Print ISSN: 1681-6900

Online ISSN: 2412-0758

Keywords : Hellman

Encrypted Image Watermark in Audio Files Using Homogenous Deffie-Hellman with Chebyshev Polynomial

Hala B. Abdul Wahab; Abdul-Mohssen J. Abdul-Hossen; Sana Ahmed Kadhom

Engineering and Technology Journal, 2016, Volume 34, Issue 6, Pages 894-900

Due to the expanding utilization of advanced media, the assurance of protected innovation rights issue has turned into an essential issue. Digital watermarking is currently drawing consideration as another technique for shielding media content from unapproved duplicating. In this paper, watermarking image (logo) will be encrypted using a key constructed by a proposed homogenous method of Diffie-Hellman and chebyshev polynomial. The encrypted watermark will be embedded in different samples from the transformed file (DCT) of audio. The embedding process will depend on binary similarity between the audio and watermark bits which reduces the effect of embedded data. The proposed method for the key generation is more secure and complicated since it combines the strength factors of both Diffie-Hellman and Chebyshev polynomial. The effect of the embedding is nonperceptibile and nondetectable.

Public Key Cipher with Signature Based on Diffie-Hellman and the Magic Square Problem

Abdul Monem S.Rahma; Abdul Mohssen J. Abdul Hossen; Omar A. Dawood

Engineering and Technology Journal, 2016, Volume 34, Issue 1, Pages 1-15
DOI: 10.30684/etj.34.1B.1

In the present paper, wedeveloped a new variant of asymmetric cipher (Public Key) algorithm based on the Discrete Logarithm Problem (DLP) uses Diffie-Hellman key exchange protocol and the mathematical features of magic square. The proposed method exploits the DLP problem in the key exchange by using the final value of Diffie-Hellman key agreement, just as the dimension to the magic construction and through which determines the type of magic square construction if it is (odd, singly-even or doubly-even) magic square as well as through which determines starting number and the difference value. From the other point, it exploits the magic squares problem in encryption/decryption and signing/verifyingoperations. The developed methodextremely speed in the Encryption/Decryption process as well as in the digital signaturethat uses aSecure Hash Algorithm SHA-1, since the proposed cipher does not use logarithm and the factorization as the traditional algorithms in ciphering and deciphering operations just in the mutual exchanging, but it depends mainly upon the magic constant and magic sum as alternate that deduced from the result of multiplied fixed value, which selected randomly and imposesto keep secret, as we shall explained in the next sections.

Proposal to Complex DES Security Using Diffie Hellman Injection

Shatha habeeb Jafar

Engineering and Technology Journal, 2011, Volume 29, Issue 6, Pages 1216-1226

Data Encryption Standard (DES) is based on a round of starters, from the
results of the use of multi-stage permutation and replacement to the more complex
algorithm which adopts the symmetric key. Diffie- Hellman is based key
generation algorithm puts a shared secret key between two parties A and B, which
depends on the prime number.
This research suggest a technique it is objective is the blending between the
two encryption methods DES and Diffie Hellman to make DES more safe and
secure. That by propose two options first one include injection the encryption DES
after the seventh round with Diffie-Hellman just as key distribution algorithm then
the results of the last back to the eighth round to complete the encryption process
of DES. The second include injection the encryption DES after the eighth round
with Diffie-Hellman just as key distribution algorithm to generate key the results
of the eighth round will be encrypted using stream cipher then back to the ninth
round to complete the encryption process of DES.