Figure 2 - uploaded by Shihab A. Shawkat
Content may be subject to copyright.
4): Shows Cryptography Tree.

4): Shows Cryptography Tree.

Source publication
Thesis
Full-text available
The marvelous development in data transmission technology has put lots of potential on the process of securing data than before. Lots of methods have last decades for data been developed in the protection such as steganography and cryptography. Steganography refers to the science and art of hiding information inside a carrier, where nobody except t...

Similar publications

Article
Full-text available
Recently, the rate of data transfer over the internet globally has increased and this called for more data security as security of data is of great concern for individuals as well as business owners. Cryptography and steganography are two major key players for data security technique. Cryptography is use to perform encryption on the secrete message...

Citations

... 3kRSA is a protected algorithm, a third key was proposed to be added to the RSA algorithm was proposed to twofold the security of the calculation. The RSA has been utilized in different applications like in e-com which guarantee message trustworthiness, security; verification and non-disavowal [22]. There are two types of encryption algorithms, symmetric and asymmetric now see Table 1 represents the comparison among 3DES and RSA algorithms. ...
Article
Full-text available
Cloud computing is considered a distributed computing paradigm in which resources are provided as services. In cloud computing, the applications do not run from a user's personal computer but are run and stored on distributed servers on the Internet. The resources of the cloud infrastructures are shared on cloud computing on the Internet in the open environment. This increases the security problems in security such as data confidentiality, data integrity and data availability, so the solution of such problems are conducted by adopting data encryption is very important for securing users data. In this paper, a comparative study is done between the two security algorithms on a cloud platform called eyeOS. From the comparative study it was found that the Rivest Shamir Adlemen (3kRSA) algorithm outperforms that triple data encryption standard (3DES) algorithm with respect to the complexity, and output bytes. The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. This is useful for storing large amounts of data used in the cloud computing, the key distribution and authentication of the asymmetric encryption, speed, data integrity and data confidentiality of the symmetric encryption are also important also it enables to execute required computations on this encrypted data. Keywords: 3kRSA algorithm Cloud security Information security Triple data encryption standard algorithm This is an open access article under the CC BY-SA license.
... Banerjee et al. [9] recommended the use of an algorithm with image encryption by using the Chen chaotic map with the chaos-based S-box. Shawkat et al. [10] designed a novel S-box generation procedure based on the scaled Zhong chaotic system. A new random number generator based on the originally scaled Zhongtang chaotic concept combined with highly complex and dynamic properties were considered. ...
... When the cipher text is used with the plain text of the AES algorithm, the operation must iterate a certain number of times [9]. The key size is used to calculate the number of rounds from which the plain text is handled [10]. The details of the AES rounds with a 128-bit block size are shown in Table 1. ...
Article
Full-text available
Substitution boxes are essential nonlinear modules that are popular in block cipher algorithms. They also play a significant role in the security area because of their robustness to different linear cryptanalysis. Each element of the state in a S-box is nonlinearly replaced using a lookup table. This research presents the S-box, one of the fundamental parts of the advanced encryption standard (AES) algorithm. The S-box represents the confusion part in the AES. However, when information is shared between different devices in an authorized manner, the algorithm should be able to combine a sufficient number of confusion layers to guarantee the avalanche effect (AE). Subsequently, this research selects the best S-box by comparing different sizes (4×4, 8×8, and 16×16) and measuring them on the basis of the million-bit encryption. The AE is the main criterion used in choosing the best S-box. A robust and strong cryptography algorithm should be able to confirm the AEs. Results indicate that the 16×16 S-box with a 52% AE ratio is the superior S-box. Keywords: Advanced encryption standard Avalanche effect Cryptography algorithm Information security S-box This is an open access article under the CC BY-SA license.
... keys where the information is encrypted in a manner that is understandable when viewed by unauthorized people to look at it when they penetrate the system [7]. This paper introduces a new technique that uses the combination of sparse and DCT to enhance recognition rate. ...
Article
Full-text available
Data security and protection is one of the most common technologies used in the field of computer science. This is because of its great importance in all fields related to daily life, whether political, economic, and other aspects change. In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. Furthermore, the image recognition rate is increased. In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. The proposed technique relies on using square root of public key as private key. XOR operation for colored images encryption and decryption is performed. By calculating signal to noise ratio (PSNR), mean square error (MSE), and bit error rate (BER), the most important things that we address how to provide data security for large data based on encryption techniques and increase the security of multimedia data and texture date and address the problem of time and accuracy in image matching. the results show that the quality of images after decryption is good. Keywords: DCT techniques fourth Information security second Encryption MSE PSNR RSA3k XOR This is an open access article under the CC BY-SA license.
Article
Full-text available
This study investigates the application of steganography for enhancing network security by detecting and promptly eliminating malicious packets to prevent flooding and consequent denial of service attacks while also identifying malicious equipment. The paper discusses foundational concepts such as the prisoner’s dilemma, covert channels, qualitative metrics, and existing steganography techniques in computer communications. An architecture was developed to assess the effectiveness of this solution, and experiments were conducted, with their results presented. This contribution leverages established steganographic principles and seamlessly integrates with widely adopted IPsec protocols, offering a solution to improve covert communication within computer networks.
Chapter
When data travels through an insecure medium, security must be enforced. The confidentiality of the exchanged data must be guaranteed with the help of encryption techniques. Selective encryption is a very powerful tool for encrypting textual data in a resource constrained environment. In the context of e-governance, textual data is very important and must be protected from any kind of security threat using selective text encryption. In this paper, a fast and efficient selective encryption technique based on an RSA asymmetric key encoding approach is presented. After fetching the whole textual information in the encryption phase, the user will search for a particular word or phrase using regular expression. After that, the selected data will be encrypted using the RSA-1024-bit algorithm and written to a new encoded document with the remaining text data. In the phase of decoding the data, only the encoded text of the document is considered. The experimental result confirms that the encrypting method is secure in terms of statistical security tests and fast in terms of computation time. Our encoding method can be implemented to encrypt any multimedia data like images, audio, and videos. This proposed technique can be used in IOT devices where resources are limited.