A Modification on Key Stream Generator for RC4 Algorithm
A Modification on Key Stream Generator for RC4 Algorithm

Suhad M. Kareem; Abdul Monem S. Rahma

Volume 38, 2B , July 2020, , Page 54-60

https://doi.org/10.30684/etj.v38i2B.404

Abstract
  Rivest Cipher 4 (RC4) is one of most common stream cipher, but it experience many problem, such as, there is little combination between the plaintext and cipher-text. For this reason ...  Read More ...
Biometric Privacy Using Secret Image Sharing
Biometric Privacy Using Secret Image Sharing

A.T. Hashim; D.A. Noori

Volume 35, 7A , July 2017, , Page 701-708

https://doi.org/10.30684/etj.35.7A.5

Abstract
  Biometric technique includes uniquely identifying person based on their physical or behavioral characteristics. It is mainly used for authentication. Iris scanning is one of the most ...  Read More ...
Proposed Hybrid Approach of Stream Cipher base on Selector of Encryption operation and Key Symmetric translate
Proposed Hybrid Approach of Stream Cipher base on Selector of Encryption operation and Key Symmetric translate

Alaa Kadim Farhan

Volume 29, Issue 11 , August 2011, , Page 2132-2142

https://doi.org/10.30684/etj.29.11.4

Abstract
  A stream cipher is a method of encrypting text (to produce cipher text) in which a cryptographic key and algorithm are applied to each binary digit in a data stream, one bit at a time. ...  Read More ...