Keywords = Cryptography
Number of Articles: 14
Proposal Framework to Light Weight Cryptography Primitives
Volume 40, Issue 4 , April 2022, , Page 516-526
Abstract
Due to manufacturing cost and portability limitations, the computing power, storage capacity, and energy of the Internet of Things (IoT) hardware are still slowly developing. From above, ... Read More ...Encryption VoIP based on Generated Biometric Key for RC4 Algorithm
Volume 39, 1B , March 2021, , Page 209-221
Abstract
Voice over Internet Protocol (VoIP) calls are susceptible to interfere at many points by many attackers, thus encryption considered an important part in keeping VoIP. In this paper, ... Read More ...Arabic Text Encryption Using Artificial Neural Networks
Volume 34, 5A , May 2016, , Page 887-899
Abstract
This research aims to build a cipher system using back propagation Algorithm with artificial neural network to encrypt any Arabic text and to prevent any data attack during the transition ... Read More ...Proposal of New Keys Generator for DES Algorithms Depending on Multi Techniques
Volume 32, 1B , January 2014, , Page 94-106
Abstract
The requirements of an ordinary PRNG are also satisfied by a cryptographically secure PRNG, but the reverse is not true. CSPRNG requirements fall into two groups: first, that they pass ... Read More ...Semi – Chaotic Mutual Learning Platform for Key – Exchange Algorithm Using Neural Network
Volume 30, Issue 11 , June 2012, , Page 1971-1979
Abstract
Neural network has been emerged the cryptography field as efficient tool for both cryptanalysis and cryptography due to its amazing ability to explore solution space for a given problem. ... Read More ...A Modification of TEA Block Cipher Algorithm for Data Security (MTEA)
Volume 29, Issue 5 , March 2011, , Page 822-832
Abstract
This paper attempts to develop a simple, stronger and safer cryptographic algorithm which would not only be a secure one, but also reduces total time taken for encryption and decryption. ... Read More ...Proposed 256 bits RC5 Encryption Algorithm Using Type-3 Feistel Network
Volume 28, Issue 12 , June 2010, , Page 2337-2352
Abstract
Proposed 256 bits RC5 is an improvement to RC5, designed to meetthe requirements of increased security and better performance. Proposed256 bits RC5 algorithm makes use of data dependent ... Read More ...VHDL Implementation of Hybrid Block Cipher Method (SRC)
Volume 28, Issue 5 , February 2010, , Page 953-963
Abstract
This paper discusses the hardware design of the hybrid block cipher methodthat combines the RC6 cipher and the Serpent cipher.The block size is 128 bits, and the key can be any length ... Read More ...Generate Random Image-Key using Hash Technique
Volume 28, Issue 2 , January 2010, , Page 382-398
Abstract
Random image is very useful to be used as a source for clipping randomnesssession keys in cryptography. In this paper a new algorithm is proposed to generaterandom image .The random ... Read More ...Using Fractals in Information Hiding
Volume 27, Issue 16 , December 2009, , Page 3093-3111
Abstract
Fractals are generated by simple, recursive calculations. Encryption anddecryption algorithms that take advantage of fractals are developed. This paper presents a new approach for information ... Read More ...Effect of Dual Reinforcement on Wear Resistance by Aluminum Compacts Reinforce by SiC, Al2O3
Volume 27, Issue 13 , September 2009, , Page 423-429
Abstract
The producing composite materials of dual reinforcement in which the matrix material is aluminum reinforced with two types of ceramic particles : which are Alumina (50μmKeywordscomposite ... Read More ...Encrypting Audio Data Hiding by Visual Secret Sharing
Volume 27, Issue 13 , September 2009, , Page 2352-2364
Abstract
Steganography and cryptography are usually used to ensure informationsafety in today’s data communication. This paper makes use of audiosteganography technique and encrypted secret ... Read More ...Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher
Volume 27, Issue 13 , September 2009, , Page 2457-2473
Abstract
In this paper, a secure data hiding method is introduced. It increases the security of embedded data through combining between the steganography and cryptography. First, the secrete ... Read More ...Type-3 Feistel Network of The 128-bits Block Size Improved Blowfish Cryptographic Encryption
Volume 27, Issue 2 , January 2009, , Page 235-246