Print ISSN: 1681-6900

Online ISSN: 2412-0758

Keywords : public

Arabic Text Encryption Using Artificial Neural Networks

Oday Kamil Hamid

Engineering and Technology Journal, 2016, Volume 34, Issue Issue 5 A, Pages 887-899
DOI: 10.30684/etj.34.5A.7

This research aims to build a cipher system using back propagation Algorithm with artificial neural network to encrypt any Arabic text and to prevent any data attack during the transition process.Encryption information holdsfour stages:
1)A neural network was trained by using back propagation algorithm to encrypt the whole input Arabic text and graspfinal weights and consider these weights as a public key.
2) Training a second neural network by using back propagation algorithm to decrypt the input Arabic text of first stage and graspweights and consider the weights as a private key.
3)Encrypt any Arabic text by using the weights obtained from first stage.
4)Decrypt the Arabic text from third stage by using the weights obtained from second stage.
The four stages are achieved prosperously for data encryption process and decryption.
This work is executed by using Matlab program version 7 and Notepad++ for writing text because it supports Arabic numbers under windows 7 as operating system.

A Secure Mobile Banking Using Kerberos Protocol

Mohammad N. Abdullah; May T. Abdul-Hadi

Engineering and Technology Journal, 2009, Volume 27, Issue 6, Pages 1127-1133

Because the network is an open environment, a lot of care must be taken when
transferring sensitive information especially when related with financial data. This depends
on the principals to be trusted which is a problematic and since the first step in network
security is the authentication, this paper presents a proposed modal for secure mobile
banking (m-banking) applications using Kerberos (the network authentication protocol).
The aim of this paper is to establish a secure communication between the clients and
mobile-bank application server in which they can use their mobile phone to securely access
their bank accounts, make and receive payments, and check their balances.
The integration of smart card into classic Kerberos enhances the security for client
authentication by storing the cryptographic keys and perform dual factor authentication.
Other enhancement to Kerberos is the PKINIT in which the shared key is mapped with
public- private key. To build a robust client authentication the client uses his/her mobile
phone to author Kerberos's messages, process the replay and establish secure
communication with the application server.