Improving the Security of the Internet of Things with the Implementation of the PrimeDigitBR Methodology

MSRDG International Journal of Computer Scientific Technology & Electronics Engineering

 

© 2026 by MSRDG IJCSTEE Journal

Volume 2 Issue 1

Year of Publication: 2026



Authors: Pusa Prashanth, Sathwika Gade
Paper


Download


Article ID
MSRDG-IJCSTEE-V2I1P101
DIO
https://doi.org/10.66037/MSRDG-IJCSTEE/V2I1P101

Abstract:

Encryption, which is indispensable for safeguarding sensitive information, can also render any malevolent content illegible, allowing it to remain undetected in any network. The objective of concealing the malicious payload is achieved through encryption, which is employed by malware authors to conceal their code. A distinctive approach that goes by the name of PrimeDigitBR. This recommendation is being made in the hopes that it will be an effective solution to the difficulties.  There are three steps in the first stage. First, change the text from plain text to “ASCII code” as P. The second step is to use the “ASCII code” of N to find the prime number. To do the third step, you need to use Equation 1. Take the numbers from P1 and pair them up. Then, change the cells in the matrix. There are also three steps in the second stage. The first step is to figure out what Q is worth. The second step is to find the numbers for N-1. The last step is to use and apply Equation 2. From the Q1 values, make a pair and swap the cell values in the matrix. However, the values in the 0th cell start from the backwards. The process of decryption is understood to be the opposite of this conversion, and it is via this process that the message is eventually received in its original format. In compared to encryption methods that are considered more traditional, the suggested solution offers a greater degree of security.

Keywords: Encryption, Performance, RB22, Shor’s, PrimeDigitBR