Computer
Farah Tawfiq Abdul Hussien; Abdul Monem S. Rahma; Hala Bahjat Abdul Wahab
Abstract
Providing security for each online consumer over the internet is a critical issue that may cause a time consuming problem that may cause big load on the website server especially for the large websites at the rush time. This process may generate a variety of issues, including response time delays, client ...
Read More ...
Providing security for each online consumer over the internet is a critical issue that may cause a time consuming problem that may cause big load on the website server especially for the large websites at the rush time. This process may generate a variety of issues, including response time delays, client orders being lost, and system crash or deadlock, all of which decrease system performance. This work intends to present a new multi-agent system prototype structure that solves the challenge of security while avoiding issues that might degrade system performance. This is accomplished by installing a software agent on the client's device that handles the purchase and encryption processes without the need for the user to intervene. The suggested agent evades the problems of stalemate (i.e., failure) and request loss, ensuring that information exchanged between all entities is protected. The use of a software agent to manage buying and encrypting operations improves system performance by 10% and increases the reaction time of the system by 30.5 percent (response time, page loading time, transaction processing speed, orders per second) according to test results.
Computer
Rana Mohammed Zaki; Hala Bahjat Abdul wahab
Abstract
Thomas and Patrik are working on a stream cipher called SNOW 3G. In 2006, it was chosen as the centerpiece of a new set of confidentiality and integrity algorithms for the Universal Mobile Telecommunications System (UMTS). In 2008, Böhm published an article named "Statistical Evaluation of Stream Cipher ...
Read More ...
Thomas and Patrik are working on a stream cipher called SNOW 3G. In 2006, it was chosen as the centerpiece of a new set of confidentiality and integrity algorithms for the Universal Mobile Telecommunications System (UMTS). In 2008, Böhm published an article named "Statistical Evaluation of Stream Cipher SNOW 3G." He put the randomness of the SNOW 3G key stream generator to the test. As a randomness test tool, Böhm uses the NIST test statistics package, which consists of three kinds of tests: lengthy key stream data, short key stream data, and initialization vector data. Only the short key stream set of data failed eight random chance test results out of three kinds of tests, according to the report's findings. The SNOW 3G suggestions, he claims, fail due to a flaw with in cipher's initialization. In this paper, we use the PLL algorithm to modify the SNOW 3G algorithm for key initialization and generation keystream. We employ the same itself Böhm employed. The modify SNOW 3G algorithm exceed whole of the statistic exam in a experiment. The findings show that PLL has an effect on algorithm randomness.