TITLE:
Modeling and Implementation of a Data Security and Protection Medium Using the Generated Key Based on Electromagnetic Wave Propagation Theories
AUTHORS:
Vincent Mbonigaba, Fulgence Nahayo, Octave Moutsinga, Dieudonné Okalas-Ossami, Romeo Nibitanga, Thérence Niyonsaba
KEYWORDS:
Modeling, Security, Cryptography, Algorithm, Coding, Quantum, Post, Bytes, System, Waves
JOURNAL NAME:
Journal of Computer and Communications,
Vol.12 No.9,
September
26,
2024
ABSTRACT: Today, the advent of quantum computers and algorithms is calling into question the semantic security of symmetrical and asymmetrical cryptosystems. The security of objects connected to the network, which must provide a security service and protect the privacy of users by providing protection against attacks such as identity theft, denial of service, eavesdropping and unauthorised access to personal and sensitive data. It is therefore necessary to find a robust method of using the key that is effective in protecting and preventing data tampering. In this paper, we design and implement a security and data protection method using a key generated on the basis of electromagnetic wave propagation theories. Modelling and implementation of a data security and protection method using a key generated on the basis of electromagnetic wave propagation theories.