| Improving the Security of the Internet of Things with the Implementation of the PrimeDigitBR Methodology | |
|
MSRDG International Journal of Computer Scientific Technology & Electronics Engineering
© 2026 by MSRDG IJCSTEE Journal Volume 2 Issue 1 Year of Publication: 2026 |
Paper Download Article ID MSRDG-IJCSTEE-V2I1P101 DIO https://doi.org/10.66037/MSRDG-IJCSTEE/V2I1P101 |
|
Abstract: Encryption, which is indispensable for safeguarding sensitive information, can also render any malevolent content illegible, allowing it to remain undetected in any network. The objective of concealing the malicious payload is achieved through encryption, which is employed by malware authors to conceal their code. A distinctive approach that goes by the name of PrimeDigitBR. This recommendation is being made in the hopes that it will be an effective solution to the difficulties. There are three steps in the first stage. First, change the text from plain text to “ASCII code” as P. The second step is to use the “ASCII code” of N to find the prime number. To do the third step, you need to use Equation 1. Take the numbers from P1 and pair them up. Then, change the cells in the matrix. There are also three steps in the second stage. The first step is to figure out what Q is worth. The second step is to find the numbers for N-1. The last step is to use and apply Equation 2. From the Q1 values, make a pair and swap the cell values in the matrix. However, the values in the 0th cell start from the backwards. The process of decryption is understood to be the opposite of this conversion, and it is via this process that the message is eventually received in its original format. In compared to encryption methods that are considered more traditional, the suggested solution offers a greater degree of security. |
|
| Keywords: Encryption, Performance, RB22, Shor’s, PrimeDigitBR | |
