Print ISSN: 1681-6900

Online ISSN: 2412-0758

Keywords : DES

Two Factor Authentication Based Generated One Time Password

Hilal Hadi; Rana Faeez

Engineering and Technology Journal, 2015, Volume 33, Issue 3, Pages 373-383

This paper explains a method of how the two factors authentication implemented using software token to generateOne Time Password (OTP)to secure users accounts. The proposed method guarantees authenticating e-learning features. The proposedsystem involves generating of OTP by using authentication web service. The generatedcode is valid for only one login and it is verifiedusingSecuredCryptographic Algorithm. The proposed system has been implemented and tested successfully.

A Proposed System for Sound Retrieval Using MAS and ANN

Abeer Tariq; Ikhlas khalaf; shatha habeeb

Engineering and Technology Journal, 2012, Volume 30, Issue 14, Pages 2480-2492

As the use of sounds for computer interfaces, electronic equipment and
multimedia contents, has increased, the role of sound design tools has become
more important. In sound retrieval, picking one sound out from huge data is
troublesome for users because of the difficulty of simultaneously listening to plural
sounds and sometimes there are difficulties with speech and sound recognition.
Consequently, an efficient retrieval method is required for sound databases.
This research proposes a system aim to deal with sound retrieval in both two
cases: authenticity and normal. In the first case, authenticity, two algorithms has
been develop one for building the authentication database and the second deal with
user sound sample to retrieve the matched authenticated samples. In the second
case normal we develop algorithm to deal with user sound sample to retrieve all the
matched samples. Many techniques used in this proposed system such as Artificial
Neural Network (ANN), Data Encryption Standard (DES), Multi Agent System
(MAS) and Fourier transformation (FT). Using these combinations of advanced
and adaptive techniques supports the system to be reliable, secure and parallel.

Proposal to Complex DES Security Using Diffie Hellman Injection

Shatha habeeb Jafar

Engineering and Technology Journal, 2011, Volume 29, Issue 6, Pages 1216-1226

Data Encryption Standard (DES) is based on a round of starters, from the
results of the use of multi-stage permutation and replacement to the more complex
algorithm which adopts the symmetric key. Diffie- Hellman is based key
generation algorithm puts a shared secret key between two parties A and B, which
depends on the prime number.
This research suggest a technique it is objective is the blending between the
two encryption methods DES and Diffie Hellman to make DES more safe and
secure. That by propose two options first one include injection the encryption DES
after the seventh round with Diffie-Hellman just as key distribution algorithm then
the results of the last back to the eighth round to complete the encryption process
of DES. The second include injection the encryption DES after the eighth round
with Diffie-Hellman just as key distribution algorithm to generate key the results
of the eighth round will be encrypted using stream cipher then back to the ninth
round to complete the encryption process of DES.

Proposed Hybrid-Encryption System for Multicast Network

Mohammad Natiq Fadhil Ibraheem

Engineering and Technology Journal, 2010, Volume 28, Issue 24, Pages 7027-7036

In this paper the proposed method based on two encrypted algorithms (Public key, and Block cipher) at the same time, it allowed a sender to encrypt the multicast packet and forward it into the packet network on the optimal distribution tree. The packet may be replicated at the optimal locations in the network and delivered to all the receivers. The receivers are capable of decrypting the packet and forwarding the
packet in the secure network environment. The sender must encrypt packets using a shared key that all the legitimate receivers use to decrypt thepackets. The security of the system is based on the ability to control the distribution of the keys only to those legitimate receivers.