53 research outputs found

    A new multi-level key block cypher based on the Blowfish algorithm

    Get PDF
    Blowfish is a block cypher algorithm used in many applications to enhance security, but it includes several drawbacks. For example, the mix between the key and data is limited. This paper presents a new modification to the Blowfish algorithm to overcome such problems realised through a multi-state operation instead of an XOR. Our proposed algorithm uses three keys in the encryption and decryption processes instead of one for controlling the variable block bits sizes (1, 2, 4, and 8) bits and for determining the state table numbers. These tables are formed from the addition in a Galois field GF (2n) based on block bit size to increase the complexity of the proposed algorithm. Results are evaluated based on the criteria of complexity, time encryption, throughout, and histogram, and show that the original Blowfish, those modified by other scholars, and our proposed algorithm are similar in time computation. Our algorithm is demonstrated to be the most complex compared with other well-known and modified algorithms. This increased complexity score for our proposed Blowfish makes it more resistant against attempts to break the keys

    A new block cipher algorithm that adopts the magic square of the fifth order with messages of different lengths and multi-function in GF(28)

    Get PDF
    This paper is considered as a development of encryption algorithms based on Magic Square of Order Five. Both GF(P) and GF(28) are used to encode both images and text. Where two different algorithms were used, the first using message length = 10 and the second message length = 14, and an unspecified number of rounds were added and a mask will be used in the even round will use the addition operation and in the odd round will used the multiplication operation so that the text resulting from the first round will be as input text for the next Round, and thus. The speed, complexity, NIST tests and histogram for the first ten rounds were calculated and compared with the results of the previous algorithm before the rounds were made, where the complexity in the first algorithm was = ((256)^ 15)^(r+1)× (256)^10 + or × (256)^25 and the complexity in the second algorithm = ((256)^11)^(r+1) ×(256)^14 + or × (256)^25 where r represents the number of round used

    The Most Common Characteristics of Fragile Video Watermarking: A Review

    Get PDF
    The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject should not be forgotten so studying old research will give a clear idea of the topic. To aid future researchers in this subject, we give a review of fragile watermarking approaches and some related papers presented in recent years. This paper presents a comparison of many relevant works in this field based on some of the outcomes and improvements gained in these studies, which focuses on the common characteristics that increase the effect of watermarking techniques such as invisibility, tamper detection, recovery, and security &nbsp

    New modification on feistel DES algorithm based on multi-level keys

    Get PDF
    The data encryption standard (DES) is one of the most common symmetric encryption algorithms, but it experiences many problems. For example, it uses only one function (XOR) in the encryption process, and the combination of data is finite because it occurs only twice and operates on bits. This paper presents a new modification of the DES to overcome these problems. This could be done through adding a new level of security by increasing the key space (using three keys) during the 16 rounds of the standard encryption algorithm and by replacing the predefined XOR operation with a new # operation. Our proposed algorithm uses three keys instead of one. The first key is the input key used for encrypting and decrypting operations. The second key is used for determining the number of bits, while the third key is used for determining the table numbers, which are from 0 to 255. Having evaluated the complexity of our proposed algorithm, the results show that it is the most complex compared with the well-known DES and other modified algorithms. Consequently, in our proposed algorithm, the attacker try a number of attempts 21173 at minimum to decrypt the message. This means that the proposed DES algorithm will increase the security level of the well-known DES

    Design and implement a new secure prototype structure of e-commerce system

    Get PDF
    The huge development of internet technologies and the widespread of modern and advanced devices lead to an increase in the size and diversity of e-commerce system development. These developments lead to an increase in the number of people that navigate these sites asking for their services and products. Which leads to increased competition in this field. Moreover, the expansion in the size of currency traded makes transaction protection an essential issue in this field. Providing security for each online client especially for a huge number of clients at the same time, causing an overload on the system server. This problem may lead to server deadlock, especially at rush time, which reduce system performance. To solve security and performance problems, this research suggests a prototype design for agent software. This agent will play the role of broker between the clients and the electronic marketplace. This is done by providing security inside the client device and converting the client’s order into a special form which is called a record form to be sent to the commercial website. Experimental results showed that this method increase system performance in terms of page loading time, transaction processing and improves the utilization of system resources

    A Comparative Study and Analysis of Query in Encrypted Databases

    Get PDF
    تعد البيانات اليوم هي الموجود الرئيسي للشركات وأعمالها. عادة ما يتم تخزين هذه البيانات في قاعدة البيانات. يجب أن تكون جميع أنظمة قواعد البيانات قادرة على الاستجابة لطلبات الحصول على معلومات من المستخدم وهي استعلامات العمليات. هناك حاجة إلى خوارزميات التشفير التي توفر القدرة على الاستعلام عبر قاعدة البيانات المشفرة وتتيح تحسين تشفير وفك تشفير البيانات. ومع ذلك ، تطبيق خوارزميات التشفير على قاعدة البيانات المشفرة يعتبر التحدي الذي ينشأ هو في  انخفاض اداء النظام الناتج عن نشر خوارزمية التشفير في وقت التشغيل. لذلك ، تعرض هذه الورقة معظم الأعمال الحديثة التي تم إجراؤها على معالجة الاستعلام في  قاعدة البيانات المشفرة وتحليلها لتوضيح تحليل الأداء ، بناءً على مقاييس أداء مختلفة في كل عمل ذي صلةData is the main asset of the modern companies and their businesses. Typically, it is stored in the data-base. Every database system has to be capable of responding to information requests from users, which is queries of the process. Encryption mechanisms are required, which give the capability to the query over the encrypted data-base and permit the optimization of data encryption and decryption. However, applying encryption algorithms on Encrypted database then challenge arises that the efficiency of the system degrades on deploying encryption algorithm on the runtime. Therefore, this paper presents most of the recent works that have been conducted on the query preprocessing of encrypted database and analyzes them to clarify the performance analysis, based on different performance metrics in each related work

    A Review on Steganography Techniques

    Get PDF
    Steganography is the science of hiding a secret message in cover media, without any perceptual distortion of the cover media. Using steganography, information can be hidden in the carrier items such as images, videos, sounds files, text files, while performing data transmission. In image steganography field, it is a major concern of the researchers how to improve the capacity of hidden data into host image without causing any statistically significant modification. Therefore, this paper presents most of the recent works that have been conducted on image steganography field and analyzes them to clarify the strength and weakness points in each work separately in order to be taken in consideration for future works in such field.   

    Multi-level encryption for 3D mesh model based on 3D Lorenz chaotic map and random number generator

    Get PDF
    The increasing 3D model applications in various areas of life and widespread use like industry leads to 3D models being stolen and attacked by hackers; therefore, 3D model protection is a fundamental matter nowadays. In this paper, the proposed scheme will provide stringent security for the 3D models by implementing multiple levels of security with preserving the original dimensionality of the 3D model using the weight factor (w). The first level of security is achieved by applying a shuffling process for the vertices based on a key from random number generator (RNG), which provides good confusion. The second level is implemented by modifying the vertices values based on 3D keys from 3D Lorenz chaotic map, which provides good diffusion. The proposed scheme was applied on different 3D models varying in the vertices and faces number. The results illustrate that the proposed scheme deforms the entire 3D model based on Hausdorff distance (HD) approximately 100 after the encryption process, making it resist statistical attack. The scheme provides high security against brute force attack because it has a large key space equal to 10,105 and high security against deferential attack through secret key sensitivity using number of pixels change rate (NPCR) near to 99:6% and unified average changing intensity (UACI) near to 33:4%

    A Proposed Clinical Decision Support System Based on Virtual Telemedicine (Case Study Iraqi Rural Areas)

    Get PDF
    The patient continues with the hospital directly leading to the hospital inflation and low efficiency and high cost of patient work.So the Solutions: Creating simple electronic environment while providing units and medical intermediate (virtual health center) between the doctor and patient. This assessment leads to pressure the cost of treatment and provide easier service and high efficiency and real time. The dominant feature of the health system in Iraq is built on the basis of treatment in public hospitals is always because the private sector hospitals are expensive and this put pressure on public hospitals and health centers, especially in rural and remote places form. In this paper, proposed set up a virtual health centers include websites, public health centers, medical clinics and linking them with instruments and smart phones by providing information of physicians and medical services provided and citizen media deadlines as well as linked to social networking sites. Citizens can choose the physician through the data and information available base, this ensures the benefit of doctors owners of rare specialties from anywhere in Iraq at any time and can be an Iraqi citizen reporter his doctor anywhere, at any time for the purpose of diagnosis through the data and information related to telephones patient base to ensure continuous communication easily and cost low

    Mapping a New Future for GIS Healthcare in Iraq (Case Study)

    Get PDF
    Most areas of Iraq are suffering from many problems and challenges represented by the poor distribution of health centers and the provision of health services. In addition, the existence of these centers in the city center and the non-observance of planning standards in the distribution process and in line with the rate of population growth in these areas as well as to assess the needs of the citizens of these health centers. This study deals with the subject of spatial planning for health centers in Iraq and using GIS technology as the main objective of this study is to determine the extent of the distribution of health centers, health and its efficiency and suitability to the needs of the Iraqi people and offer some suggestions for the spatial distribution of better and efficient health services. That the correct spatial distribution of health centers will help decision-makers and the competent authorities in a position suitable for the development of this important service and vital steps. This study looked forward to discussing how the arrival of the Iraqi individual to health care and medical services centers without the trouble and at a lower cost and to avoid misallocation of these centers, which causes them service pressure in some health centers, which in turn is affecting the efficiency of the delivery of services to the citizen by identifying the nearest health center
    corecore