Proposed Method to Encrypt Images to Mobile Device Based on the Principles of Shannon
Proposed Method to Encrypt Images to Mobile Device Based on the Principles of Shannon

Hanna M .A .Salman; Anwar Abbas Hattab

Volume 34, 6B , June 2016, , Page 820-830

https://doi.org/10.30684/etj.34.6B.11

Abstract
  In the proposed research, it has been proposed image encryption method in the mobile device based on the principles of Shannon (diffusion and confusion). Where: a large group of keys ...  Read More ...
Improvement Majority Function in A5/1 stream cipher Algorithm
Improvement Majority Function in A5/1 stream cipher Algorithm

Hala Bahjat; Mohanad Ali

Volume 34, 1B , January 2016, , Page 16-25

https://doi.org/10.30684/etj.34.1B.2

Abstract
  Security is an important issue, especially in today’s technologically advanced society. Global System for Mobile Communications (GSM) is a world-wide standard for digital wireless ...  Read More ...
Improving Keystream Generation for Sosemanuk Stream Cipher Using Twofish Block Cipher
Improving Keystream Generation for Sosemanuk Stream Cipher Using Twofish Block Cipher

Shant K. Avakian; Rana S. Mohammed

Volume 27, Issue 10 , July 2009, , Page 1976-1991

https://doi.org/10.30684/etj.27.10.7

Abstract
  This paper will introduce two proposal algorithms (Snowfish 1) and the (Snowfish 2) to improve the Sosemanuk stream cipher algorithm by benefiting from the efficient properties of the ...  Read More ...