Communication
Rawia Abdullah Muhammed; Maisa'a Abid Ali Al-Dabbas; Ashwak Mahmood Alabaichi
Abstract
The Internet of things (IoT) is one of those emerging technologies, which aregoing to rule the world in the next few decades. The IoT environment not only enablesHuman to Machine interaction but also fosters Machine to Machine connectivity.Numerous IoT devices have poor security and insufficient computing ...
Read More ...
The Internet of things (IoT) is one of those emerging technologies, which aregoing to rule the world in the next few decades. The IoT environment not only enablesHuman to Machine interaction but also fosters Machine to Machine connectivity.Numerous IoT devices have poor security and insufficient computing power, making themprime targets for hackers. The IoT environment uses lightweight cryptographic techniquesto address security requirements. Another security method for IoT devices issteganography. In the contemporary Internet era, the ability to secure private informationis crucial, and steganography offers this capability. Due to its great ability to concealsensitive data, video has drawn the attention of numerous academics among all forms ofdigital media. The main goal of this work is to examine several methods for fusing videosteganography and cryptography techniques. Additionally, a thorough investigation andevaluation of a variety of video steganography methods in both compressed and rawdomains are also emphasized. The comprehensive analysis of prior material makes iteasier to have in-depth knowledge while creating approaches that combine cryptographywith steganography.
Computer
Yusra Ahmed Ghareeb; Ekhlas Khalaf Gbashi
Abstract
Cryptography is a security strategy that prevents disclosure of the information while it is transit, in storage, or both. There are a variety of methods for maintaining data security, including utilizing light weight speed algorithms for encryption and parameter validation. Many algorithms have originated ...
Read More ...
Cryptography is a security strategy that prevents disclosure of the information while it is transit, in storage, or both. There are a variety of methods for maintaining data security, including utilizing light weight speed algorithms for encryption and parameter validation. Many algorithms have originated in the area of information protection, helping to assure the validity of the information generated. These include the following algorithms: SHA-1, SHA-2, SHA-3, AES, RC5, RSA, and more. In order to secure the legitimacy of the information and monitoring data , the speed of encryption and authentication must be critical. . Due to the necessity of fast and secure algorithms, these features are required. In this work, modification of the SHA-3 algorithm by introducing a new function called (the keccak function), which has an extremely quick execution time and a high level of security, also versatile cryptographic function. This change is implemented via the 2D chaotic system, which is geared towards generating random values for constants for the SHA3 algorithm. These constants values are generated by the SHA3 algorithm, and so are random and unguessable by the intrude. Statistical tests conducted by the National Institute of Standards and Technology (NIST) effectively outperformed the randomness of a proposed approach .The proposed algorithm shows lower execution time compared to previous studies, which is 0.041616sec for 1MB.
Computer
Sameeh Abdulghafour Jassim; Alaa K. Farhan
Abstract
Recently, the Internet of Things (IoT) is begin used in many fields such as smart homes, healthcare systems, industrial applications, etc. Therefore, the use of the IoT led to a growth in the number of dangers especially in the areas of privacy and security for applications running on low- resource computers. ...
Read More ...
Recently, the Internet of Things (IoT) is begin used in many fields such as smart homes, healthcare systems, industrial applications, etc. Therefore, the use of the IoT led to a growth in the number of dangers especially in the areas of privacy and security for applications running on low- resource computers. Consequently, the demand for lightweight encryption methods is growing. To safeguard sensing data, this study introduces a Lightweight Advanced Encryption Standard (LAES) depending on dynamic ShiftRows, initial permutation instead of MixColumns, and a dynamic number of rounds. It was created with the goal of reducing encryption/decryption time. The proposed approach was assessed by using various measurements such as lengths of the key used was 2128 and it is quite enough for security, key sensitivity values were 100%, Also, this study compared the encryption/decryption time, NIST statistical test, and security strength of the proposed architecture to those of XTEA, SIMON, Skinny, SPECK, and PRESENT. The encryption/decryption time of the proposed approach was had the shortest period (0.0169 S) while the SPECK algorithm was had the longest period (4.1249 S) among the comparative algorithms. Whereas, NIST statistical test values of the proposed approach were passed successfully and had higher values than the comparative algorithms. Moreover, the proposed approach utilized 1280, 1024, and 768 GE with 6, 8, or 10 rounds respectively. The average number of GE was approximately 1000 GE. These numbers of GE are considered highly efficient with the IoT environment.
Ibrahim Malik ALattar; Abdul Monem S Rahma
Volume 21, Issue 2 , June 2021, , Page 102-114
Abstract
This paper aims to develop a new cryptographic algorithm that isbased on the magic square method of order five with multi message lengths tobe more complex in order to increase the complexity; in addition to comparingthe cipher with the use of the magic square of order five, four and three (allsingle ...
Read More ...
This paper aims to develop a new cryptographic algorithm that isbased on the magic square method of order five with multi message lengths tobe more complex in order to increase the complexity; in addition to comparingthe cipher with the use of the magic square of order five, four and three (allsingle message length. The proposed work has been done by using two extrarounds and depending on round statuse ( even or odd) , messages are detectedto be used. The key is placed in agreed positions, then the remaining positionsare filled with the message, and then certain sums are calculated to representthe encrypted text. Speed, complexity, histogram calculations for images, andNIST calculations for texts were calculated, and the results were compared,where the complexity of the algorithms was as follows ((P)15 × (256)10)2 × (P)11× (256)14 and ((256)15 × (256)10)2 × (256)11 × (256)14 for GF(P) and GF(28)respectively , From that, it has been discovered that the proposed algorithm(Magic Square of order five with multi message length) is better than the rest ofthe algorithms as it has excellent complexity and a slight difference in thespeed.