Proposal Framework to Light Weight Cryptography Primitives
Proposal Framework to Light Weight Cryptography Primitives

Mustafa M. Abd Zaid; Soukaena Hassan

Volume 40, Issue 4 , April 2022, , Page 516-526

https://doi.org/10.30684/etj.v40i4.1679

Abstract
  Due to manufacturing cost and portability limitations, the computing power, storage capacity, and energy of the Internet of Things (IoT) hardware are still slowly developing. From above, ...  Read More ...
Encryption VoIP based on Generated Biometric Key for RC4 Algorithm
Encryption VoIP based on Generated Biometric Key for RC4 Algorithm

Raya W. Abd Aljabar; Nidaa F. Hassan

Volume 39, 1B , March 2021, , Page 209-221

https://doi.org/10.30684/etj.v39i1B.1755

Abstract
  Voice over Internet Protocol (VoIP) calls are susceptible to interfere at many points by many attackers, thus encryption considered an important part in keeping VoIP. In this paper, ...  Read More ...
Arabic Text Encryption Using Artificial Neural Networks
Arabic Text Encryption Using Artificial Neural Networks

Oday Kamil Hamid

Volume 34, 5A , May 2016, , Page 887-899

https://doi.org/10.30684/etj.34.5A.7

Abstract
  This research aims to build a cipher system using back propagation Algorithm with artificial neural network to encrypt any Arabic text and to prevent any data attack during the transition ...  Read More ...
Proposal of New Keys Generator for DES Algorithms Depending on Multi Techniques
Proposal of New Keys Generator for DES Algorithms Depending on Multi Techniques

Alaa Kadhim; Mohammed Salih

Volume 32, 1B , January 2014, , Page 94-106

https://doi.org/10.30684/etj.32.1B.12

Abstract
  The requirements of an ordinary PRNG are also satisfied by a cryptographically secure PRNG, but the reverse is not true. CSPRNG requirements fall into two groups: first, that they pass ...  Read More ...
Semi – Chaotic Mutual Learning Platform for Key – Exchange Algorithm Using Neural Network
Semi – Chaotic Mutual Learning Platform for Key – Exchange Algorithm Using Neural Network

Enas H. Salih; Mohamad AB. Saleh; Mohammed Gheni Alwan

Volume 30, Issue 11 , June 2012, , Page 1971-1979

https://doi.org/10.30684/etj.30.11.11

Abstract
  Neural network has been emerged the cryptography field as efficient tool for both cryptanalysis and cryptography due to its amazing ability to explore solution space for a given problem. ...  Read More ...
A Modification of TEA Block Cipher Algorithm for Data Security (MTEA)
A Modification of TEA Block Cipher Algorithm for Data Security (MTEA)

Gaidaa Saeed Mahdi

Volume 29, Issue 5 , March 2011, , Page 822-832

https://doi.org/10.30684/ etj.29.5.1

Abstract
  This paper attempts to develop a simple, stronger and safer cryptographic algorithm which would not only be a secure one, but also reduces total time taken for encryption and decryption. ...  Read More ...
Proposed 256 bits RC5 Encryption Algorithm Using Type-3 Feistel Network
Proposed 256 bits RC5 Encryption Algorithm Using Type-3 Feistel Network

Yossra H. Ali

Volume 28, Issue 12 , June 2010, , Page 2337-2352

https://doi.org/10.30684/etj.28.12.5

Abstract
  Proposed 256 bits RC5 is an improvement to RC5, designed to meetthe requirements of increased security and better performance. Proposed256 bits RC5 algorithm makes use of data dependent ...  Read More ...
Visual Cryptography Vs Bit Level Secret Sharing For Image Encryption
Visual Cryptography Vs Bit Level Secret Sharing For Image Encryption

Musaab R. Abdulrazzaq

Volume 28, Issue 7 , March 2010, , Page 1340-1349

https://doi.org/10.30684/etj.28.7.6

Abstract
  Secret sharing is a scheme used to distribute secret among a group of users.Rather than making duplicated copies of secrets among users, the secret is dividedinto a number of pieces, ...  Read More ...
VHDL Implementation of Hybrid Block Cipher Method (SRC)
VHDL Implementation of Hybrid Block Cipher Method (SRC)

Ashwaq T. Hishem; Najwa M. Hassen; Ekhlas M. Farhan

Volume 28, Issue 5 , February 2010, , Page 953-963

https://doi.org/10.30684/etj.28.5.8

Abstract
  This paper discusses the hardware design of the hybrid block cipher methodthat combines the RC6 cipher and the Serpent cipher.The block size is 128 bits, and the key can be any length ...  Read More ...
Generate Random Image-Key using Hash Technique
Generate Random Image-Key using Hash Technique

Nidaa F. Hassan; Akbas E. Ali; Teaba Wala Aldeen

Volume 28, Issue 2 , January 2010, , Page 382-398

https://doi.org/10.30684/etj.28.2.15

Abstract
  Random image is very useful to be used as a source for clipping randomnesssession keys in cryptography. In this paper a new algorithm is proposed to generaterandom image .The random ...  Read More ...
Using Fractals in Information Hiding
Using Fractals in Information Hiding

Nadia M. Al-Saidie; Thanaa A. Kadhim

Volume 27, Issue 16 , December 2009, , Page 3093-3111

https://doi.org/10.30684/etj.27.16.15

Abstract
  Fractals are generated by simple, recursive calculations. Encryption anddecryption algorithms that take advantage of fractals are developed. This paper presents a new approach for information ...  Read More ...
Effect of Dual Reinforcement on Wear Resistance by Aluminum Compacts Reinforce by SiC, Al2O3
Effect of Dual Reinforcement on Wear Resistance by Aluminum Compacts Reinforce by SiC, Al2O3

Mohammed Saeed. Waheed; Hassan Hamed. Abed

Volume 27, Issue 13 , September 2009, , Page 423-429

https://doi.org/10.30684/etj.27.13.19

Abstract
  The producing composite materials of dual reinforcement in which the matrix material is aluminum reinforced with two types of ceramic particles : which are Alumina (50μmKeywordscomposite ...  Read More ...
Encrypting Audio Data Hiding by Visual Secret Sharing
Encrypting Audio Data Hiding by Visual Secret Sharing

Nidaa F. Hassan; Rehab F. Hassan; Akbas E. Ali

Volume 27, Issue 13 , September 2009, , Page 2352-2364

https://doi.org/10.30684/etj.27.13.8

Abstract
  Steganography and cryptography are usually used to ensure informationsafety in today’s data communication. This paper makes use of audiosteganography technique and encrypted secret ...  Read More ...
Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher
Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher

Salah Mahdi Saleh

Volume 27, Issue 13 , September 2009, , Page 2457-2473

https://doi.org/10.30684/etj.27.13.14

Abstract
  In this paper, a secure data hiding method is introduced. It increases the security of embedded data through combining between the steganography and cryptography. First, the secrete ...  Read More ...
Type-3 Feistel Network of The 128-bits Block Size Improved Blowfish Cryptographic Encryption
Type-3 Feistel Network of The 128-bits Block Size Improved Blowfish Cryptographic Encryption

Ashwaq T. Hashim

Volume 27, Issue 2 , January 2009, , Page 235-246

https://doi.org/10.30684/etj.27.2.2

Abstract
  In this paper, a new secret-key block cipher called 128-bits Blowfish isproposed which is an evolutionary improvement of 64-bits Blowfish designed tomeet the requirements of the Advanced ...  Read More ...