scispace - formally typeset
Search or ask a question
Journal Article

Proposal to Generate a Various Key from Image for Various Encryption Methods

01 Jan 2012-Engineering and Technology Journal (University of Technology)-Vol. 31
TL;DR: This paper proposed a method which generates the key that draw from parts of the image that could be applied to Symmetric cryptography or Asymmetric cryptography.
Abstract: There are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Each of these encryption methods have their own uses, advantages, and disadvantages. All three of these encryption methods use cryptography, or the science of scrambling data . Although there can be several pieces to an encryption process, the two main pieces are the algorithms and the keys. As stated earlier, algorithms used in computer systems are complex mathematical formulas that dictate the rules of how the plaintext will be turned into ciphertext. A key is a string of random bits that will be used by the algorithm. This paper proposed a method which generates the key that draw from parts of the image. The size of the key is used with the suggested algorithm to encryption of the text. This method could be applied to Symmetric cryptography or Asymmetric cryptography.

Content maybe subject to copyright    Report

References
More filters
Journal Article
TL;DR: This research suggest a technique it is objective to blending between the two encryption methods DES and Diffie Hellman to make DES more safe and secure.
Abstract: Data Encryption Standard (DES ) is based on a round of starters, from the results of the use of multi-stage permutation and r eplacement to the more complex algorithm which adopts the symmetric key. Diffie- Hellman is based key generation algorithm puts a shared secret key betwe en two parties A and B, which depends on the prime number. This research suggest a technique it is objective i s the blending between the two encryption methods DES and Diffie Hellman to make DES more safe and secure. That by propose two options first one inclu de injection the encryption DES after the seventh round with Diffie-Hellman just as key distribution algorithm then the results of the last back to the eighth round to complete the encryption process of DES. The second include injection the encryption DES after the eighth round with Diffie-Hellman just as key distribution algori thm to generate key the results of the eighth round will be encrypted using stream cipher then back to the ninth round to complete the encryption process of DES.

3 citations