10.25673/122120">


Proceedings of International Conference on Applied Innovation in IT
2025/08/29, Volume 13, Issue 4, pp.249-259

Improved SAFER Plus Algorithm Using the Odd-Squared New Mersenne Number Transform


Abdulmutalib A-Wahab Hussein, Lujain Sabah Abdulla and Mounir Taha Hamood


Abstract: Encryption secures data by transforming it into unreadable information (ciphertext) that can only be read by authorized receivers, who then convert the unclear data back into the original plaintext. Encryption can be classified into two types: symmetric and asymmetric. Symmetric encryption utilizes the same key for each of the sender and the receiver whereas two different keys are used in asymmetrical encryption. One of the encryption techniques is the SAFER+ algorithm. In this paper, a generalized type of the new Mersenne number transform (NMNT) called the odd-squared NMNT (O2NMNT) is used to generate a new matrix in the proposed SAFER+ algorithm to replace the basic matrix used in the standard SAFER+ algorithm. The results revel that in the proposed SAFER+ algorithm the number of attempts required to find the key used in the encryption process in extremely higher than the attempts needed in the standard SAFER+ algorithm this gives the suggested algorithm a higher encryption strength than the conventional algorithm.

Keywords: Encryption, Symmetric, Asymmetric, SAFER+, O2NMNT

DOI: 10.25673/122120

Download: PDF

References:

  1. A. Ahmed, M. Naeem, and U. IJEACS, “Analysis of most common encryption algorithms,” International Journal of Engineering and Applied Computer Science (IJEACS), vol. 4, no. 2, pp. 1270–1275, 2022, doi: 10.24032/IJEACS/0402/003.
  2. B. Kaushik, V. Malik, and V. Saroha, “A review paper on data encryption and decryption,” International Journal of Research in Science and Innovation (IJRSI), 2023, doi: 10.22214/ijraset.2023.50101.
  3. R. Kumari, J. G. Pandey, and A. Karmakar, “An RTL implementation of the data encryption standard (DES),” arXiv preprint, arXiv:2301.05530, 2023, doi: 10.48550/arXiv.2301.05530.
  4. S. M. Kareem and A. M. S. Rahma, “Development of data encryption standard algorithm based on magic square,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 28, no. 1, pp. 297–305, Oct. 2022, doi: 10.11591/ijeecs.v28.i1.pp297-305.
  5. L. Gong, L. Zhang, W. Zhang, X. Li, X. Wang, and W. Pan, “The application of data encryption technology in computer network communication security,” in AIP Conference Proceedings, vol. 1834, no. 1, 2017, doi: 10.1063/1.4981623.
  6. M. E. Smid, “Development of the advanced encryption standard,” Journal of Research of the National Institute of Standards and Technology, vol. 126, p. 126024, 2021, doi: 10.6028/jres.126.024.
  7. M. F. Mushtaq, S. Jamel, A. H. Disina, Z. A. Pindar, N. S. A. Shakir, and M. M. Deris, “A survey on the cryptographic encryption algorithms,” International Journal of Advanced Computer Science and Applications, vol. 8, no. 11, 2017, doi: 10.14569/IJACSA.2017.081141.
  8. A. Khompysh, D. Dyusenbayev, and M. Maxmet, “Development and analysis of symmetric encryption algorithm,” International Journal of Electrical and Computer Engineering (IJECE), vol. 15, no. 2, pp. 1900–1911, 2025, doi: 10.11591/ijece.v15i2.pp1900-1911.
  9. B. E. H. H. Hamouda, “Comparative study of different cryptographic algorithms,” Journal of Information Security, vol. 11, no. 3, pp. 138–148, 2020.
  10. M. A. M. Abu-Faraj and Z. A. Alqadi, “Using highly secure data encryption method for text file cryptography,” International Journal of Computer Science and Network Security, vol. 21, no. 12, pp. 53–60, 2021, doi: 10.22937/IJCSNS.2021.21.12.8.
  11. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98, 2006.
  12. M. R. Parag and T. A. Setu, “Data encryption using image processing: A brief study,” Australian Journal of Engineering and Innovative Technology, vol. 4, no. 3, pp. 45–51, 2022, doi: 10.34104/ajeit.022.045051.
  13. D. Tiwari, B. Mondal, and A. Singh, “Fast encryption scheme for secure transmission of e-healthcare images,” International Journal of Image, Graphics and Signal Processing, vol. 15, no. 5, pp. 88–99, 2023, doi: 10.5815/ijigsp.2023.05.07.
  14. J. Zhao, M. Wang, J. Chen, and Y. Zheng, “New impossible differential attack on SAFER block cipher family,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 98, no. 3, pp. 843–852, 2015, doi: 10.1587/transfun.E98.A.843.
  15. M. K. Mahmood, L. S. Abdulla, A. H. Mohsin, and H. A. Abdullah, “MATLAB implementation of 128-key length SAFER+ cipher system,” International Journal of Engineering Research and Applications, vol. 7, no. 2, pp. 49–55, 2017, doi: 10.9790/9622-0702054955.
  16. D. Sharmila and R. Neelaveni, “A proposed SAFER plus security algorithm using fast Walsh–Hadamard transform for Bluetooth technology,” International Journal of Wireless and Mobile Networks, vol. 1, no. 2, pp. 80–88, 2009.
  17. B. Jagadeesh, D. Kishore, and R. V. Vijay Krishna, “Design of SAFER+ encryption algorithm for Bluetooth transmission,” International Journal of Innovative Technology and Research, vol. 3, no. 1, pp. 1864–1867, Jan. 2015.
  18. M. Shrivastava and R. Sinha, “An improved version of SAFER+ algorithm,” International Journal of Computer Intelligence Research, vol. 13, no. 6, pp. 1431–1440, 2017.
  19. M. F. Şahin, M. K. Mahmood, and I. Myderrizi, “Secure and fast encryption routine+: Evaluation by software application,” International Journal of Engineering and Technology (IJET), vol. 6, no. 2, pp. 13–24, 2020, doi: 10.19072/ijet.755570.
  20. J. Hua, F. Liu, Z. Xu, F. Li, and D. Wang, “A fast realization of new Mersenne number transformation and its applications,” International Journal of Circuit Theory and Applications, vol. 47, no. 5, pp. 738–752, 2019, doi: 10.1002/cta.2614.
  21. Y. Al-Aali, M. T. Hamood, and S. Boussakta, “Radix-22 algorithm for the odd new Mersenne number transform (ONMNT),” Signals, vol. 4, no. 4, pp. 746–767, 2023, doi: 10.3390/signals4040041.
  22. L. S. Abdulla, A. Abdulmuttalib, W. Hussein, and M. T. Hamood, “Unified algorithms for generalized new Mersenne number transforms,” TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 21, no. 6, pp. 1346–1355, 2023, doi: 10.12928/TELKOMNIKA.v21i6.25253.


    HOME

       - Conference
       - Journal
       - Paper Submission to Journal
       - Paper Submission to Conference
       - For Authors
       - For Reviewers
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceedings


    PROCEEDINGS

       - Volume 13, Issue 4 (ICAIIT 2025)
       - Volume 13, Issue 3 (ICAIIT 2025)
       - Volume 13, Issue 2 (ICAIIT 2025)
       - Volume 13, Issue 1 (ICAIIT 2025)
       - Volume 12, Issue 2 (ICAIIT 2024)
       - Volume 12, Issue 1 (ICAIIT 2024)
       - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    PAST CONFERENCES

       ICAIIT 2025
         - Photos
         - Reports

       ICAIIT 2024
         - Photos
         - Reports

       ICAIIT 2023
         - Photos
         - Reports

       ICAIIT 2021
         - Photos
         - Reports

       ICAIIT 2020
         - Photos
         - Reports

       ICAIIT 2019
         - Photos
         - Reports

       ICAIIT 2018
         - Photos
         - Reports

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Edition Hochschule Anhalt
           Location: Anhalt University of Applied Sciences
           Email: leiterin.hsb@hs-anhalt.de
           Phone: +49 (0) 3496 67 5611
           Address: Building 01 - Red Building, Top floor, Room 425, Bernburger Str. 55, D-06366 Köthen, Germany

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.