A Proposal Video Encryption Using Light Stream Algorithm
A Proposal Video Encryption Using Light Stream Algorithm

Ataa R. Alawi; Nidaa F. Hassan

Volume 39, 1B , March 2021, , Page 184-196

https://doi.org/10.30684/etj.v39i1B.1689

Abstract
  Video encrypting is one technique to protect digital videos, it used to avoid unwanted interference and viewing of the transmitted videos. In this paper, a new selective video cryptography ...  Read More ...
Encryption VoIP based on Generated Biometric Key for RC4 Algorithm
Encryption VoIP based on Generated Biometric Key for RC4 Algorithm

Raya W. Abd Aljabar; Nidaa F. Hassan

Volume 39, 1B , March 2021, , Page 209-221

https://doi.org/10.30684/etj.v39i1B.1755

Abstract
  Voice over Internet Protocol (VoIP) calls are susceptible to interfere at many points by many attackers, thus encryption considered an important part in keeping VoIP. In this paper, ...  Read More ...
A Modification on Key Stream Generator for RC4 Algorithm
A Modification on Key Stream Generator for RC4 Algorithm

Suhad M. Kareem; Abdul Monem S. Rahma

Volume 38, 2B , July 2020, , Page 54-60

https://doi.org/10.30684/etj.v38i2B.404

Abstract
  Rivest Cipher 4 (RC4) is one of most common stream cipher, but it experience many problem, such as, there is little combination between the plaintext and cipher-text. For this reason ...  Read More ...
Speech Encryption using Fixed Point Chaos based Stream Cipher (FPC-SC)
Speech Encryption using Fixed Point Chaos based Stream Cipher (FPC-SC)

Fadhil S. Hasan

Volume 34, 11A , November 2016, , Page 2152-2166

https://doi.org/10.30684/etj.34.11A.19

Abstract
  Fixed point chaos based stream cipher (FPC-SC) is presented in this paper to encrypt the speech signal. Fixed point chaos based pseudo random bit generator (FPC-PRBG) is used as key ...  Read More ...
Improvement Majority Function in A5/1 stream cipher Algorithm
Improvement Majority Function in A5/1 stream cipher Algorithm

Hala Bahjat; Mohanad Ali

Volume 34, 1B , January 2016, , Page 16-25

https://doi.org/10.30684/etj.34.1B.2

Abstract
  Security is an important issue, especially in today’s technologically advanced society. Global System for Mobile Communications (GSM) is a world-wide standard for digital wireless ...  Read More ...
Modified the RC4 Stream Cipher Algorithm Based on Irreducible Polynomial
Modified the RC4 Stream Cipher Algorithm Based on Irreducible Polynomial

Zainab Mohammed Hussein; Abdul Monem Saleh Rahma

Volume 33, 4B , April 2015, , Page 578-586

https://doi.org/10.30684/etj.33.4B.1

Abstract
  The increase in the speed of computers and adoption on it as means of encryption (send and receive encrypted data), which led to the development of modern encryption techniques such ...  Read More ...
Effect of Dual Reinforcement on Wear Resistance by Aluminum Compacts Reinforce by SiC, Al2O3
Effect of Dual Reinforcement on Wear Resistance by Aluminum Compacts Reinforce by SiC, Al2O3

Mohammed Saeed. Waheed; Hassan Hamed. Abed

Volume 27, Issue 13 , September 2009, , Page 423-429

https://doi.org/10.30684/etj.27.13.19

Abstract
  The producing composite materials of dual reinforcement in which the matrix material is aluminum reinforced with two types of ceramic particles : which are Alumina (50μmKeywordscomposite ...  Read More ...
Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher
Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher

Salah Mahdi Saleh

Volume 27, Issue 13 , September 2009, , Page 2457-2473

https://doi.org/10.30684/etj.27.13.14

Abstract
  In this paper, a secure data hiding method is introduced. It increases the security of embedded data through combining between the steganography and cryptography. First, the secrete ...  Read More ...