Print ISSN: 1681-6900

Online ISSN: 2412-0758

Keywords : Cryptography


Proposal of New Keys Generator for DES Algorithms Depending on Multi Techniques

Alaa Kadhim; Mohammed Salih

Engineering and Technology Journal, 2014, Volume 32, Issue 1, Pages 94-106

The requirements of an ordinary PRNG are also satisfied by a cryptographically secure PRNG, but the reverse is not true. CSPRNG requirements fall into two groups: first, that they pass statistical randomness tests; and secondly, that they hold up well under serious attack, even when part of their initial or running state becomes available to an attacker. in this paper, design and implementation new keys generator depend on multi of techniques as (logic circuit XOR, NOT and AND) in one proposal also in another proposal used the coding, permutations and reorder bit by search method in artificial intelligent also depend of polynomial equations to expand the original key, the generator product random runs of bits after check by statistical test.

Semi – Chaotic Mutual Learning Platform for Key – Exchange Algorithm Using Neural Network

Enas H. Salih; Mohamad AB. Saleh; Mohammed Gheni Alwan

Engineering and Technology Journal, 2012, Volume 30, Issue 11, Pages 1971-1979

Neural network has been emerged the cryptography field as efficient tool for
both cryptanalysis and cryptography due to its amazing ability to explore solution
space for a given problem. One of the latest observations for the behavior of neural
networks is its ability to synchronize itself to other neural network based on mutual
learning rules; this phenomenon has been under the focus of specialist in
cryptographic field due to its significant usage as highly secure key exchange
algorithm.
This paper is presenting new approach to drive the synchronization based on
semi-chaotic mutual learning, where the output of each neural network will be
extracted through non-linear mapping to memory filled with balanced number of
1's and 0's as this paper will demonstrate.

Proposed 256 bits RC5 Encryption Algorithm Using Type-3 Feistel Network

Yossra H. Ali

Engineering and Technology Journal, 2010, Volume 28, Issue 12, Pages 2337-2352

Proposed 256 bits RC5 is an improvement to RC5, designed to meet
the requirements of increased security and better performance. Proposed
256 bits RC5 algorithm makes use of data dependent rotations. One new
feature of proposed 256 bits RC5 algorithm is modified its design to use
four 64-bit registers rather than two 32-bit registers. The proposal 256 bits
RC5 algorithm using Type-3 Feistel network which is iterated simple
function 20 times. An Avalanche Effect of RC5 is about 31.372 if we
change the same amount of information in key for 256 bits RC5 then the
Avalanche Effect is about 142.909. The proposed algorithm is resistant to
matching and a dictionary attack which is increased the security of the
previous RC5 algorithm by using block size of 256 bits instead of 64 bits.

VHDL Implementation of Hybrid Block Cipher Method (SRC)

Ashwaq T. Hishem; Najwa M. Hassen; Ekhlas M. Farhan

Engineering and Technology Journal, 2010, Volume 28, Issue 5, Pages 953-963

This paper discusses the hardware design of the hybrid block cipher method
that combines the RC6 cipher and the Serpent cipher.
The block size is 128 bits, and the key can be any length up to 256 bytes. This
algorithm is designed to take advantage of the powerful, which is supported by
RC6 and Serpent encryption algorithms with overcoming their weaknesses,
resulting in a much improved security/performance tradeoff over existing ciphers.
The discussion addresses hardware design and VHDL implementation of the key
expansion algorithm and the encryption algorithm.