{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:53:07Z","timestamp":1774162387127,"version":"3.50.1"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3187317","type":"journal-article","created":{"date-parts":[[2022,6,29]],"date-time":"2022-06-29T19:40:16Z","timestamp":1656531616000},"page":"69388-69397","source":"Crossref","is-referenced-by-count":17,"title":["Rotation Left Digits to Enhance the Security Level of Message Blocks Cryptography"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2489-4857","authenticated-orcid":false,"given":"Mua'ad","family":"Abu-Faraj","sequence":"first","affiliation":[{"name":"Department of Computer Information Systems, The University of Jordan, Aqaba, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0295-9691","authenticated-orcid":false,"given":"Abeer","family":"Al-Hyari","sequence":"additional","affiliation":[{"name":"Electrical Engineering Department, Al-Balqa Applied University, As Salt, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6385-1134","authenticated-orcid":false,"given":"Khaled","family":"Aldebei","sequence":"additional","affiliation":[{"name":"Department of Information Systems, The University of Jordan, Aqaba, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4734-8605","authenticated-orcid":false,"given":"Ziad A.","family":"Alqadi","sequence":"additional","affiliation":[{"name":"Computers and Networks Engineering Department, Al-Balqa Applied University, Amman, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1267-1026","authenticated-orcid":false,"given":"Bilal","family":"Al-Ahmad","sequence":"additional","affiliation":[{"name":"Department of Computer Information Systems, The University of Jordan, Aqaba, Jordan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.7236\/jiibc.2015.15.1.45"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1574"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0285-4"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3459992"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0322-3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3053118"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.18280\/ts.390117"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/sym14040664"},{"issue":"12","key":"ref9","first-page":"648","article-title":"Rounds reduction and blocks controlling to enhance the performance of standard method of data cryptography","volume":"21","author":"Abu-Faraj","year":"2021","journal-title":"IJCSNS"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/954\/1\/012009"},{"issue":"9","key":"ref11","first-page":"30","article-title":"A new approach for data cryptography","volume":"8","author":"Alqad","year":"2019","journal-title":"Int. J. Comput. Sci. Mobile Comput."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2017.080659"},{"issue":"8","key":"ref13","first-page":"50","article-title":"Creating a stable and fixed features array for digital color image","volume":"8","author":"Asad","year":"2019","journal-title":"IJCSMC"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2018916088"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2009.355.362"},{"issue":"2","key":"ref16","first-page":"211","article-title":"Performance analysis and evaluation of parallel matrix multiplication algorithms","volume":"5","author":"Alqadi","year":"2008","journal-title":"World Appl. Sci. J."},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2016.7568411"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s40815-020-01030-5"},{"issue":"5","key":"ref19","first-page":"4092","article-title":"A new method for voice signal features creation","volume":"9","author":"Alqadi","year":"2019","journal-title":"Int. J. Electr. Comput. Eng."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45545-0_15"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1137\/140993478"},{"issue":"1","key":"ref22","first-page":"24","article-title":"VPMM: Visualization of parallel matrix multiplication algorithms","volume":"33","author":"Desai","year":"2017","journal-title":"J. Comput. Sci. Colleges"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SCEECS.2012.6184991"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SCOPES.2016.7955835"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/iccsp.2013.6577156"},{"issue":"12","key":"ref26","first-page":"280","article-title":"Performance evaluation of symmetric encryption algorithms","volume":"8","author":"Elminaam","year":"2008","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"issue":"1","key":"ref27","first-page":"125","article-title":"Comparison of data encryption algorithms","volume":"2","author":"Singh","year":"2011","journal-title":"Int. J. Comput. Sci. Commun."},{"issue":"2","key":"ref28","first-page":"321","article-title":"A study of new trends in blowfish algorithm","volume":"1","author":"Singh","year":"2011","journal-title":"Int. J. Eng. Res. Appl."},{"issue":"5","key":"ref29","first-page":"877","article-title":"A comparative survey on symmetric key encryption techniques","volume":"4","author":"Agrawal","year":"2012","journal-title":"Int. J. Comput. Sci. Eng."},{"issue":"2","key":"ref30","first-page":"292","article-title":"Comparative analysis of encryption algorithms for data communication","volume":"2","author":"Seth","year":"2011","journal-title":"Int. J. Comput. Sci. Technol."},{"issue":"7","key":"ref31","first-page":"10","article-title":"Comparative study of different symmetric key cryptography algorithms","volume":"2","author":"Apoorva","year":"2013","journal-title":"Int. J. Appl. Innov. Eng. Manage."},{"issue":"12","key":"ref32","first-page":"58","article-title":"Performance evaluation of symmetric encryption algorithms","volume":"8","author":"Abdul","year":"2009","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"issue":"9","key":"ref33","first-page":"196","article-title":"Superiority of blowfish algorithm","volume":"2","author":"Mandal","year":"2012","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"issue":"2","key":"ref34","first-page":"6","article-title":"DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis","volume":"1","author":"Thakur","year":"2011","journal-title":"Int. J. Emerg. Technol. Adv. Eng."},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSIT53264.2022.9716416"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/420\/1\/012111"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICEngTechnol.2017.8308215"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/7647421"},{"issue":"1","key":"ref39","first-page":"909","article-title":"A hybrid encryption algorithm based on AES & RSA","volume":"4","author":"Vijayalakshmi","year":"2016","journal-title":"Int. J. Innov. Res. Comput. Commun. Eng."}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09810795.pdf?arnumber=9810795","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T04:39:20Z","timestamp":1706762360000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9810795\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3187317","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}