f
or
d
ow
nlo
a
d
or
uploa
ds
his
file
us
i
ng
O
TP
wh
ic
h
i
s
su
ccess
f
ul
f
or
only
on
e
lo
gin
.
In
the
sec
ond
s
ta
ge,
the
file
to
be
store
d
is
sp
li
t
into
two
pa
r
ts
and
enc
rypt
ed
at
the
us
er
side
befor
e
sen
ding
it
int
o
the
cl
oud.
T
he
tw
o
e
ncr
y
pted
par
ts
are
sto
r
ed
i
nto
t
wo
d
if
fer
e
nt
se
rv
e
rs.
Fil
es
can
be
di
vid
e
d
into
m
or
e
par
t
s
an
d
st
or
e
d
in
to
m
or
e
tha
n
t
wo
ser
vers,
bu
t
lim
it
ing
the
di
vision
to
t
wo
reduces
t
he
overh
ea
d
and im
pr
ov
es
the e
ff
ic
ie
ncy.
Ther
e
f
or
e,
the
us
er
m
us
t creat
e two cl
oud ac
counts.
A
uniq
ue
key
is
us
ed
to
en
c
r
ypt
each
odd
c
har
act
er
of
da
ta
,
so
we
nee
d
a
nu
m
ber
of
st
ream
key
s
equ
al
to
hal
f
the
siz
e
of
the
plainte
xt.
T
o
ge
ner
at
e
the
re
qu
i
red
keys,
log
ist
ic
cha
os
m
od
el
theor
y
is
us
ed
wh
ic
h
de
pe
nd
s
on
tw
o
im
po
r
ta
nt
par
am
et
ers
(initi
al
conditi
on
x0
a
nd
c
ontr
ol
par
am
et
e
r
µ).
T
he
us
er
enter
s
diff
e
re
nt
par
a
m
et
ers
to
encry
pt
each
pa
rt,
so
it
is
ver
y
di
ff
ic
ult
f
or
a
n
at
ta
cker
to
pr
e
dict
these
val
ue
s
and
decr
y
pt
the
plainte
xt.
T
he
c
har
act
erist
ic
s
of
t
he
ge
ne
rated
ra
ndom
sequ
e
nces
a
dher
e
to
al
l
perf
orm
ance
char
act
e
risti
cs
of
c
ha
os
m
od
e
ls
as
desc
ribe
d
in
[
23
,
24
]
.
T
hese
c
har
act
e
risti
cs
can
be
sum
m
arized
as,
e
nd
i
ng
the
pro
blem
of
rep
et
it
ion,
go
od
ra
ndom
ness
and
c
om
plexity
,
extrem
e
sensiti
vity
to
init
ial
conditi
on
s
,
a
nd
l
ow
cost
with sim
pl
e it
erati
on
.
To
retrieve
hi
s
file
,
t
h
e
us
e
r
fi
rst
do
wn
l
oa
ds
t
he
tw
o
pa
rts
of
t
he
file
an
d
decr
y
pts
each
pa
rt
separ
at
el
y,
a
nd
then
m
erg
es
the
tw
o
decr
y
pted
par
ts
form
i
ng
the
or
i
gin
al
file
.
T
his
sch
e
m
e
keep
s
data
m
or
e
secur
e
beca
us
e
each
s
pecific
us
er
is
ca
pa
ble
of
decr
y
pting
his
file
as
he
has
the
s
ole
a
ccess
to
the
c
on
t
rol
par
am
et
ers
us
e
d
in
ge
ne
rati
ng
the
keys
.
It
al
so
ac
hieves
l
ess
com
plexity
an
d
reduces
t
he
e
xecu
ti
on
ti
m
e
of
encr
y
ption an
d dec
ryptio
n pro
cesses.
3.1.
Sta
ge 1:
Au
t
hen
tica
tio
n u
sin
g
TF
AS
In
t
his
sta
ge
,
a
two
-
fa
ct
or
authe
ntica
ti
on
te
ch
nique
i
s
presente
d.
This
sc
hem
e
us
es
OTP
a
s
the
seco
nd
fac
tor
of
authe
ntica
ti
on
in
ad
diti
on
to
the
tra
diti
on
al
us
er
na
m
e
and
pass
w
ord
as
the
first
factor.
The
process
c
on
sist
s
of
f
our
phases;
reg
ist
rati
on
phase,
log
i
n
ph
a
se,
e
nc
ryptio
n
ph
ase
,
an
d
a
uth
e
nti
cat
ion
ph
a
se.
Durin
g
the
init
ia
l
us
er
-
re
gistrati
on
phase,
t
he
us
e
r
sel
ect
s
his
us
e
r
nam
e
and
pas
swor
d.
S
ubseq
uen
tl
y,
the
use
r
sel
ect
s
a
patte
r
n
c
onta
ins
f
our
cel
ls
in
any
orde
r
from
a
3×3
gri
d.
The
gri
d
c
onta
ins
9
cel
ls
num
be
r
e
d
from
C1
to
C
9.
Eac
h
of
thes
e
cel
ls
co
ntain
s
a
nu
m
ber
ra
ng
i
ng
f
r
om
0
to
99.
T
hese
num
ber
s
are
ra
ndom
ly
gen
e
rated
.
For
the
cho
se
n
pa
tt
ern
,
the
us
e
r
enters
the
num
ber
w
hich
re
pr
esents
each
cel
l
and
app
e
ars
on
it
.
Both
the
num
ber
s
in
t
he
patte
rn
a
nd
the
le
ngth
of
it
is
cha
ng
e
d
e
ver
y
l
ogin
f
or
t
he
sam
e
us
e
r.
F
or
exa
m
ple,
he
can
ente
r
the
num
ber
s
w
hich
are
a
pp
ea
red
on
C1
,
C2
,
C3,
C6
or
C1,
C2,
C
5,
C4
or
C3,
C6
,
C9,
C8.
The
on
ly
restri
ct
ion
for
the
use
r
is
that
he
m
us
t
recall
the
orde
r
of
t
he
c
hosen
cel
ls
to
us
e
it
at
the
lo
gin
p
ha
se
.
Upo
n
the c
omplet
ion
of
a
ne
w
-
us
er
re
gistra
ti
on
, th
e
us
e
r
nam
e, p
assw
ord
an
d
t
he
patte
r
n
w
hich
a
re c
hose
n
by
the user a
re s
t
ored
in
t
he data
base.
T
his
phas
e is il
lustrate
d
i
n
Fi
gure
2.
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N: 20
88
-
8708
Eff
ic
ie
nt two
-
stag
e
cry
ptograp
hy
sc
he
me
for
secure
distri
bu
te
d
data
stor
ag
e…
(Raba
b
F.
Ab
del
-
Ka
der)
3299
At
the
lo
gin
phase,
a
l
og
i
n
pag
e
ap
pears
to
the
us
e
r,
in
wh
ic
h
he
m
us
t
enter
his
use
r
nam
e
an
d
pass
word
w
hic
h
he
ha
d
c
hos
en
at
the
reg
is
trat
ion
ph
a
se.
The
n
a
gri
d
of
3×3
cel
ls
will
appear
t
o
the
us
er
.
The
num
ber
s
s
how
n
on
the
gri
d
cel
ls
a
re
ra
ndom
ly
gen
era
te
d.
E
ve
ry
cel
l
co
ntains
a
num
ber
rangin
g
from
0
to
99.
So
th
e
n
um
ber
s
can
be
f
or
m
ed
from
on
e
dig
it
or
tw
o
dig
it
s.
Ther
e
f
or
e,
t
he
le
ng
th
of
the
patte
r
n
form
ed
fr
om
t
he
fou
r
cel
ls
c
ho
s
en
at
the
r
egistrat
ion
ph
a
se
m
ay
be
4,
5,
6,
7,
or
8
digi
ts.
Each
at
tem
pt
by
the
us
er
to
lo
g
in,
t
he
gr
i
d
dis
play
s
a
rand
om
nu
m
ber
in
e
ac
h
cel
l.
The
use
r
m
us
t
rem
e
m
ber
the
patte
r
n
wh
ic
h
he
ha
d
ch
os
e
n
at
the
reg
ist
rati
on
ph
a
se
an
d
enters
the
num
ber
s
li
ste
d
on
th
e
cel
ls
cor
res
pondin
g
to
the
c
ho
s
e
n
patte
rn. T
hese
nu
m
ber
s a
re t
he
n
e
ncr
y
pted u
sing a s
pecial
e
ncr
y
ption ap
plica
ti
on
.
Figure
2.
The
pro
po
se
d TF
A
S schem
e
Nex
t,
durin
g
the
encr
y
ption
ph
ase,
a
de
sk
to
p
ap
plica
ti
on
is
us
e
d
to
enc
rypt
the
password
.
Wh
e
n
the
us
e
r
runs
this
a
ppli
cat
ion
,
a
wi
nd
ow
form
is
disp
la
ye
d.
T
he
f
orm
asks
the
use
r
to
e
nter
his
us
er
nam
e
and
pas
swor
d,
a
nd
t
he
n
the
c
on
te
nt
s
of
t
he
4
-
cel
l
wh
ic
h
ha
d
be
en
got
at
the
log
in
phase.
If
al
l
inf
or
m
at
ion
is
entere
d
c
orrectl
y
in
the
f
or
m
,
the
us
er
ca
n
c
li
ck
on
a
bu
tt
on
to
r
un
the
c
ode
of
t
he
e
ncr
y
ptio
n
process
.
The
outp
ut
of
t
he
en
crypti
on
co
de
m
ay
be
4,
5,
6,
7,
or
8
dig
it
s.
T
his
outp
ut
is
us
e
d
as
OT
P
w
hich
is
the sec
ond fact
or of a
uth
e
ntica
ti
on
in
this s
c
hem
e.
Finall
y,
the
a
uth
e
ntica
ti
on
ph
a
se,
the
use
r
m
us
t
enter
his
use
r
nam
e,
pass
w
ord,
a
nd
OTP
i
nto
the
log
i
n
pag
e
.
This
O
TP
m
a
y
be
4,
5,
6,
7,
or
8
dig
it
s.
Its
le
ng
th
m
ay
be
change
d
e
very
log
in
for
the
sam
e
us
er
.
All
of
thi
s
inf
or
m
at
ion
is
sent
to
the
se
rv
e
r.
On
the
se
rv
e
r
-
si
de,
the
s
erv
e
r
has
t
he
s
a
m
e
encr
ypti
on
co
de
wh
ic
h
exists
at
the
us
er
side
.
It
is
us
ed
to
en
crypt
the
co
ntents
of
the
cel
ls
wh
ic
h
represe
nt
the
us
er
patte
r
n.
A
com
par
iso
n
is
per
f
or
m
ed
betwee
n
the
r
ecei
ved
O
TP
and
the
e
valua
te
d
on
e
.
If
th
e
com
par
ison
proces
s
is
su
cces
sf
ul,
the
us
er
can
acce
ss
the
sy
stem
.
Othe
rw
i
se,
a
n
e
rror
m
essage
is
di
sp
la
ye
d
t
o
t
he
us
e
r.
The
a
uth
e
ntica
ti
o
n process
is
il
lustrate
d
in
Fi
gu
re
2.
The
pr
opos
e
d
TFA
S
sc
hem
e
can
resist
pract
ic
al
at
ta
cks.
It
ov
e
rc
om
es
the
weaknesse
s
in
the
existi
ng
schem
es.
It
is
easy
for
us
e
r
s,
does
not
ha
ve
str
ong
co
nst
rains,
does
not
de
pe
nd
on
receivin
g
a
m
essage
thr
ough the
int
ern
et
,
and
does
not re
quire s
pe
ci
fic extra
h
a
r
dw
a
re
or ext
ra
tim
e to iden
ti
f
y t
he
use
r.
3.2.
St
age
2:
Cryp
togr
ap
h
y
In
t
his
sta
ge,
the
plainte
xt
is
div
i
ded
i
nto
two
par
ts
se
nt
to
di
ff
e
ren
t
cl
oud
ser
ve
rs
.
Each
par
t
is
encr
ypte
d
usi
ng
a
uniq
ue
ke
y
that
is
gen
e
rated
us
in
g
lo
gi
sti
c
chao
s
m
od
el
the
or
y.
In
t
he
de
crypti
on,
each
char
act
e
r
is
de
crypted
us
i
ng
it
s
uniq
ue
ke
y
wh
ic
h
is
ge
ner
at
e
d
f
r
om
the
sam
e
chao
s
e
quat
ion
use
d
i
n
the en
c
ryptio
n process
.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
3
,
J
une
2020
:
32
95
-
3306
3300
3.2.1.
The encr
yp
ti
on pr
ocess
The
ste
ps
of
t
he
en
crypti
on
process
a
re
il
lustrate
d
in
Fi
g
ure
3.
I
n
th
e
e
ncr
y
ption
proc
ess,
fir
stl
y,
the
le
ngth
of
the
plainte
xt
(n)
is
determ
ined.
The
plai
ntext
is
div
i
ded
into
two
pa
rts;
Par
t
A
(
0:
(
n/
2)
-
1)
a
nd
Part B (
n/2
: n
). On
ly
od
d
-
nu
m
ber
e
d
c
har
act
er
s in
each
par
t
will
b
e enc
rypt
ed
by a
un
i
qu
e
key g
e
ner
at
e
d usin
g
th
e
cha
os
m
odel
theor
y
w
hile
the
eve
n
-
nu
m
ber
e
d
c
har
act
e
rs
rem
ai
n
with
ou
t
e
ncr
y
ption
in
orde
r
to
m
i
nim
ize
the
enc
ryptio
n
and
dec
ryptio
n
tim
e.
The
e
ncry
ption
k
ey
s
a
re
ge
ner
at
e
d
us
in
g
the
f
or
m
ula o
f
the
l
og
ist
ic
ch
ao
s
m
od
el
[
2
5
]:
k
n
+
1
=
μ
k
n
(
1
−
k
n
)
(
1)
The
us
e
r
c
hoose
s
a
ra
ndom
nu
m
ber
f
or
μ
and
k
0
su
c
h
t
hat
μ
∈
[
0
,
4
]
,
a
nd
k
∈
(
0
,
1
)
res
pecti
vely
.
The
n
f
or
each
n,
t
he
c
orrespo
nd
i
ng k
n+
1
is cal
culat
ed by (
1).
Figure
3. The
e
ncr
y
ption p
ro
c
ess of TC
S_D
D
Fo
r
Pa
rt
A
,
the
us
e
r
e
nters
t
he
init
ia
l
cond
it
ion
of
the
cha
os
f
or
m
ula
k
0A
an
d
the
c
on
t
ro
l
pa
ram
et
er
μ
A
.
Stream
keys
are
ge
ne
rated
usi
ng
l
og
ist
ic
c
haos
f
or
m
ula.
So
m
e
sy
m
bo
ls
m
us
t
be
e
ncr
y
pted
i
n
this
pa
rt
;
each
on
e
is e
nc
rypted
w
it
h i
ts un
i
qu
e
k
ey
us
i
ng XOR.
C
A
=
ASCII
(
s
i
)
XOR
ASCII
(
k
A
[
l
]
)
(2)
W
he
re
C
A
re
presents
each
e
nc
rypted
c
har
ac
te
r
of
Part
A
,
s
i
(for
i=
0
t
o
i=
(n
/
2)
-
1)
re
pr
e
s
ents
a
cha
racter
in
Part
A
,
k
A
[
l
]
is
the
ar
ray
of
ke
ys
us
ed
to
e
nc
rypt
Pa
rt
A.
T
he
en
crypte
d
c
har
act
er
s
of
Pa
rt
A
a
re
ap
pe
nded
t
o
the
Ci
ph
e
rtext
of
P
a
rt
A
(E
A
)
us
in
g
the
f
un
ct
ion
:
E
A
.appe
nd
te
xt(C
A
)
in
t
he
enc
ryptio
n
al
gorithm
sh
ow
n
in
Figure
4
w
hile
the
une
ncr
ypt
ed
cha
racters
are
ap
pe
nd
e
d
us
in
g
the
f
un
c
ti
on
:
E
A
.appe
ndte
xt(
s
i
)
as
s
ho
wn
i
n
the alg
or
it
hm
.
Fo
r
Pa
rt
B,
the
us
e
r
enter
s
th
e
init
ia
l
co
nd
it
ion
of
c
ha
os
f
orm
ula
k
0B
an
d
t
he
co
ntr
ol
par
am
et
er
μ
B
.
The
sam
e p
re
vi
ou
s
steps
are d
on
e
to
e
nc
rypt
so
m
e sy
m
bo
ls of Part B
.
C
B
=
ASCII
(
s
j
)
XOR
ASC
II
(
k
B
[
l
]
)
(3)
W
he
re
C
B
repr
esents
eac
h
e
nc
rypted
cha
rac
te
r
of
Pa
rt
B,
s
j
(
for
j
=n/
2
to
j
=
n)
represe
nts
each
c
harac
te
r
in
Part
B,
k
B
[
l
]
is
the
a
rr
ay
of
keys
us
e
d
to
e
nc
rypt
Pa
rt
B,
an
d
E
B
is
the
Ci
phe
rtext
of
Pa
rt
B
wh
ic
h
is
ap
pe
nded
us
in
g
t
he
f
un
ct
ion
:
E
B
.a
pp
e
nd
te
xt
(C
B
)
in
the
al
gorith
m
.
The
oth
e
r
sym
bo
ls
of
Part
B
a
re
a
ppen
de
d
us
in
g
t
he
fu
nc
ti
on
:
E
B
.a
ppe
nd
te
xt
(
s
j
)
as
i
ll
us
trat
ed
i
n
t
he
al
gorithm
wh
ic
h
is
sho
wn
in
Fig
ure
4.
Wh
e
n
the
e
nc
r
ypti
on
proce
ss
is
com
plete
,
th
e
us
e
r
ca
n
sen
d
E
A
to
a
cl
ou
d
se
rv
e
r,
w
hile
E
B
is
se
nt
to
a
no
t
her
cl
oud
se
rv
e
r
t
o ens
ur
e
d
at
a
se
cur
it
y. Fi
g
ure
4
s
hows
the
pse
udo
-
co
de of
the e
ncr
y
ption
process
.
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N: 20
88
-
8708
Eff
ic
ie
nt two
-
stag
e
cry
ptograp
hy
sc
he
me
for
secure
distri
bu
te
d
data
stor
ag
e…
(Raba
b
F.
Ab
del
-
Ka
der)
3301
Pseu
d
o
-
co
d
e of
en
cry
p
tio
n
pro
cess
Inp
u
t
: F
(
p
lain
te
x
t)
Ou
tp
u
t :
E
A
(
cip
h
ertext o
f
Par
t A
),
E
B
(ciph
ertext o
f
Par
t B)
1.
n
=
.
ℎ
//Get leng
th
of
plain
tex
t
2.
Let
i
=0
; L
et
j
=n
/2
; L
et
=0
;
//in
itial va
lu
es
3.
Declar
e
K
A
[
]
and
K
B
[
]
//Arr
a
y
s
K
A
an
d
K
B
sav
e
k
ey
s
us
ed
to en
cry
p
t Pa
rt
A a
n
d
B
resp
ectiv
ely
4.
Inp
u
t k
A
[
0
]
//Inp
u
t initial co
n
d
itio
n
of
chao
s
f
o
r
m
u
la (
rand
o
m
valu
e
f
ro
m
0 to
1)
f
o
r
Part
A
,
k
0A
5.
Inp
u
t
µ
A
//Inp
u
t
co
n
trol p
ara
m
ete
r
(
r
an
d
o
m
v
alu
e f
ro
m
1 to
4) f
o
r
Part
A
6.
Inp
u
t k
B
[
0
]
//Inp
u
t initial co
n
d
itio
n
of
chao
s
f
o
r
m
u
la (
rand
o
m
valu
e
f
ro
m
0 to
1)
f
o
r
Part
B, k
0B
7.
Inp
u
t
µ
B
//Inp
u
t
co
n
trol p
ara
m
ete
r
(
r
an
d
o
m
v
alu
e f
ro
m
1 to
4) f
o
r
Part
B
8.
Do
{
9.
P
A
=
∑
=
2
−
1
=
0
//Part
A
,
represen
t
sy
m
b
o
l of
Par
t
A
10.
C
A
= ASC
II
(
)
XOR
ASCI
I
(k
A
[
])
//Encry
p
t
each s
y
m
b
o
l
with
its un
iq
u
e key
11.
E
A
.app
en
d
tex
t (
C
A
)
//Ap
p
en
d
eac
h
encry
p
ted
char
to E
A
12.
i++
//in
cre
m
en
t
i
13.
E
A
.app
en
d
tex
t (
)
//ap
p
en
d
char
to
E
A
14.
K
A
[
+1
]
= µ
A
k
A
[
](1
-
k
A
[
])
//Gen
erate
a
k
e
y
u
sin
g
chao
s f
o
r
m
u
la
15.
i
++
//in
cre
m
en
t
i
16.
P
B
=
∑
=
=
/
2
//Part
B,
represen
t
the sy
m
b
o
l
of
Par
t
B
17.
C
B
=
ASCI
I
(
)
XOR
ASCI
I
(k
B
[
])
//Encry
p
t
each s
y
m
b
o
l
with
its un
iq
u
e key
18.
E
B
.app
en
d
tex
t (
C
B
)
//ap
p
en
d
eac
h
encry
p
ted
char to
E
B
19.
j++
//in
cre
m
en
t
j
20.
E
B
.app
en
d
tex
t (
)
//ap
p
en
d
char
to
E
B
21.
K
B
[
+1
]
= µ
B
k
B
[
](1
-
k
B
[
])
//Gen
era
te
a
k
e
y
u
sin
g
chao
s f
o
r
m
u
la
22.
j++
//in
cre
m
en
t
j
23.
++}
//in
cre
m
en
t
24.
W
h
ile(i<
n/2
&&
j
<
n
)
//Rep
eat this
loo
p
un
til i=n/2
and
j= n
Figure
4. The
ps
e
udo
-
c
ode
of the e
ncr
y
ption p
ro
ces
s
3.2.2.
The
de
cr
yp
ti
on pr
ocess
Figure
5
il
lustr
at
es
the
ste
ps
of
the
d
ecry
ption
process
.
Th
e
us
er
ca
n
do
w
nlo
a
d
his
data
at
any
tim
e.
Each
data
part
is
retrieved
from
the
cor
res
pondin
g
cl
oud
se
rv
e
r
sa
ved
on
an
d
de
crypted
se
pa
r
at
el
y.
As
ex
plaine
d
befor
e
in
t
he
encr
y
ption
pro
cess,
the
odd
char
act
e
rs
of
the
Ci
ph
e
rtext
of
Pa
rt
A
(E
A
)
are
decr
y
pted
us
i
ng
t
he
fo
ll
ow
ing
e
quat
ion
after
e
nterin
g
the
init
ia
l
co
nd
it
io
n
of
c
ha
os
f
orm
ula
k
0A
and
the contr
ol
para
m
et
er
μ
A
w
hich were
u
se
d
at
t
he
en
c
ryptio
n process
f
or
t
his
pa
rt.
D
A
=
ASCII
(
s
i
)
XOR
A
SCII
(
k
A
[
l
]
)
(4)
W
he
re
D
A
re
pr
ese
nts
eac
h
decr
y
pted
c
ha
racter
of
part
A,
s
i
rep
rese
nts
each
c
harac
te
r
in
E
A
,
K
A
[
l
]
is
the
a
rr
ay
of
TCS_
DD
keys
us
e
d
t
o
decr
y
pt
E
A
.
Each
de
crypted
cha
rac
te
r
is
a
pp
e
nde
d
to
the
plaint
ext
(
F)
us
in
g
the
func
ti
on
:
F.a
ppen
dt
ext
(D
A
)
in
th
e
al
gorithm
.
The
ot
her
sym
bo
ls
of
this
par
t
are
ap
pe
nd
e
d
us
in
g
the fu
nction:
F.
app
e
ndte
xt
(
s
i
) a
s sho
wn in t
he a
lgorit
hm
in
Figure
6.
Fo
r
the
sec
o
nd
pa
rt
of
t
he
da
ta
,
the
e
xact
s
a
m
e
ste
ps
ar
e
rep
eat
e
d.
First,
the
us
e
r
e
nter
s
the
i
niti
al
conditi
on
of
c
haos
f
or
m
ula
k
0B
and
the
c
on
t
ro
l
par
am
et
er
μ
B
w
hi
ch
we
re
us
ed
at
the
enc
ryption
proce
ss
f
or
this pa
rt.
Nex
t,
the TCS
_DD
s
tream
k
ey
s ar
e
gen
e
rated
u
si
ng lo
gisti
c cha
os f
or
m
ula.
D
B
=
ASCII
(
s
j
)
XOR
A
SCII
(
k
B
[
l
]
)
(5)
W
he
re
DB
re
pr
ese
nts
eac
h
decr
y
pted
c
ha
racter
of
Pa
rt
B,
s_j
re
pr
e
s
ents
eac
h
c
ha
r
act
er
in
EB,
KB
[l]
is
the
arr
ay
of
keys
us
e
d
to
de
crypt
EB.
Th
e
functi
on
:
F.
a
pp
e
ndte
xt
(
DB
)
in
the
al
gorit
hm
is
us
ed
to
app
e
nd
the
decr
ypte
d
char
act
e
rs
to
Plai
ntext
(
F),
wh
il
e
t
he
func
ti
on
:
F
.appe
ndte
xt
(s
_j)
is
use
d
t
o
a
ppen
d
ot
her
sy
m
bo
ls o
f
t
hi
s p
a
rt as s
how
n i
n
the al
gorith
m
p
resen
te
d
i
n Fi
g
ure
6.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
3
,
J
une
2020
:
32
95
-
3306
3302
Figure
5. The
decr
y
ption p
rocess o
f
TC
S_D
D
Pseudo
-
co
de of
de
cryp
tion pro
cess
in
p
u
t: E
A
(ciph
erte
x
t of
Par
t A)
,
E
B
(c
ip
h
ertext o
f
Par
t B
)
o
u
tp
u
t: F (
p
lain
tex
t)
1.
n
A
=
E
.
ℎ
// Get
th
e
len
g
th
of the f
irst decr
y
p
ted
part
2.
Declar
e
k
A
[
]
:
ar
r
ay
of
d
o
u
b
le
//Arr
a
y
of
K
A
sav
e
k
ey
s wh
ich
ar
e us
e
d
to d
ecry
p
t the
ci
p
h
ertext o
f
Par
t A
3.
Inp
u
t k
A
[
0
]
//Inp
u
t initial co
n
d
itio
n
of
chao
s
f
o
r
m
u
la k
0A
(us
ed
at
the
encry
p
ti
o
n
pro
ces
s o
f
the f
irst
p
art)
4.
Inp
u
t
µ
A
//Inp
u
t con
trol p
ara
m
ete
r
(us
ed
at
the
encry
p
tio
n
pro
ces
s o
f
the f
irst part)
5.
Let
i
=0
//Initialize i
with z
ero
6.
n
B
=
E
.
ℎ
//
g
et the len
g
th
of
the seco
n
d
decry
p
te
d
part
7.
Declar
e
k
B
[
]
:
ar
ra
y
of
d
o
u
b
le
// Ar
ray o
f
K
B
sav
e
k
ey
s
wh
ich
ar
e
us
ed
to d
ecry
p
t the
ci
p
h
ertext o
f
Par
t B
8.
Inp
u
t k
B
[
0
]
//Inp
u
t initial co
n
d
itio
n
of
chao
s
f
o
r
m
u
la k
0B
(us
ed
at
th
e encry
p
tio
n
pro
ces
s o
f
Par
t A)
9.
Inp
u
t
µ
B
//Inp
u
t
co
n
trol p
ara
m
ete
r
(us
ed
at
the
encry
p
tio
n
pro
ces
s
o
f
Par
t B)
10.
Let
j
= 0;
//Initialize j
with z
ero
11.
Let
= 0;
//Initialize
with
zero
(
in
d
ex
of
ar
ray)
12.
Do
{
13.
=
∑
=
=
0
// ciph
ertext o
f
Par
t A
14.
D
A
=
ASCII
(
)
X
O
R
ASCII
(k
A
[
])
//d
ecry
p
t e
ach s
y
m
b
o
l with d
if
f
erent
k
ey
15.
F.app
en
d
tex
t (
D
A
)
//ap
p
en
d
each d
ecry
p
ted
char
to
F
16.
i++
// I
n
cre
m
en
t i
17.
F.app
en
d
tex
t (
)
//ap
p
en
d
char
to
F
18.
K
A
[
+1
]
= µ
A
k
A
[
](1
-
k
A
[
])
//Gen
erate
a
k
e
y
u
sin
g
chao
s f
o
r
m
u
la
19.
i++
//Incre
m
en
t i
20.
=
∑
=
=
0
//cip
h
ertext o
f
Par
t
B
21.
D
B
= ASCI
I
(
)
XO
R
AS
CII
(k
B
[
])
//d
ecry
p
t e
ach s
y
m
b
o
l with d
if
f
erent
k
ey
22.
F.app
en
d
tex
t (
D
B
)
//ap
p
en
d
each d
ecry
p
ted
char
to F
23.
j++
// incre
m
en
t j
24.
F.app
en
d
tex
t (
)
//ap
p
en
d
char
to
F
25.
k
B
[
+1
]
= µ
B
k
B
[
](1
-
k
B
[
])
//Gen
erate
a
k
e
y
u
sin
g
chao
s f
o
r
m
u
la
26.
j++
// incre
m
en
t j
27.
++}
//in
cre
m
en
t
28.
W
h
ile(i<n
A
&
&
j
<
n
B
)
//Rep
eat this
loo
p
un
til i=n
A
an
d
j
= n
B
Figure
6. The
ps
e
udo
-
c
ode
of the
decr
y
ption p
ro
ces
s
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N: 20
88
-
8708
Eff
ic
ie
nt two
-
stag
e
cry
ptograp
hy
sc
he
me
for
secure
distri
bu
te
d
data
stor
ag
e…
(Raba
b
F.
Ab
del
-
Ka
der)
3303
3.2.3.
Il
l
ust
ra
tion o
f
t
he
pr
oposed
TCS_D
D
algo
ri
th
m
To
f
urt
he
r
ex
pl
ai
n
the
pr
opose
d
TCS
_DD
al
go
rithm
,
a
detai
le
d
exam
ple
ru
n
on
a
sm
al
l
plainte
xt
of
siz
e 44 c
har
act
ers.
The
p
la
int
ext is ass
um
ed
to b
e:
Plaintex
t
:
https
://w
ww
.sciencedirect
.com/sc
ie
nce/arti
cl
Af
te
r
ru
nn
i
ng the
pro
po
se
d
e
nc
ryp
ti
on alg
ori
thm
, th
e resu
lt
i
ng cip
her
te
xt is:
Ci
ph
ert
ext
: “It
tpr:.
/v
wv
.rc
he
oc
ddhrdc
u.
c
om
/
rche
ncd
/`
ru
i
bl”
That
can
be
de
crypted
us
in
g
the
decr
ypti
on
al
gorithm
to
fo
rm
the
sa
m
e
plainte
xt.
The
res
ults
are
li
ste
d
in
Table
1
an
d
Ta
ble
2.
The
detai
le
d
s
te
ps
are
as
fo
ll
ow
s:
T
he
file
is
first
di
vid
e
d
into
tw
o
pa
rts;
each
on
e
c
onta
ins
ha
lf
the
num
ber
of
c
ha
racters
in
the
file
wh
i
ch
is
22
c
har
a
ct
ers.
O
nly
hal
f
of
the
c
harac
te
rs
in
each
par
t
will
b
e e
ncr
y
pted
a
nd the
oth
e
r ha
lf w
il
l rem
ai
n
without e
ncr
y
pt
ion
. T
he p
urp
os
e
of that i
s to
r
ed
uce
bo
t
h
e
ncr
y
ptio
n
a
nd
de
cepti
on
ti
m
e.
Fo
r
t
he
first
par
t
,
ass
um
ing
the
ra
ndom
init
ia
l
con
dit
ion
k
0A
of
(
1)
c
an
be
0.73,
a
nd
the
con
t
ro
l
par
am
et
er
µ
A
can
be
2.3
7.
For
th
e
seco
nd
par
t,
there
are
11
cha
racters
m
us
t
be
encr
y
pted.
The
ran
dom
initial
conditi
on
k
0B
of
(1)
ca
n
be
a
ssu
m
ed
to
be
0.5
12,
an
d
c
on
t
r
ol
pa
ram
et
er
µ
B
al
so
can
be
ass
um
e
d
to
be
3.9
5.
F
ro
m
Table
1
and
Ta
ble
2,
it
is
sh
own
ho
w
ra
nd
om
l
y
keys
are
gen
e
rated
us
in
g
the lo
gisti
c cha
os
m
od
el
. T
hes
e k
ey
s a
re
us
e
d t
o
m
ake en
c
rypti
on and
dec
r
y
ption
proces
s
es m
or
e eff
ic
ie
nt.
Table
1.
Detai
le
d
c
rypto
gr
a
ph
y process
for
pa
rt
A
Origin
al charact
er
Encry
p
tio
n
key
Encry
p
ted
cha
ract
er
Decr
y
p
tio
n
key
Ou
tp
u
t character
h
0
.73
I
0
.73
h
t
0
.46
7
1
2
7
T
0
.46
7
1
2
7
t
s
0
.58
9
9
3
8
8
9
7
1
1
4
2
7
R
0
.58
9
9
3
8
8
9
7
1
1
4
2
7
s
/
0
.57
3
3
2
9
0
5
7
6
4
2
5
0
9
.
0
.57
3
3
2
9
0
5
7
6
4
2
5
0
9
/
w
0
.57
9
7
5
6
1
5
2
8
5
3
4
7
V
0
.57
9
7
5
6
1
5
2
8
5
3
4
7
w
w
0
.57
7
4
2
4
3
2
5
9
1
4
3
7
3
V
0
.57
7
4
2
4
3
2
5
9
1
4
3
7
3
w
s
0
.57
8
2
9
2
9
7
2
8
0
3
3
9
1
R
0
.57
8
2
9
2
9
7
2
8
0
3
3
9
1
s
i
0
.57
7
9
7
2
3
9
8
6
7
0
7
7
H
0
.57
7
9
7
2
3
9
8
6
7
0
7
7
i
n
0
.57
8
0
9
1
1
2
2
9
5
7
8
9
8
O
0
.57
8
0
9
1
1
2
2
9
5
7
8
9
8
n
e
0
.57
8
0
4
7
2
1
0
3
4
0
9
6
4
D
0
.57
8
0
4
7
2
1
0
3
4
0
9
6
4
e
i
0
.57
8
0
6
3
4
6
0
1
1
0
4
4
4
H
0
.57
8
0
6
3
4
6
0
1
1
0
4
4
4
i
Table
2.
Detai
le
d
c
rypto
gr
a
ph
y process
for
pa
rt
B
Origin
al charact
er
Encry
p
tio
n
key
Encry
p
ted
cha
ract
er
Decr
y
p
tio
n
key
Ou
tp
u
t character
e
0
.51
2
D
0
.51
2
e
t
0.
9
8
6
9
3
1
2
U
0
.98
6
9
3
1
2
t
c
0
.05
0
9
4
7
1
2
5
5
4
2
9
1
1
5
C
0
.05
0
9
4
7
1
2
5
5
4
2
9
1
1
5
c
m
0
.19
0
9
8
8
4
8
7
9
7
0
2
1
4
M
0
.19
0
9
8
8
4
8
7
9
7
0
2
1
4
m
s
0
.61
0
3
2
1
9
4
7
4
6
0
6
0
9
R
0
.61
0
3
2
1
9
4
7
4
6
0
6
0
9
s
i
0
.93
9
4
2
4
8
1
8
2
3
8
5
7
H
0
.93
9
4
2
4
8
1
8
2
3
8
5
7
i
n
0
.22
4
7
7
8
0
2
5
0
0
8
2
N
0
.22
4
7
7
8
0
2
5
0
0
8
2
n
e
0
.68
8
2
9
8
8
1
4
7
0
2
3
7
D
0
.68
8
2
9
8
8
1
4
7
0
2
3
7
e
a
0
.84
7
4
4
7
0
4
7
7
0
7
6
4
6
`
0
.84
7
4
4
7
0
4
7
7
0
7
6
4
6
a
t
0
.51
0
6
5
8
1
6
8
7
0
5
0
0
2
U
0
.51
0
6
5
8
1
6
8
7
0
5
0
0
2
t
c
0
.98
7
0
5
1
2
9
3
5
8
7
4
3
B
0
.98
7
0
5
1
2
9
3
5
8
7
4
3
c
4.
SIMULATI
O
N RESULTS
To
e
valuate
the
pe
rfo
rm
ance
of
t
he
pr
opose
d
TC
S_D
D
sc
hem
e
and
it
s
eff
ect
iv
eness,
t
hr
ee
pe
r
form
ance
m
easur
e
s
we
re
c
al
culat
ed:
the
s
iz
e
of
t
he
ci
ph
ertext,
e
ncr
y
ption
an
d
decr
y
ption
ti
m
es,
and
tim
e
com
plexity
.
The
siz
e
of the
ciph
e
rtext is
the size
of the
e
ncr
y
pted plai
n t
est
f
il
e in
byte
s.
Encr
y
ption
ti
m
e
is
cal
culated
as
the
ti
m
e
require
d
f
or
encr
y
ption
i.
e.
the
tim
e
tak
en
t
o
co
nver
t
the
plainte
xt
i
nto
ci
phe
rtext.
Decr
ypti
on
Ti
m
e
is
the
tim
e
require
d
f
or
c
onve
rting
t
he
ci
ph
e
rtext
bac
k
into the
p
la
i
ntext.
Ti
m
e
co
m
plexity
is
the
com
pu
ta
ti
onal
co
m
plexit
y
that
descr
i
bes
the
a
m
ou
nt
of
ti
m
e
it
ta
k
es
to
ru
n
an
al
go
rithm
.
These
pe
rfor
m
ance
m
easur
es
wer
e
com
pared
to
ot
her
re
cent
com
petin
g
e
ncr
y
ption
appr
oach
es
wh
ic
h
us
e
a
com
bin
at
ion
of
sy
m
m
e
tric
a
nd
/
or
asy
m
m
e
tric
al
go
rithm
s.
These
al
gori
thm
s
are:
Su
ba
sree
al
gorithm
[
9
]
,
Ku
m
ar
al
gorithm
[
10
]
,
Zh
u
a
lg
ori
thm
[
11
]
,
THCA
al
gorith
m
[
12
]
,
an
d
S
CB
RP
al
gorith
m
[
13
].
The
propose
d
al
gorithm
was
i
m
ple
m
ented
usi
ng
C
#
pr
ogra
m
m
ing
la
ngua
ge
an
d
the
sim
ulati
on
s
wer
e
r
un
on
an
In
te
l
i5
-
3317U
1.7
0
G
Hz
CPU
with
4.0
0
GB
of
RAM
us
in
g
64
-
bit
im
ple
m
entat
ion
s
to
e
nsure
m
a
xi
m
u
m
util
iz
at
ion
of t
he har
dware.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
3
,
J
une
2020
:
32
95
-
3306
3304
4.1.
Siz
e o
f
ci
pher
t
ext
TCS_
DD
sc
he
m
e
al
ong
with
Subas
ree,
K
um
ar,
Z
hu,
T
H
CA,
a
nd
SCB
RP
we
re
us
e
d
to
e
nc
rypt
sever
al
te
st
file
s
with
di
ff
e
re
nt
siz
es
ra
ng
i
ng
f
ro
m
609
by
te
s
to
184,1
62
byte
s.
The
re
su
lt
ed
ci
phere
d
file
(cip
h
ertext
)
siz
e
was
m
easur
ed
in
byte
s
a
nd
li
ste
d
in
Table
3.
F
ro
m
Table
3,
eac
h
of
S
ubasraa,
Z
hu,
SC
BR
P,
and
TCS
_DD
pro
du
ces
a
ci
pherte
xt
siz
e
wh
ic
h
is
equal
to
the
siz
e
of
the
plainte
xt.
Wh
il
e
both
T
HCA
an
d
Ku
m
ar
hav
e
a
bigger
ci
phe
rtext
siz
e.
This
is
du
e
t
o
the
fact
that
in
the
pro
pose
d
al
gorithm
each
odd
c
harac
te
r
of p
la
in
text is
encr
y
pted usin
g
a
uniq
ue key
gen
e
rati
ng
on
e
en
c
rypted
ch
a
racter.
Table
3.
Size
of cip
her
te
xt (b
yt
es)
Size of
Plaintex
t (
b
y
tes)
Su
b
asree
K
u
m
ar
Zhu
THCA
SCB
RP
TCS_
DD
609
609
846
609
641
609
609
2
5
,61
5
2
5
,61
5
3
5
,14
2
2
5
,61
5
2
5
,64
7
2
5
,61
5
2
5
,61
5
3
5
,08
0
3
5
,08
0
4
8
,22
6
3
5
,08
0
3
5
,11
2
3
5
,08
0
3
5
,08
0
6
1
,38
6
6
1
,38
6
8
4
,34
0
6
1
,38
6
6
1
,41
8
6
1
,38
6
6
1
,38
6
1
8
4
,162
1
8
4
,162
3
5
3
,008
1
8
4
,162
1
8
4
,194
1
8
4
,162
1
8
4
,162
4.2.
Encr
yption
an
d d
ecr
yptio
n
ti
me
Table
s
4
a
nd
5
sho
w
the
e
nc
ryptio
n
an
d
de
crypti
on
tim
e
s
for
di
ff
e
ren
t
siz
es
of
plain
te
xt
rangin
g
from
609
byte
s
to
184
,
162
by
te
s
us
i
ng
TCS
_DD,
S
ub
a
sree
,
K
um
ar,
Z
hu,
THCA
,
a
nd
S
CB
RP.
It
is
cl
ear
tha
t
the
pro
pose
d
T
CS_DD
yi
el
ds
the
le
ast
proce
ssing
t
im
e
fo
r
bo
t
h
e
ncr
ypti
on
an
d
dec
ryption
proces
ses.
This
i
s
achieve
d
beca
us
e
t
he
propos
ed
sc
hem
e
sp
li
ts
the
file
i
nto
two
pa
rts
w
hic
h
ca
n
be
e
ncr
y
pted
sim
ultane
ou
sly
.
Howe
ver,
w
he
n
the
siz
e
of
file
reaches
18
4,162
b
y
te
s
,
SCB
RP
con
s
um
e
s
le
ss
tim
e.
This
is
du
e
that
SCB
RP
us
es
tw
o
sym
m
et
ric
al
go
rith
m
s
wh
ic
h
ar
e
ver
y
sim
ple
to
i
m
ple
m
ent
ho
wev
e
r
they
ar
e
ver
y
wea
k
a
gainst
hack
e
rs.
Fig
ure
7
a
nd Fi
g
ure
8
s
how
t
he dif
f
eren
ce
of e
ncry
ption
a
nd
dec
ryptio
n
ti
m
es b
et
ween
al
gorithm
s.
Table
4.
E
nc
ryption t
i
m
e (m
s
)
Size o
f
Plaintex
t (
b
y
te)
Su
b
asree
Ku
m
ar
Zhu
THCA
SCB
RP
TCS_
DD
609
2063
1500
998
998
650
45
2
5
,61
5
3683
1518
1022
1022
725
384
3
5
,08
0
5651
1526
1059
1059
743
526
6
1
,38
6
1
5
3
5
1
4219
3143
3143
2150
920
1
8
4
,162
1
0
5
8
8
9
5752
3814
3814
2256
2762
Table
5.
Decr
y
pt
ion t
i
m
e (m
s
)
Size of
Plaintex
t (
b
y
te)
Su
b
asree
Ku
m
ar
Zhu
THCA
SCB
RP
TCS_
DD
609
1078
966
562
562
356
40
2
5
,61
5
1085
972
713
713
452
320
3
5
,08
0
1082
980
824
824
483
438
6
1
,38
6
1197
991
891
891
525
520
1
8
4
,162
2087
1099
907
907
547
767
Figure
7. Com
par
is
on
of e
ncry
ption
ti
m
e w
it
h
com
peting
al
gorithm
s
Figure
8. Com
par
is
on of
decry
ption
ti
m
e w
it
h
com
peting
al
gorithm
s
Evaluation Warning : The document was created with Spire.PDF for Python.