Print ISSN: 1681-6900

Online ISSN: 2412-0758

Keywords : Key exchange


Semi – Chaotic Mutual Learning Platform for Key – Exchange Algorithm Using Neural Network

Enas H. Salih; Mohamad AB. Saleh; Mohammed Gheni Alwan

Engineering and Technology Journal, 2012, Volume 30, Issue 11, Pages 1971-1979

Neural network has been emerged the cryptography field as efficient tool for
both cryptanalysis and cryptography due to its amazing ability to explore solution
space for a given problem. One of the latest observations for the behavior of neural
networks is its ability to synchronize itself to other neural network based on mutual
learning rules; this phenomenon has been under the focus of specialist in
cryptographic field due to its significant usage as highly secure key exchange
algorithm.
This paper is presenting new approach to drive the synchronization based on
semi-chaotic mutual learning, where the output of each neural network will be
extracted through non-linear mapping to memory filled with balanced number of
1's and 0's as this paper will demonstrate.

Proposal to Complex DES Security Using Diffie Hellman Injection

Shatha habeeb Jafar

Engineering and Technology Journal, 2011, Volume 29, Issue 6, Pages 1216-1226

Data Encryption Standard (DES) is based on a round of starters, from the
results of the use of multi-stage permutation and replacement to the more complex
algorithm which adopts the symmetric key. Diffie- Hellman is based key
generation algorithm puts a shared secret key between two parties A and B, which
depends on the prime number.
This research suggest a technique it is objective is the blending between the
two encryption methods DES and Diffie Hellman to make DES more safe and
secure. That by propose two options first one include injection the encryption DES
after the seventh round with Diffie-Hellman just as key distribution algorithm then
the results of the last back to the eighth round to complete the encryption process
of DES. The second include injection the encryption DES after the eighth round
with Diffie-Hellman just as key distribution algorithm to generate key the results
of the eighth round will be encrypted using stream cipher then back to the ninth
round to complete the encryption process of DES.