research centers


Search results: Found 5

Listing 1 - 5 of 5
Sort by

Article
Proposed Hybrid Approach of Stream Cipher base on Selector of Encryption operation and Key Symmetric translate

Author: Alaa Kadim Farhan
Journal: Engineering and Technology Journal مجلة الهندسة والتكنولوجيا ISSN: 16816900 24120758 Year: 2011 Volume: 29 Issue: 11 Pages: 2132-2142
Publisher: University of Technology الجامعة التكنولوجية

Loading...
Loading...
Abstract

A stream cipher is a method of encrypting text (to produce cipher text) inwhich a cryptographic key and algorithm are applied to each binary digit in a datastream, one bit at a time. This method is not much used in modern cryptography.The main alternative method is the block cipher in which a key and algorithm areapplied to blocks of data rather than individual bits in a stream. One of theweaknesses in the stream cipher is to analyze the text through the use ofencryption algorithms standard in encryption operations.In this paper description a hybrid structure of encryption algorithm for streamcipher, this algorithm depends on a specific elements for the selection ofencryption process (logical operation (XOR, AND) between the secret key and theplain text through encryption, decryption process. the specific intelligenceelements choose from key. The secret key generated from random generator willbe encrypted by RSA algorithm and sends with the encrypted text inside thepacket


Article
Proposed Pseudo Random Generator Based on RC5 Block Cipher

Authors: Ashwaq Talib Hashim --- Zaid Mundher Radeef
Journal: IRAQI JOURNAL OF COMPUTERS,COMMUNICATION AND CONTROL & SYSTEMS ENGINEERING المجلة العراقية لهندسة الحاسبات والاتصالات والسيطرة والنظم ISSN: 18119212 Year: 2017 Volume: 17 Issue: 1 Pages: 33-41
Publisher: University of Technology الجامعة التكنولوجية

Loading...
Loading...
Abstract

Digital cryptography relies greatly on randomness in providing the security requirements imposed by various information systems. Just as different requirements call for specific cryptographic techniques, randomness takes upon a variety of roles in order to ensure the proper strength of these cryptographic primitives. This paper presents a 64-bit random number generator with a high generation speed and a good random sequences by employing the RC5 encryption algorithm round functions with some changes in the usageof the key, where two keys have been used with an initial vector to start the sequence generator. This generator can be used as a keys generator for any security system or to generate an intermediate password for signing process, and it can be adapted in many other applications, such as random pattern generation, games, etc. Examining the sequences shows great results in terms of randomness and security by achieving a difference near 0.5, this value is the best result, and a high undependability on the previous generated sequences by also achieving a difference more than 0.5, frequency, serial and run test came out with a near optimality results.


Article
A comparative Study to calculate the Runs Property in the encryption systems
دراسة مقارنة لحساب خاصية الانطلاق في انظمة التشفير

Authors: Ayad Ghazi Naser Al-Shimmariand اياد غازي ناصر الشمري --- AmerAbdulmajeedabdulrahman عامر عبد المجيد عبد الرحمن
Journal: Journal of College of Education for Women مجلة كلية التربية للبنات ISSN: Print ISSN 16808738 /E ISSN: 2663547X Year: 2014 Volume: 25 Issue: 4 Pages: 1125-1138
Publisher: Baghdad University جامعة بغداد

Loading...
Loading...
Abstract

Cryptographic applications demand much more of a pseudo-random-sequence generator than do most other applications. Cryptographic randomness does not mean just statistical randomness, although that is part of it. For a sequence to be cryptographically secure pseudo-random, it must be unpredictable.The random sequences should satisfy the basic randomness postulates; one of them is the run postulate (sequences of the same bit). These sequences should have about the same number of ones and zeros, about half the runs should be of length one, one quarter of length two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones should be the same. These properties can be measured deterministicallyand then compared to statistical expectations using a chi-square test.In this paper the Run Criterion, is calculated, it can be calculated for any key generator before it be implemented or constructed (software or hardware).The cryptosystems: Linear, Product and Brüer are chosen as study cases.

ان تطبيقات التشفير تتطلب استخدام مولدات متتابعات شبه عشوائية اكثر من اي تطبيقات اخرى. ان عشوائية الشفرة لا تعني فقط الاحصاءات العشوائية، وان كانت هي جزء منه، فعلى المتتابعة شبه العشوائية الشفرية الامينة ان تكون غير قابلة للتخمين.المتتابعات العشوائية يجب ان تحقق خواص العشوائية، واحدهذه الخواص هي خاصية الانطلاق (سلسلة من الثنائيات المتشابهة). فهذه المتتابعات يجب ان يكون لها نفس العدد من الاصفار والواحدات (0,1)، وحوالي نصف الانطلاقات يجب ان تكون بطول (1) وربعها بطول (2) وثمنها بطول (3) وهكذا. وان توزيع الانطلاقات الصفرية والواحدية يجب ان يكون متساوي.هذه الاختبارات يمكن قياسها نظريا ومن ثم مقارنهاإحصائيا باستخدام اختبار مربع كاي.في هذا البحث تم حساب مقياس الانطلاق لمولد المفاتيح قبل عملية التنفيذ او الانشاء (برمجيا او ماديا). تم اختيار نظم التشفير: الخطي، الضربيوبرور كحالات دراسية لهذا البحث.


Article
Biometric Privacy Using Secret Image Sharing

Authors: A.T. Hashim --- D.A. Noori
Journal: Engineering and Technology Journal مجلة الهندسة والتكنولوجيا ISSN: 16816900 24120758 Year: 2017 Volume: 35 Issue: 7 Part (A) Engineering Pages: 701-708
Publisher: University of Technology الجامعة التكنولوجية

Loading...
Loading...
Abstract

Biometric technique includes uniquely identifying person based on their physical or behavioral characteristics. It is mainly used for authentication. Iris scanning is one of the most secure techniques among all biometrics because of its uniqueness and stability (i.e., no two persons in the world can have same iris). For authentication, the feature template in the database and the user template should be the same method for extracting iris template in this proposed system. Also storing the template in the database securely is not a secure approach, because it can be stolen or tampered. To deal with this security issue, the proposed system is securely storing the template in the database by firstly using randomness to scramble the bits of template based on chaos system. Secondly, a hiding technique is utilized to hide the scrambled templates in host images randomly. Finally, a secret sharing based on linear system is implemented on the iris template in database to protect it and adding extra layer of iris authentication system. The proposed secret sharing system has been generated a meaningful shares which overcomes the problem in traditional methods. Also in proposed system, two approaches of iris extraction have been presented.


Article
A Mixture between Rule 90 and Rule 150 Cellular Automata as a Test Pattern Generator

Author: Sahar Z. Alawey
Journal: Engineering and Technology Journal مجلة الهندسة والتكنولوجيا ISSN: 16816900 24120758 Year: 2018 Volume: 36 Issue: 9 Part (A) Engineering Pages: 951-956
Publisher: University of Technology الجامعة التكنولوجية

Loading...
Loading...
Abstract

Built-in Self-test (BIST) is one of integrated circuit (IC) testing techniques that can be used as a pseudo-random generator for the Circuit Under Test (CUT). This paper introduces the design and simulation of a 4-bit test pattern generator (TPG) using a one dimension Linear Hybrid Cellular Automata (LHCA) with a mixture of rule 90 and 150. LHCA is an enhancement from Linear Feedback Shift Register (LFSR) which can have more random test vectors and improving the cycle length. Design and simulation have been performed using Quartus II and Model Sim software.

Listing 1 - 5 of 5
Sort by
Narrow your search

Resource type

article (5)


Language

English (4)

Arabic and English (1)


Year
From To Submit

2018 (1)

2017 (2)

2014 (1)

2011 (1)