This document summarizes a research paper that proposes a new hybrid text encryption approach combining elliptic curve cryptography and the Hill cipher algorithm for use on mobile ad hoc networks. The approach aims to address security weaknesses in the Hill cipher by converting it from a symmetric to an asymmetric technique. It generates public and private keys using elliptic curve cryptography so the secret key does not need to be shared over unsecured channels. The approach also allows direct encryption and decryption of characters from the full 128-character ASCII table using their numeric values, avoiding the need for a character mapping table. The advantages are seen as improved security, efficiency and faster computation compared to other techniques.
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
with the arrival of the information age and much more important information systems and communication in human
everyday life, necessity immunization information and communication strategy were also raised. The easiest way to meet this
necessity is conventional encryption algorithms. Encryption is a right tool for data protection in an unsecure channel. To this end, from
two-method symmetric key encryption and public-key cryptography are used. In this paper we examine text cryptography, one of the
most important topics in cryptography. A unique attribute of this kind of encryption has been of interest to many researchers in this
field. This paper, considering the symmetric encryption algorithm, provides a text encryption algorithm using a 128-bit key. The
proposed algorithm uses a 128-bit key, the text data using the XOR operator to convert the encrypted information. Therefore, the aim
of this method is to provide a convenient method for symmetrically encrypting data not to be easily decoded, and finally, the results of
the tests show that the proposed method is better in terms of security and speed of execution
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
UNIT - 2
SYMMETRIC CIPHERS: Symmetric Cipher Model, Substitution Techniques,
Transposition Techniques, Simplified DES, Data encryption standard (DES), The strength of
DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles and Modes of
Operation, Evaluation Criteria for Advanced Encryption Standard, The AES Cipher.
Different date block size using to evaluate the performance between different...IJCNCJournal
The different computer networks whether wired or wireless are becoming more popular with its high
security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks.
One of these technique is a cryptography technique that makes the data as unreadable during the transfer
hence; there is no chance to reclaim the information. Presently, most of the users are using various media
types and internet to transfer the data but, it has the chance to retrieve the data by using these media types.
The perfect solution for this problem is to provide security on time-to-time basis; this stage is always
significant to the security related community discussions. This paper explains the comparison between the
run time of three different encryption algorithms which are DES, AES and Blowfish The compression
includes using different modes, data block size and different operation modes. As a result, Blowfish
algorithm followed by AES take less time for running compared to DES.
ASCII Value Based Encryption System (AVB)IJERA Editor
Encryption and decryption are considered to be the guard for data in this technological world. To provide some
kind of security, this paper proposes a new algorithm called AVB algorithm which is used to enhance the
security of the data. This algorithm mainly focuses on ASCII value of data. ASCII value of the character is
encrypted using normal mathematical calculation for number of time on a particular character and converted to
numerical value. Then the cipher text is decrypted to get the original plain text. This algorithm is efficient in two
ways it difficult for the intruders to predict the data as each character follows different form of encryption based
on the key. And also it is simple, fast, and cost efficient while compared to ASCII value based text encryption
system by Udepal Singh and Upasna Garg
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
with the arrival of the information age and much more important information systems and communication in human
everyday life, necessity immunization information and communication strategy were also raised. The easiest way to meet this
necessity is conventional encryption algorithms. Encryption is a right tool for data protection in an unsecure channel. To this end, from
two-method symmetric key encryption and public-key cryptography are used. In this paper we examine text cryptography, one of the
most important topics in cryptography. A unique attribute of this kind of encryption has been of interest to many researchers in this
field. This paper, considering the symmetric encryption algorithm, provides a text encryption algorithm using a 128-bit key. The
proposed algorithm uses a 128-bit key, the text data using the XOR operator to convert the encrypted information. Therefore, the aim
of this method is to provide a convenient method for symmetrically encrypting data not to be easily decoded, and finally, the results of
the tests show that the proposed method is better in terms of security and speed of execution
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
UNIT - 2
SYMMETRIC CIPHERS: Symmetric Cipher Model, Substitution Techniques,
Transposition Techniques, Simplified DES, Data encryption standard (DES), The strength of
DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles and Modes of
Operation, Evaluation Criteria for Advanced Encryption Standard, The AES Cipher.
Different date block size using to evaluate the performance between different...IJCNCJournal
The different computer networks whether wired or wireless are becoming more popular with its high
security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks.
One of these technique is a cryptography technique that makes the data as unreadable during the transfer
hence; there is no chance to reclaim the information. Presently, most of the users are using various media
types and internet to transfer the data but, it has the chance to retrieve the data by using these media types.
The perfect solution for this problem is to provide security on time-to-time basis; this stage is always
significant to the security related community discussions. This paper explains the comparison between the
run time of three different encryption algorithms which are DES, AES and Blowfish The compression
includes using different modes, data block size and different operation modes. As a result, Blowfish
algorithm followed by AES take less time for running compared to DES.
ASCII Value Based Encryption System (AVB)IJERA Editor
Encryption and decryption are considered to be the guard for data in this technological world. To provide some
kind of security, this paper proposes a new algorithm called AVB algorithm which is used to enhance the
security of the data. This algorithm mainly focuses on ASCII value of data. ASCII value of the character is
encrypted using normal mathematical calculation for number of time on a particular character and converted to
numerical value. Then the cipher text is decrypted to get the original plain text. This algorithm is efficient in two
ways it difficult for the intruders to predict the data as each character follows different form of encryption based
on the key. And also it is simple, fast, and cost efficient while compared to ASCII value based text encryption
system by Udepal Singh and Upasna Garg
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
Cloud computing environment requires secure access for data from the cloud server, small execution time, and low time complexity. Existing traditional cryptography algorithms are not suitable for cloud storage. In this paper, an efficient two-stage cryptography scheme is proposed to access and store data into cloud safely. It comprises both user authentication and encryption processes. First, a two-factor authentication scheme one-time password is proposed. It overcomes the weaknesses in the existing authentication schemes. The proposed authentication method does not require specific extra hardware or additional processing time to identity the user. Second, the plaintext is divided into two parts which are encrypted separately using a unique key for each. This division increases the security of the proposed scheme and in addition decreases the encryption time. The keys are generated using logistic chaos model theory. Chaos equation generates different values of keys which are very sensitive to initial condition and control parameter values entered by the user. This scheme achieves high-security level by introducing different security processes with different stages. The simulation results demonstrate that the proposed scheme reduces the size of the ciphertext and both encryption and decryption times than competing schemes without adding any complexity.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
In many of today’s computer application needs, faster operation is essential to the efficient implementation
of information security algorithm. RC4 has been used as the data encryption algorithm for many
applications and protocols including the Wi-Fi, Skype, and Bit Torrent to name a few. Several efficient
approaches to the implementation of RC4 have been proposed and we review some of those. More recently
some parallel approaches to faster implementation of RC4 have been presented and we include those in our
survey of efficient approaches to RC4. This paper presents an analysis of available hardware/software
parallel implementations of RC4 symmetric key-based algorithm and some security approaches which
make it more secure.
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
The process of transforming plaintext data into cipher text in order to conceal its meaning in case it fall to hand of unauthorized recipient is refers to as encryption. The systems that perform the encryption processes are known as cryptosystems, there are several cryptosystem algorithms: RSA, RC4, DES, 3DES, Blowfish, AES, IDEA, Skipjack, DSA, ElGamal, etc. The major features that identify and differentiate one cryptosystem algorithm from another are its ability to secure the protected data against attacks and its speed/efficiency. In this paper: application software was designed to implement RSA, and RCA encryption algorithms with advanced features of visual Basic 6 for the front end interface. Microsoft Access is used to design backend of the application, and the Macromedia Flash was also used to incorporate dynamic features that enhance the appearance of the application. The program was used to compare the performance of RSA and RC4. The encryption operation was carried out for both RSA and RC4 using five text files and five graphic files of different sizes 10, 50, 100, 150, and 200 kilobyte respectively. The major factor considered for measuring the performance of the algorithms (RSA and RC4) is the speed of execution using time of execution (TE) as parameter for the evaluation. The performance result was presented and analyzed. We discovered that the RC4 is better compare to RSA algorithm based on the experimental facts presented and the result analysis of the two evaluated algorithms.
Cryptography is a process used for sending information in secret way. Goal of this process is to provide protection for information but in different way. In this paper our motive to represent a new method for protection that is generated by combination of RSA and 2 bit rotation mechanism of cryptography. There are many algorithms exist for this process. For cryptography there are algorithms like RSA, IDEA, AES, and DES but here we are using only one algorithm from these that is RSA which is enough to implement combined process using 2 bit rotation. The encrypted image is used as input for network for further implementation.RSA encrypt image with 1 bit rotation. In 1 bit rotation only 1 bit is shifted and at decrypt side shifted bit are reversed. But to make it more secure we are going to perform 2 bit rotation due to which it is more secure as compared to existing algorithm. After applying the 2 bit rotation we perform the permutation of that image that will give us encrypted image. Shivam Kumar | Dr. Ganesh D "Image Cryptography using RSA Algorithm" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42408.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/42408/image-cryptography-using-rsa-algorithm/shivam-kumar
A novel paradigm in authentication systemIJNSA Journal
Maintaining the security of your computer, network and private/sensitive data against unauthorized access
and a wide variety of security threats can be challenging. Verifying data integrity and authentication are
essential security services in order to secure data transmission process. In this paper we propose a novel
security technique which uses new encryption and decryption algorithms to achieve authenticated
communication and enhanced data integrity. The proposed technique is very complex for attackers to
decode, and it is applicable to client-server architecture.
Three Party Authenticated Key Distribution using Quantum CryptographyIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Security analysis of fbdk block cipher for digital imageseSAT Journals
Abstract Network security is one of the major concerns in the modern world. In this regard, a strong security technique is required to protect user data. Cryptography techniques plays an important role in secured transmission through encryption of data and thus ensuring integrity, authenticity, confidentiality of information. Several encryption algorithms have been proposed like AES (Advanced Encryption Standard), DES (Data Encryption Standard) and RSA. These provide very good encryption for text applications. However, these encryption schemes appear not to be ideal for image applications. Some algorithms like GKSBC and RC6 provide very good encryption for digital images. New techniques are emerging that are aimed at providing secured transmission of images over networks. The FBDK (Fixed Block with Dynamic Key Size) block cipher is a new cryptography technique designed using simple operations like XOR, substitutions, circular shifting. The FBDK algorithm is applicable for blocks of any size with key size being dynamic for each block. It does not involve any complex mathematical operations like modular exponentiation. It is a hybrid cryptography technique based on symmetric key and asymmetric key cryptosystems. This paper investigates the security of FBDK block cipher for digital images against brute-force attack, statistical analysis and Differential analysis attacks. In this paper, various security analysis tests has been discussed which are helpful in finding out whether the FBDK encryption algorithm can do secure encryption or not. Experimental results proves the security and efficiency of FBDK cipher for images against all aforementioned types of attacks which justifies its consideration for real time image applications. Keywords: Cryptography, Ciphers, Encryption, Security, and cryptanalysis.
Features of genetic algorithm for plain text encryption IJECEIAES
The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed processing.
Enhancing the Techniques to Secure Grid Computingijtsrd
Security is important issue in every aspect in todays world if you are using the networks. Various algorithms are there to secure your network so that unauthorized user cant breach into your accounts. SO for this authentication and authorization plays an important role but apart from these use of various encryption algorithms are there for grid data security. By using these algorithms you can easily secure your network and it will also enhance the performance of our grid networks. In this paper model has been designed for grid security that is been implemented on network Simulator and the performance has been measured with the previous models. By using various cryptographic algorithms the efficiency and the packed delivery ratio is increased incredibly. Simranjeet Kaur"Enhancing the Techniques to Secure Grid Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd2531.pdf http://www.ijtsrd.com/computer-science/computer-network/2531/enhancing-the-techniques-to-secure-grid-computing/simranjeet-kaur
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
Abstract— Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. ECC generates keys through the properties of the elliptic curve equation instead of the traditional method of generation as the product of very large prime numbers. Because ECC helps to establish equivalent security with lower computing power and battery resource usage, it is becoming widely used for mobile applications. Recently the bilinear pairing such as Weil Pairing or Tate Pairing on elliptic curves and hyper elliptic curves has been found various applications in cryptography. Several identity-based cryptosystems using bilinear pairings of elliptic curves or hyper elliptic curves were presented. Blind signature and ring signature are very useful to provide the user’s anonymity and the signer’s privacy. The proposed method focuses an ID-based ring signature scheme which is based on the pairings with elliptic curve cryptography. The proposed method is used to reduce the number of computation of the pairing for the verification of the id based signature and also decoding of the id based public key cryptosystems with authentication by factor of 2.
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
With the progress in data exchange by the electronic system, the need for information security has become a necessity. Due to the growth of multimedia application, security becomes an important issue of communication and storage of different files. To make its reality, cryptographic algorithms are widely used as essential tools. Cryptographic algorithms provide security services such as confidentiality, authentication, data integrity and secrecy by encryption. Different cryptographic algorithms are commonly used for information security in many research areas. Although there are two encryption techniques, asymmetric and symmetric, the simpler symmetric encryption technique is employed for testing file security system. In this study, the performance evaluation of the most common two symmetric encryption algorithms such as TEA and Blowfish algorithm is focused on the execution time intervals. Simulation has been conducted with many types of file encryption like .pdf, .txt, .doc, .docx, .xlsx, .pptx, .ppt, .xls, .jpg, .png and most common video file formats by using Java Programming Language. Win Myat Thu | Tin Lai Win | Su Mu Tyar "Performance Comparison of File Security System using TEA and Blowfish Algorithms" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26462.pdfPaper URL: https://www.ijtsrd.com/engineering/computer-engineering/26462/performance-comparison-of-file-security-system-using-tea-and-blowfish-algorithms/win-myat-thu
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
Cloud computing is a structure for rendering service to the user for free or paid basis through internet facility where we can access to a bulk of shared resources which results in saving managing cost and time for large companies, The data which are stored in the data center may incur various security, damage and threat issues which may result in data leakage, insecure interface and inside attacks. This paper will demonstrate the implementation of hybrid cryptography security in public cloud by a combination of Elliptical Curve Cryptography and Twofish algorithm, which provides an innovative solution to enhance the security features of the cloud so that we can improve the service thus results in increasing the trust over the technology.
Today information security is a challenging factor that touches a lot of areas, including computers and communications. Message communication is kept secure through cryptography so that an eavesdropper is not able to decipher a transmitted message. One of the oldest and simplest known algorithms for cryptography is the Caesar cipher algorithm. In this paper, three programs based on Java, C++, and Python languages have been developed to implement the Caesar cipher algorithm to aid information security students and help them understand this fundamental algorithm. A code flow chart is used for each program to describe the code’s flow. It also reveals the sequence of steps for the code’s main methods, as well as the relationships between them. Furthermore, various technical descriptions are presented in detail for each of the methods used in both the encoding and the decoding of the messages.
In this paper, we consider ‘secure attribute based system with short ciphertext’ is a tool for implementing fine-grained access control over encrypted data, and is conceptually similar to traditional access control methods such as Role-Based Access Control. However, current ‘secure attribute based system with short ciphertext’ schemes suffer from the issue of having long decryption keys, in which the size is linear to and dependent on the number of attributes.Ciphertext-Policy ABE (CP-ABE) provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. We propose a novel ‘secure attribute based system with short ciphertext’ scheme with constant-size decryption keys independent of the number of attributes. We found that the size can be as small as 672 bits.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
Cloud computing environment requires secure access for data from the cloud server, small execution time, and low time complexity. Existing traditional cryptography algorithms are not suitable for cloud storage. In this paper, an efficient two-stage cryptography scheme is proposed to access and store data into cloud safely. It comprises both user authentication and encryption processes. First, a two-factor authentication scheme one-time password is proposed. It overcomes the weaknesses in the existing authentication schemes. The proposed authentication method does not require specific extra hardware or additional processing time to identity the user. Second, the plaintext is divided into two parts which are encrypted separately using a unique key for each. This division increases the security of the proposed scheme and in addition decreases the encryption time. The keys are generated using logistic chaos model theory. Chaos equation generates different values of keys which are very sensitive to initial condition and control parameter values entered by the user. This scheme achieves high-security level by introducing different security processes with different stages. The simulation results demonstrate that the proposed scheme reduces the size of the ciphertext and both encryption and decryption times than competing schemes without adding any complexity.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
In many of today’s computer application needs, faster operation is essential to the efficient implementation
of information security algorithm. RC4 has been used as the data encryption algorithm for many
applications and protocols including the Wi-Fi, Skype, and Bit Torrent to name a few. Several efficient
approaches to the implementation of RC4 have been proposed and we review some of those. More recently
some parallel approaches to faster implementation of RC4 have been presented and we include those in our
survey of efficient approaches to RC4. This paper presents an analysis of available hardware/software
parallel implementations of RC4 symmetric key-based algorithm and some security approaches which
make it more secure.
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
The process of transforming plaintext data into cipher text in order to conceal its meaning in case it fall to hand of unauthorized recipient is refers to as encryption. The systems that perform the encryption processes are known as cryptosystems, there are several cryptosystem algorithms: RSA, RC4, DES, 3DES, Blowfish, AES, IDEA, Skipjack, DSA, ElGamal, etc. The major features that identify and differentiate one cryptosystem algorithm from another are its ability to secure the protected data against attacks and its speed/efficiency. In this paper: application software was designed to implement RSA, and RCA encryption algorithms with advanced features of visual Basic 6 for the front end interface. Microsoft Access is used to design backend of the application, and the Macromedia Flash was also used to incorporate dynamic features that enhance the appearance of the application. The program was used to compare the performance of RSA and RC4. The encryption operation was carried out for both RSA and RC4 using five text files and five graphic files of different sizes 10, 50, 100, 150, and 200 kilobyte respectively. The major factor considered for measuring the performance of the algorithms (RSA and RC4) is the speed of execution using time of execution (TE) as parameter for the evaluation. The performance result was presented and analyzed. We discovered that the RC4 is better compare to RSA algorithm based on the experimental facts presented and the result analysis of the two evaluated algorithms.
Cryptography is a process used for sending information in secret way. Goal of this process is to provide protection for information but in different way. In this paper our motive to represent a new method for protection that is generated by combination of RSA and 2 bit rotation mechanism of cryptography. There are many algorithms exist for this process. For cryptography there are algorithms like RSA, IDEA, AES, and DES but here we are using only one algorithm from these that is RSA which is enough to implement combined process using 2 bit rotation. The encrypted image is used as input for network for further implementation.RSA encrypt image with 1 bit rotation. In 1 bit rotation only 1 bit is shifted and at decrypt side shifted bit are reversed. But to make it more secure we are going to perform 2 bit rotation due to which it is more secure as compared to existing algorithm. After applying the 2 bit rotation we perform the permutation of that image that will give us encrypted image. Shivam Kumar | Dr. Ganesh D "Image Cryptography using RSA Algorithm" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42408.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/42408/image-cryptography-using-rsa-algorithm/shivam-kumar
A novel paradigm in authentication systemIJNSA Journal
Maintaining the security of your computer, network and private/sensitive data against unauthorized access
and a wide variety of security threats can be challenging. Verifying data integrity and authentication are
essential security services in order to secure data transmission process. In this paper we propose a novel
security technique which uses new encryption and decryption algorithms to achieve authenticated
communication and enhanced data integrity. The proposed technique is very complex for attackers to
decode, and it is applicable to client-server architecture.
Three Party Authenticated Key Distribution using Quantum CryptographyIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Security analysis of fbdk block cipher for digital imageseSAT Journals
Abstract Network security is one of the major concerns in the modern world. In this regard, a strong security technique is required to protect user data. Cryptography techniques plays an important role in secured transmission through encryption of data and thus ensuring integrity, authenticity, confidentiality of information. Several encryption algorithms have been proposed like AES (Advanced Encryption Standard), DES (Data Encryption Standard) and RSA. These provide very good encryption for text applications. However, these encryption schemes appear not to be ideal for image applications. Some algorithms like GKSBC and RC6 provide very good encryption for digital images. New techniques are emerging that are aimed at providing secured transmission of images over networks. The FBDK (Fixed Block with Dynamic Key Size) block cipher is a new cryptography technique designed using simple operations like XOR, substitutions, circular shifting. The FBDK algorithm is applicable for blocks of any size with key size being dynamic for each block. It does not involve any complex mathematical operations like modular exponentiation. It is a hybrid cryptography technique based on symmetric key and asymmetric key cryptosystems. This paper investigates the security of FBDK block cipher for digital images against brute-force attack, statistical analysis and Differential analysis attacks. In this paper, various security analysis tests has been discussed which are helpful in finding out whether the FBDK encryption algorithm can do secure encryption or not. Experimental results proves the security and efficiency of FBDK cipher for images against all aforementioned types of attacks which justifies its consideration for real time image applications. Keywords: Cryptography, Ciphers, Encryption, Security, and cryptanalysis.
Features of genetic algorithm for plain text encryption IJECEIAES
The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed processing.
Enhancing the Techniques to Secure Grid Computingijtsrd
Security is important issue in every aspect in todays world if you are using the networks. Various algorithms are there to secure your network so that unauthorized user cant breach into your accounts. SO for this authentication and authorization plays an important role but apart from these use of various encryption algorithms are there for grid data security. By using these algorithms you can easily secure your network and it will also enhance the performance of our grid networks. In this paper model has been designed for grid security that is been implemented on network Simulator and the performance has been measured with the previous models. By using various cryptographic algorithms the efficiency and the packed delivery ratio is increased incredibly. Simranjeet Kaur"Enhancing the Techniques to Secure Grid Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd2531.pdf http://www.ijtsrd.com/computer-science/computer-network/2531/enhancing-the-techniques-to-secure-grid-computing/simranjeet-kaur
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
Abstract— Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. ECC generates keys through the properties of the elliptic curve equation instead of the traditional method of generation as the product of very large prime numbers. Because ECC helps to establish equivalent security with lower computing power and battery resource usage, it is becoming widely used for mobile applications. Recently the bilinear pairing such as Weil Pairing or Tate Pairing on elliptic curves and hyper elliptic curves has been found various applications in cryptography. Several identity-based cryptosystems using bilinear pairings of elliptic curves or hyper elliptic curves were presented. Blind signature and ring signature are very useful to provide the user’s anonymity and the signer’s privacy. The proposed method focuses an ID-based ring signature scheme which is based on the pairings with elliptic curve cryptography. The proposed method is used to reduce the number of computation of the pairing for the verification of the id based signature and also decoding of the id based public key cryptosystems with authentication by factor of 2.
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
With the progress in data exchange by the electronic system, the need for information security has become a necessity. Due to the growth of multimedia application, security becomes an important issue of communication and storage of different files. To make its reality, cryptographic algorithms are widely used as essential tools. Cryptographic algorithms provide security services such as confidentiality, authentication, data integrity and secrecy by encryption. Different cryptographic algorithms are commonly used for information security in many research areas. Although there are two encryption techniques, asymmetric and symmetric, the simpler symmetric encryption technique is employed for testing file security system. In this study, the performance evaluation of the most common two symmetric encryption algorithms such as TEA and Blowfish algorithm is focused on the execution time intervals. Simulation has been conducted with many types of file encryption like .pdf, .txt, .doc, .docx, .xlsx, .pptx, .ppt, .xls, .jpg, .png and most common video file formats by using Java Programming Language. Win Myat Thu | Tin Lai Win | Su Mu Tyar "Performance Comparison of File Security System using TEA and Blowfish Algorithms" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26462.pdfPaper URL: https://www.ijtsrd.com/engineering/computer-engineering/26462/performance-comparison-of-file-security-system-using-tea-and-blowfish-algorithms/win-myat-thu
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
Cloud computing is a structure for rendering service to the user for free or paid basis through internet facility where we can access to a bulk of shared resources which results in saving managing cost and time for large companies, The data which are stored in the data center may incur various security, damage and threat issues which may result in data leakage, insecure interface and inside attacks. This paper will demonstrate the implementation of hybrid cryptography security in public cloud by a combination of Elliptical Curve Cryptography and Twofish algorithm, which provides an innovative solution to enhance the security features of the cloud so that we can improve the service thus results in increasing the trust over the technology.
Today information security is a challenging factor that touches a lot of areas, including computers and communications. Message communication is kept secure through cryptography so that an eavesdropper is not able to decipher a transmitted message. One of the oldest and simplest known algorithms for cryptography is the Caesar cipher algorithm. In this paper, three programs based on Java, C++, and Python languages have been developed to implement the Caesar cipher algorithm to aid information security students and help them understand this fundamental algorithm. A code flow chart is used for each program to describe the code’s flow. It also reveals the sequence of steps for the code’s main methods, as well as the relationships between them. Furthermore, various technical descriptions are presented in detail for each of the methods used in both the encoding and the decoding of the messages.
In this paper, we consider ‘secure attribute based system with short ciphertext’ is a tool for implementing fine-grained access control over encrypted data, and is conceptually similar to traditional access control methods such as Role-Based Access Control. However, current ‘secure attribute based system with short ciphertext’ schemes suffer from the issue of having long decryption keys, in which the size is linear to and dependent on the number of attributes.Ciphertext-Policy ABE (CP-ABE) provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. We propose a novel ‘secure attribute based system with short ciphertext’ scheme with constant-size decryption keys independent of the number of attributes. We found that the size can be as small as 672 bits.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...IAEME Publication
A smart grid represents a straightforward improvement of a power grid, which effectively hands over electricity from suppliers to clients. It generally uses a two-way digital communication with an eye on managing the devices at client households. They are also competent to conserve energy, scale down overhead costs and to enhance consistency and lucidity. It is home to smart meters, which pave the way for communication with the main central system. As against home energy monitors, smart meters are capable of collecting data for distant reporting. The distribution or receipt of the data is very safely carried out to safeguard the confidentiality of the client power utilization and also to ensure continuous power distribution. Therefore, the cryptography technique is effectively used for increasing the safety and for furnishing the consistent power supply for the uninterrupted power distribution.
Securing sensitive and important information from intruders is a tedious task in the 21st century. In order to protect information different ciphering techniques has been used. Quantum Cryptography has taken a new path in the field of crypto systems where all the presently used crypto systems are classified as classical cryptography systems. Classical cryptography systems use mathematical formulas where quantum cryptography uses the principles of photon polarization and heisenberg uncertainty principle. As the south
asian region is developing rapidly in almost all the sectorsthe need of securing information has become a difficult task. Therefore, the need of starting extensive research on quantum cryptography for the south asian region to safeguard information from intruders has been the purpose of this study. Comparative study of the growth of the telecommunication sector in the south asian region and how quantum
cryptography could assist in securing information has been discussedas results.In the end, details of the need to research on quantum cryptography in the south asian region to overcome future predicted cyber threats are also discussed.
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
Elliptic curve cryptography (ECC) is an effective approach to protect privacy and security of information. Encryption
provides only one level of security during transmission over the channel. Hence there is a need for a stronger encryption which is very
hard to break. So, to achieve better results and improve security, information has to pass through several levels of encryption. The aim
of this paper would be to provide two levels of security. First level comprises of plaintext using as security key compressed block to
encrypt text based ECC technique and the second level comprises of scrambling method with compression using 2D Cellular rules. In
particular, we propose an efficient encryption algorithm based ECC using Cellular automata and it is termed as Elliptic Curve
Cryptosystem based Cellular Automata (ECCCA). This paper presents the implementation of ECCCA for communication over
insecure channel. The results are provided to show the encryption performance of the proposed method.
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...IJCI JOURNAL
The process of protecting information by transformi
ng (encrypting) it into an unreadable format is cal
led
cryptography. Only those who possess secret key can
decipher (decrypt) the message into plain text.
Encrypted messages can sometimes be broken by crypt
analysis, also called code breaking, so there is a
need for strong and fast cryptographic methods for
securing the data from attackers. Although modern
cryptography techniques are virtually unbreakable,
sometimes they also tend to attack.
As the Internet, big data, cloud data storage and
other forms of electronic communication become more
prevalent, electronic security is becoming increasi
ngly important. Cryptography is used to protect e-m
ail
messages, credit card information, corporate data,
cloud data and big data so on... So there is a need
for
best and fast cryptographic methods for protecting
the data. In this paper a method is proposed to pro
tect
the data in faster way by using classical cryptogra
phy. The encryption and decryption are done in par
allel
using threads with the help of underlying hardware.
The time taken by sequential and parallel method i
s
analysed
Data security and protection is one of the most common technologies used in the field of computer science. This is because of its great importance in all fields related to daily life, whether political, economic, and other aspects change. In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. Furthermore, the image recognition rate is increased. In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. The proposed technique relies on using square root of public key as private key. XOR operation for colored images encryption and decryption is performed. By calculating signal to noise ratio (PSNR), mean square error (MSE), and bit error rate (BER), the most important things that we address how to provide data security for large data based on encryption techniques and increase the security of multimedia data and texture date and address the problem of time and accuracy in image matching. the results show that the quality of images after decryption is good.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
Advances in communication networks have enabled organization to send confidential data such as digital images over wireless networks. However, the broadcast nature of wireless communication channel has made it vulnerable to attack from eavesdroppers. We have developed a hybrid cryptography technique, and we present its application to digital images as a means of improving the security of digital image for transmission over wireless communication networks. The hybrid technique uses a combination of a symmetric (Data Encryption Standard) and asymmetric (Rivest Shamir Adleman) cryptographic algorithms to secure data to be transmitted between different nodes of a wireless network. Three different image samples of type jpeg, png and jpg were tested using this technique. The results obtained showed that the hybrid system encrypt the images with minimal simulation time, and high throughput. More importantly, there is no relation or information between the original images and their encrypted form, according to Shannon’s definition of perfect security, thereby making the system much more secure.
Cryptography technology is a security technique used to change plain text to another shape of data or to
symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey
through public networks. Currently, there are many proposed algorithms that provide this service
especially for sensitive data or very important conversations either through mobile or video conferences. In
this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is
compared to the AES. The algorithm has four different rounds for each quarter of the key container table,
and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight
and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested
algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table
are big.
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
Cryptography technology is a security technique used to change plain text to another shape of data or to symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey through public networks. Currently, there are many proposed algorithms that provide this service especially for sensitive data or very important conversations either through mobile or video conferences. In this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is compared to the AES. The algorithm has four different rounds for each quarter of the key container table, and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table are big.
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
In the military devices there is need to transmission of data security and fast. These proposed technique presents the secure,
efficient and fast way to send images using Identity Based Cryptography and Visual Cryptography. In this application Identity Based
Cryptography is used with Visual cryptography. In Identity based cryptography the RSA Cryptosystem is used to generate public and
private key by using Ancient Indian Mathematics for fast mathematical calculation. RSA is the safest and standard algorithm. Vedic
method is so efficient in multiplication terms of area, speed compered to its modern mathematics implementation. The regeneration of
public/private key is adopted to make the system more secure from various attacks.
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Similar to A new hybrid text encryption approach over mobile ad hoc network (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 6461 - 6471
6462
(like the Internet) so that it cannot be read by anyone except the intended recipient. While cryptography is
the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication.
Cryptanalysts are also called attackers. Cryptology embraces both cryptography and cryptanalysis [2].
Cryptographic algorithm is a function used for both encryption and decryption processes.
In the encryption process, the plaintext (original data) is converted into ciphertext (unreadable) before
sending it via the internet to the recipient. In the decryption process, when the data reaches to the intended
recipient, it will be returned the ciphertext back to the original data. Since the cryptographic function is
mainly dependent on a key value necessary for both encryption and decryption [3]. The cryptographic
algorithms can be classified into two main categories which are symmetric key cryptographic algorithms and
asymmetric key cryptographic algorithms [4].
In symmetric key cryptographic algorithms, keys used for encryption and decryption processes are
the same, as shown in Figure 1. This requires that sender and receiver agree on the key prior to any
information exchange, which is called secret key [3, 4]. Symmetric algorithm may contain stream ciphers and
block ciphers. Stream ciphers encrypts single bit of plain text at a time, whereas block ciphers encrypt
a number of bits of plain text as a single unit. Hill cipher algorithm is an example of symmetric key
cryptographic. Although, the Hill cipher algorithm offers several benefits like simple structure, high speed
and high throughput, but the level of security is weak, because the sender and receiver share the same
key (private key) via unsecured channels [5, 6]. This could lead to easily discover the encryption and
decryption keys.
Figure 1. Symmetric key cryptographic
While in asymmetric key cryptographic algorithms, the opposite, where the key used for decryption
process is different from the one used for encryption process. It is extremely difficult to determine one key by
analyzing the other. This allows for the free distribution of one key (i.e., public), while the key used for
decryption is kept private (private key) [3, 4]. Elliptic curve cryptography (ECC) is an example of
asymmetric key cryptographic. Figure 2 illustrates asymmetric key cryptography processes.
Figure 2. Asymmetric key cryptographic
3. Int J Elec & Comp Eng ISSN: 2088-8708
A new hybrid text encryption approach over mobile ad hoc network (Mohammed Amin Almaiah)
6463
Elliptic curve cryptography (ECC) is one of the effective asymmetric key cryptographic algorithms
which depends on that sender uses a key differ than the receiver’s private key and each party generates
the public and secret key separately after agreeing on elliptic curve domain parameters [1, 2]. ECC provides
a smaller key size with reducing storage and transmission requirements as compared to other algorithms like
RSA [6, 7]. This means that that an elliptic curve algorithm could provide the same level of security afforded
by an RSA-based system with a large modulus and correspondingly larger key: for example, a 256-bit elliptic
curve public key should provide comparable security to a 3072-bit RSA public key.
In fact, several researchers have indicated that the problem associated with the cryptographic
algorithms is the security that can be provided. This means that the strength of any cryptographic algorithm
depends on the strength of the keys used. In other words, the problem of low-level security of any algorithm
arises from the weak encryption and decryption keys that have been used and because of the rapid growth in
factorization algorithms; weak encryption and decryption keys were easily factored and discovered.
To overcome this problem and to provide a good level security, the used keys should be powerful enough [3].
In this work a new encryption and decryption method based on combining the elliptic curve
cryptosystem (ECC) with hill cipher (HC) algorithm, which is called (ECCHC). This new approach starts
with agree of both sender and receiver to share the domain parameters through elliptic curve function. Then it
generates the private and public keys by using the ECC algorithm. Then both sender and receiver have
the ability to produce the secret key using the self-invertible key matrix, thus no need to share it through
the internet or unsecured communication channel. Also, the same key can be used for encryption and
decryption (the matrix is self-invertible if (
1
k k
), and no need to find the inverse key matrix. The aim of
using the proposed self-invertible key matrix in this study is:
- To overcome the problem in Hill cipher algorithm, which is that the inverse of the key matrix does not
always exist. So, if the key matrix is not invertible, the decryption process cannot be done,
and the receiver cannot get the original data.
- To overcome the problem of distributing the secret key and to make the proposed algorithm more secure
and difficult or even impossible to be broken and
- To overcome the problem of delaying the decryption process. Majority of cryptography approaches use
the alphabets (a, b, c, …, z), so it needs to assign each character to numerical value through mapping
table. While, in our proposed approach, all characters from the 128 ASCII table can be included in
the plaintext message and then decrypted directly by its ASCII value without needing to assign it with
numerical value from mapping table, which reduces the computational process needs during
the decryption process. Thus, the decryption process will be faster.
This paper is organized as follows. An introduction to elliptic curve function over a prime field is
introduced in Section 2. Section 3 describes the original Hill Cipher algorithm. Section 4 explains
the proposed hybrid encryption approach. An example of the proposed approach is given and analyzed in
Section 5. Finally, Section 6 shows the conclusion and the advantages of the proposed approach.
2. LITERATURE REVIEW
Several researchers have tried to improve the security of Hill Cipher. Ismail [8] proposed
a new Hill cipher (HillMRIV) that adjusting the encryption key and using a different key for each plaintext
block instead of using one key matrix for all blocks and increasing the security of Hill algorithm.
Bibhudendra [9] solved the decryption problem if the inverse key matrix does not exist by proposing a novel
advanced Hill algorithm (AdvHill) that uses an involutory key matrix for encryption and decryption and
eliminates the computations needed by the recipient to find the inverse key matrix. Hamissa [10] enhanced
Hill cipher algorithm security by using chaotic functions and presenting a new encoder-decoder technique
(ChaoEncoDeco). Nordin [11] proposed a new Hill algorithm (Hill++) that computed a random matrix key
based on the previous blocks as an extra key for encryption and resisted all zeroes plaintext blocks.
Agrawal and Gera [12] produced a new method for encryption by using Hill cipher algorithm first to
produce the ciphertext numerical values, then convert it to points on the ECC by using scalar multiplication.
This method increased the security but also increased the time of computations because scalar multiplication
consumed a long time. Sharma and Chirgaiya [13] proposed a method to solve the problem of decryption in
the Hill cipher if the key matrix is not invertible, they suggested using setting offset value one if
the determinant of a matrix is zero and offset value -1 if the determinant is negative. Mahmoud and
Chefranov [14] proposed modification for the Hill cipher (HCM-PRE) that resists known plaintext-ciphertext
attack by using pseudo-random eigenvalues and changing key matrix dynamically. Ramesh [15] introduced
an algorithm consists of four stages to eliminate the repetition of the substrings and enhance the security, and
double columnar transposition is done for the plaintext twice, each time before applying Hill cipher
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 6461 - 6471
6464
encryption. Dawahdeh [16] proposed a new image encryption technique that combined elliptic curve
cryptosystem with hill cipher and applied the new technique on grayscale images and got a good results
compared with other similar techniques.
3. ELLIPTIC CURVE FUNCTION
Elliptic curve cryptography (ECC) is a suitable encryption technique to be used in mobile devices
because it can provide high security with smaller key size and fewer computations with little memory and
fewer power consumptions. This section describes the primary operations related to elliptic curve function.
Definition 2.1. An elliptic curve 𝐸 over a prime field 𝐹𝑝 is defined by
𝐸: 𝑦2
≡ 𝑥3
+ 𝑎𝑥 + 𝑏 (𝑚𝑜𝑑 𝑝)
where 𝑎, 𝑏 ∈ 𝐹𝑝 , 𝑝 ≠ 2, 3, and satisfy the condition 4𝑎3
+ 27𝑏2
≢ 0 (𝑚𝑜𝑑 𝑝). The set of all points (𝑥, 𝑦) that
satisfy the elliptic curve 𝐸 with the point O at the infinity represent the elliptic curve group 𝐸(𝐹𝑝) [1, 17].
3.1. ELLIPTIC CURVE OPERATIONS
3.1.1. Point addition
Suppose 𝑃 = (𝑥1, 𝑦1) and 𝑄 = (𝑥2, 𝑦2), where 𝑃 ≠ 𝑄, are two points lie on an elliptic curve 𝐸.
Adding the two points 𝑃 and 𝑄 giving a third point 𝑅 that should lie on the same curve 𝐸. Depending on
the coordinates of the points 𝑃 and 𝑄, there are two cases for this addition [12, 18].
If 𝑃 ≠ 𝑄 ≠ 𝑂 with 𝑥1 ≠ 𝑥2, the sum of the points 𝑃 and 𝑄 is defined by
𝑅 = 𝑃 + 𝑄 = (𝑥3, 𝑦3)
where
𝜆 =
(𝑦2− 𝑦1)
(𝑥2− 𝑥1)
𝑥3 ≡ (𝜆2
− 𝑥1 − 𝑥2) (𝑚𝑜𝑑 𝑝)
𝑦3 ≡ (𝜆𝑥1 − 𝜆𝑥3 − 𝑦1) (𝑚𝑜𝑑 𝑝)
If 𝑥1 = 𝑥2 but 𝑦1 ≠ 𝑦2 then 𝑃 + 𝑄 = 𝑂.
3.1.2. Point doubling
Point doubling means adding the point 𝑃 = (𝑥1, 𝑦1) that lies on the elliptic curve 𝐸 to itself.
The point 𝑅 that results from doubling is also lies on the elliptic curve 𝐸 [19, 20].
𝑅 = 2𝑃 = 𝑃 + 𝑃 = (𝑥3, 𝑦3)
where
𝜆 =
3 𝑥1
2 + 𝑎
2 𝑦1
𝑥3 ≡ (𝜆2
− 2𝑥1) (𝑚𝑜𝑑 𝑝)
:𝑦3 ≡ (𝜆𝑥1 − 𝜆𝑥3 − 𝑦1) (𝑚𝑜𝑑 𝑝)
3.1.3. Scalar multiplication
The scalar multiplication of an integer 𝑘 by the point 𝑄 = (𝑥1, 𝑦1) that lies on the curve 𝐸 can be
defined by repeating the addition of the point 𝑄 to itself 𝑘 times. The results point 𝑅 also lies on the elliptic
curve 𝐸.
𝑅 = 𝑘𝑄 = 𝑄 + 𝑄 + ⋯ + 𝑄⏟
𝑘−𝑡𝑖𝑚𝑒𝑠
For example, computing 15𝑄 can be done using point addition and point doubling as follows [19]:
15𝑄 = 2(2(2𝑄 + 𝑄) + 𝑄) + 𝑄
5. Int J Elec & Comp Eng ISSN: 2088-8708
A new hybrid text encryption approach over mobile ad hoc network (Mohammed Amin Almaiah)
6465
4. HILL CIPHER ALGORITHM
Hill cipher is a symmetric block cipher technique invented by the mathematician Lester Hill in
1929 [21]. Both sender and receiver should share and use the same key matrix for ciphering and deciphering.
The main concept of this technique based on assign each letter by a numerical value, for example, a=0, b=1, …,
z=25. Then divide the plaintext (message) into blocks consist of the same size m depending on the key matrix
size m m . For example, if the block size is two ( 2 1P ), then the key matrix ( 2 2K ) should be of size 2 2 ,
and the encryption process will produce ciphertext with two numerical values ( 2 1C ) as follows [12]:
If
1
2
p
P
p
and
11 12
21 22
k k
K
k k
then
1 11 12 1 11 1 12 2
2 21 22 2 21 1 22 2
( )mod26
mod26
( )mod26
c k k p k p k p
C
c k k p k p k p
To decrypt the ciphertext, the recipient needs to compute the key matrix inverse ( 1
K
) where
1
. ,K K I
I is the identity matrix, then use the following equation to produce the plaintext (original message) [9, 21].
1
. mod26P K C
5. THE PROPOSED CRYPTOSYSTEM
The new approach of Elliptic Curve Cryptosystem and Hill Cipher (ECCHC) has been introduced in
this section. This modification increases the security and makes the system more efficient than the original
technique, also speeds up the decryption computations because no need to compute the key matrix inverse.
Suppose User A (the sender) wants to send a message 𝑀 to User B (the receiver) using ECCHC over an
insecure channel. Firstly, they should agree on the elliptic curve function 𝐸 and share the domain parameters
{𝑎, 𝑏, 𝑝, 𝐺}, where 𝑎, 𝑏 are the coefficients of the elliptic function, 𝑝 is a large prime number, and 𝐺 is
the generator point. Then each party needs to choose his private key randomly from the interval [1, 𝑝 − 1];
𝑛 𝐴 for User A and 𝑛 𝐵 for User B. The public key for each user can be generated as follows
𝑃𝐴 = 𝑛 𝐴 . 𝐺
𝑃𝐵 = 𝑛 𝐵 . 𝐺
Each user multiplies his private key by the public key of the other user to get the initial key 𝐾𝐼 = (𝑥, 𝑦)
𝐾𝐼 = 𝑛 𝐴. 𝑃𝐵 = 𝑛 𝐵. 𝑃𝐴 = 𝑛 𝐴. 𝑛 𝐵. 𝐺 = (𝑥, 𝑦)
Then computes
𝐾1 = 𝑥 . 𝐺 = (𝑘11, 𝑘12)
𝐾2 = 𝑦 . 𝐺 = (𝑘21, 𝑘22)
Next step is generating the secret key matrix by sender and receiver. The inverse of the key matrix
does not always exist. So, if the key matrix is not invertible, the recipient cannot decrypt the ciphertext.
To solve this problem, the self-invertible key matrix will be generated, and the same key will be used for
encryption and decryption (the matrix K is self-invertible if 1
K K
), and no need to find the inverse key
matrix. Assume the message 𝑴 divided into blocks of size four characters (add space to complete the last
block, if necessary). So, each party produces the 4 4 self-invertible key matrix 𝑲 𝒎 by using the proposed
method in [16, 22]:
Let
11 12 13 14
21 22 23 24
31 32 33 34
41 42 43 44
m
k k k k
k k k k
K
k k k k
k k k k
be self-invertible matrix partitioned as 11 12
21 22
m
K K
K
K K
.
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 6461 - 6471
6466
The proposed approach assumes that 11 12
11
21 22
k k
K
k k
, then the values of the other partitions of the secret
matrix key mK is obtained by solving 12 11K I K , 21 11K I K , and 11 22 0K K , where I is
the identity matrix.
The main concept of Hill cipher depends on assigning a numerical value for each character in
the plaintext [23]. The decimal ASCII code table from 32 to 126 will be used for this issue (space=32, !=33,
…, 0=48, 1=49, …, A=65, B=66, …, a=97, b=98, …, ~=126), and mod 95 will be used in this case for
modulo. This modification considered as a new contribution in this approach because all other methods
encrypt only (a=0, b=1, …, z=25), whereas all characters from the 128 ASCII table can be included in
the plaintext message of the proposed approach [24, 25].
Now, separate the plaintext message 𝑀 into blocks of size four characters (add space to complete
the last block, if necessary) and replace each character by its decimal ASCII value and take modulo 95 for
each value, then arrange each block into four rows column vector (𝑃1, 𝑃2, 𝑃3, …) and multiply
the self-invertible key matrix 𝐾 𝑚 by each vector and take modulo 95 to get the ciphertext vectors
(𝐶1, 𝐶2, 𝐶3, …). After that, add 32 to each value in the ciphertext vectors because we work only on characters
that start from the value 32 in the ASCII table. Then replace each numerical value in the ciphered vectors
with its corresponding character from the ASCII table and rearrange the characters in a new message 𝐶 that
represents the ciphered message. The following calculations are repeated for each block:
Let
11
21
1
31
41
p
p
P
p
p
then
11 12 13 14 11 11 12 21 13 31 14 4111
21 22 23 24 21 11 22 21 23 31 24 4121
1 1
31 32 33 34 31 11 32 21 33 31 34 431
41 42 43 44 41
(( )mod95) 32
(( )mod95) 32
.
((m
k k k k k p k p k p k pp
k k k k k p k p k p k pp
C K P
k k k k k p k p k p k pp
k k k k p
11
21
1 31
41 11 42 21 43 31 44 41 41
)mod95) 32
(( )mod95) 32
c
c
c
k p k p k p k p c
Decryption processes start when the recipient receives the ciphertext 𝐶 by separating the ciphertext
into blocks of size four characters then replacing each character by its decimal ASCII value and subtracting
32 from each value and arrange each block into four rows column vector. Then multiplies the self-invertible
key matrix 𝐾 𝑚 by each vector (𝐶1, 𝐶2, 𝐶3, …) and takes modulo 95 to get the plaintext vectors (𝑃1, 𝑃2, 𝑃3, …).
Finally, adds 95 to each value less than 32 and replaces each numerical value with its corresponding
character from the ASCII table to get the original plaintext message 𝑀.
5.1. The proposed approach (ECCHC)
Step 1: Key Generation
User A (The sender)
1. Choose the private key 𝑛 𝐴 ∈ [1, 𝑝 − 1]
2. Compute the public key 𝑃𝐴 = 𝑛 𝐴. 𝐺
3. Compute the initial key 𝐾𝐼 = 𝑛 𝐴. 𝑃𝐵 = (𝑥, 𝑦)
4. Compute 𝐾1 = 𝑥 . 𝐺 = (𝑘11, 𝑘12) and 𝐾2 = 𝑦 . 𝐺 = (𝑘21, 𝑘22)
5. Generate the self-invertible key matrix mK
User B (The receiver)
1. Choose the private key 𝑛 𝐵 ∈ [1, 𝑝 − 1]
2. Compute the public key 𝑃𝐵 = 𝑛 𝐵. 𝐺
3. Compute the initial key 𝐾𝐼 = 𝑛 𝐵. 𝑃𝐴 = (𝑥, 𝑦)
4. Compute 𝐾1 = 𝑥 . 𝐺 = (𝑘11, 𝑘12) and 𝐾2 = 𝑦 . 𝐺 = (𝑘21, 𝑘22)
5. Generate the self-invertible key matrix mK
Step 2: Encryption (User A)
1. Separate the plaintext message 𝑀 into blocks of size four characters.
2. Replace each character by its decimal ASCII value and take modulo 95 for each value.
7. Int J Elec & Comp Eng ISSN: 2088-8708
A new hybrid text encryption approach over mobile ad hoc network (Mohammed Amin Almaiah)
6467
3. Arrange each block into four rows column vector ( 4 1 ).
4. Multiply the self-invertible key matrix 𝐾 𝑚 by each vector (𝑃1, 𝑃2, 𝑃3, …) and take modulo 95 for
each value 1 1( . ) mod95mC K P
5. Add 32 to each value in the ciphertext vectors (𝐶1, 𝐶2, 𝐶3, …).
6. Replace each numerical value with its corresponding character from the ASCII table.
7. The resulting text forms the ciphertext message 𝐶.
Step 3: Decryption (User B)
1. Separate the ciphertext message 𝐶 into blocks of size four characters.
2. Replace each character by its decimal ASCII value.
3. Subtract 32 from each value in the ciphertext blocks.
4. Arrange each block into four rows column vector.
5. Multiply the self-invertible key matrix 𝐾 𝑚 by each vector (𝐶1, 𝐶2, 𝐶3, …) and take modulo 95 for
each value 1 1( . ) mod95mP K C
6. Add 95 to each value in step5 less than 32.
7. Replace each numerical value in the vectors (𝑃1, 𝑃2, 𝑃3, …) by its ASCII table corresponding
character.
8. The resulting text forms the decrypted message 𝑀.
6. EXPERIMENTAL RESULTS AND ANALYSIS
Assume that User A wants to send the message 𝑀 to User B and they agreed to use the elliptic curve
function
𝐸: 𝑦2
≡ 𝑥3
+ 𝑥 + 3 (𝑚𝑜𝑑 31)
where 𝐴 = 1, 𝐵 = 3, 𝑝 = 31; which satisfies the condition 4𝐴3
+ 27𝐵2
= 4(1)3
+27(3)2
= 4+243 = 247 mod
31 = 30 0. The elliptic curve 𝐸31(1, 3) points are shown in Table 1 [16, 18].
Table 1. The points of the elliptic curve 𝐸: 𝑦2
≡ 𝑥3
+ 𝑥 + 3 (𝑚𝑜𝑑 31)
(1, 6) (6, 15) (15, 13) (21, 4) (26, 11)
(1, 25) (6, 16) (15, 18) (21, 27) (26, 20)
(3, 8) (9, 11) (17, 2) (22, 3) (27, 11)
(3, 23) (9, 20) (17, 29) (22, 28) (27, 20)
(4, 3) (12, 10) (18, 5) (23, 14) (28, 2)
(4, 28) (12, 21) (18, 26) (23, 17) (28, 29)
(5, 3) (14, 8) (20, 5) (24, 5) (30, 1)
(5, 28) (14, 23) (20, 26) (24, 26) (30, 30)
Since the order of the elliptic curve 𝐸31(1, 3) is 41, which is a prime number, any point from
Table 1 can be chosen to represent the base point or generator point 𝐺. So, if we choose 𝐺 = (1, 6),
the domain parameters for 𝐸 are {𝐴, 𝐵, 𝑝, 𝐺} = {1, 3, 31, (1, 6)}. If User A wants to send the plaintext
message 𝑀 =“Hi, our meeting at 10 Am” to User B. Both sender and receiver should apply the proposed
approach (ECCHC) on the message 𝑀 as follows:
6.1. The proposed approach (ECCHC)
Step 1: Key Generation
User A
1. Choose the private key 𝑛 𝐴 = 13 ∈ [1, 30]
2. Compute the public key 𝑃𝐴 = 𝑛 𝐴. 𝐺 = 13(1, 6) = (3, 23)
3. Compute the initial key 𝐾𝐼 = 𝑛 𝐴. 𝑃𝐵 = 13(24, 5) = (20, 5) = (𝑥, 𝑦)
4. Compute 𝐾1 = 𝑥 . 𝐺 = 20(1, 6) = (4, 28) = (𝑘11, 𝑘12) and
𝐾2 = 𝑦 . 𝐺 = 5(1, 6) = (15, 18) = (𝑘21, 𝑘22)
5. Assume that 11
4 28
15 18
K
, then the self-invertible key matrix
4 28 92 67
15 18 80 78
5 28 91 67
15 19 80 77
mK
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 6461 - 6471
6468
User B
1. Choose the private key 𝑛 𝐵 = 17 ∈ [1, 30]
2. Compute the public key 𝑃𝐵 = 𝑛 𝐵. 𝐺 = 17(1, 6) = (24, 5)
3. Compute the initial key 𝐾𝐼 = 𝑛 𝐵. 𝑃𝐴 = 17(3, 23) = (20, 5) = (𝑥, 𝑦)
4. Compute 𝐾1 = 𝑥 . 𝐺 = 20(1, 6) = (4, 28) = (𝑘11, 𝑘12) and
𝐾2 = 𝑦 . 𝐺 = 5(1, 6) = (15, 18) = (𝑘21, 𝑘22)
5. Assume that 11
4 28
15 18
K
, then the self-invertible key matrix
4 28 92 67
15 18 80 78
5 28 91 67
15 19 80 77
mK
Step 2: Encryption (User A)
1. 𝑀 = (Hi, )(our )(meet)(ing )(at 1)(0 Am)
2. The ASCII values for 𝑀
𝑀 = (72 105 44 32)(111 117 114 32)(109 101 101 116)(105 110 103 32)
(97 116 32 49)(48 32 65 109)
and after taking modulo 95, it will be
𝑀 = (72 10 44 32)(16 22 19 32)(14 6 6 21)(10 15 8 32)(2 21 32 49)(48 32 65 14)
3. 1
72
10
44
32
P
, 2
16
22
19
32
P
, 3
14
6
6
21
P
, 4
10
15
8
32
P
, 5
2
21
32
49
P
, and 6
48
32
65
14
P
4. The multiplication of 𝐾 𝑚 by the first vector 𝑃1 will be done, and the same process will be
repeated for the other vectors.
1 1.mC K P
4 28 92 67
15 18 80 78
5 28 91 67
15 19 80 77
72
10
44
32
mod 95
15
56
43
34
5. Add 32 to each value in 1C
1C
47
88
75
66
6. From the ASCII table 1C /XKB
After repeating steps 4, 5, and 6 for the vectors 2 3 4 5, , , ,P P P P and 6P , the ciphertext message that
will be sent to user B is 𝐶 = /XKB,1)r}]&N/I18nMP1:s)&
Step 3: Decryption (User B)
1. 𝐶 = (/XKB) (,1)r) ( }]&N) (/I18) (nMP1) (:s)&)
2. The ASCII values for 𝐶
𝐶 = (47 88 75 66)(44 124 41 114)(125 93 38 78)(47 73 49 56)(110 77 80 49)
(58 115 41 38)
9. Int J Elec & Comp Eng ISSN: 2088-8708
A new hybrid text encryption approach over mobile ad hoc network (Mohammed Amin Almaiah)
6469
3. Subtract 32 from each value in the ciphertext vectors
𝐶 = (15 56 43 34)(12 92 9 82)(93 61 6 46)(15 41 17 24)(78 45 48 17)(26 83 9 6)
4. 1
15
56
43
34
C
, 2
12
92
9
82
C
, 3
93
61
6
46
C
, 4
15
41
17
24
C
, 5
78
45
48
17
C
, and 6
26
83
9
6
C
5. The multiplication of 𝐾 𝑚 by the first vector 𝐶1 will be done, and the same process will be
repeated for the other vectors.
1 1.mP K C
4 28 92 67
15 18 80 78
5 28 91 67
15 19 80 77
15
56
43
34
mod 95
72
10
44
32
6. Add 95 to each value in step5 less than 32
1
72
105
44
32
P
7. From the ASCII table 1P Hi, .
After repeating steps 5, 6, and 7 for the vectors 2 3 4 5, , , ,C C C C and 6C , the decrypted message that
will be resulted is 𝑀 = Hi, our meeting at 10 Am.
7. CONCLUSION
Information security is one of the most important issues in the recent times. Elliptic curve
cryptography (ECC) is one of the most efficient public key cryptosystems that is secured against adversaries
because it is hard for them to find the secret key and solve the elliptic curve discrete logarithm problem.
It’s strengthened security also comes from the small key size that is used in it with the same level of safety
compared to the other cryptosystems like RSA.
A new approach cryptosystem (ECCHC) has been proposed in this paper combining ECC with
standard Hill cipher algorithm to enhance and increase the security of the original Hill cipher. It generates
a new encryption/decryption key by using ECC approach which produces a strong secret key that resistant
against intruders and provides better security because no need to share the key through the internet.
Self-invertible key matrix is used for encryption and decryption. So, no need to find the inverse key matrix in
the decryption process. The ability to encrypt every character in the 128 ASCII table directly without
mapping table is a new contribution in this approach because other methods used only the alphabets
(a, b, c, …, z) and need mapping table. Otherwise, the proposed approach can be used efficiently in real-time
multimedia and wireless applications and suitable for small devices and embedded systems because it has
a simple structure and faster computations and can be applied on text, image, audio, and video.
REFERENCES
[1] H. Darrel, et al., “Guide to elliptic curve cryptography,” Springer-Verlag Professional Computing Series,
pp. 1-311, 2004.
[2] M. U. Bokhari and Q. M. Shallal, “A Review on Symmetric Key Encryption Techniques in Cryptography,”
International Journal of Computer Applications, vol. 147, no. 10, pp. 43-48, 2016.
[3] W. Diffie and M. Hellman, “New directions in cryptography,” IEEE transactions on Information Theory, vol. 22,
no. 6, pp. 644-654, 1976.
[4] V. S. Miller, “Use of elliptic curves in cryptography,” in Conference on the Theory and Application of
Cryptographic Techniques, pp. 417-426, 1985.
10. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 6461 - 6471
6470
[5] N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of Computation, vol. 48, no. 177, pp. 203-209, 1987.
[6] B. K. Alese, et al., “Comparative analysis of public-key encryption schemes,” International Journal of Engineering
and Technology, vol. 2, no. 9, pp. 1552-1568, 2012.
[7] K. Rajadurga and S. R. Kumar, “GF (2m) based low complexity multiplier for elliptic curve cryptography
systems,” Networking and Communication Engineering, vol. 6, no. 4, pp. 150-155, 2014.
[8] I. A. Ismail, et al., “How to repair the Hill cipher,” Journal of Zhejiang University SCIENCE A, vol. 7, no. 12,
pp. 2022-2030, 2006.
[9] B. Acharya, et al., “Image encryption using advanced hill cipher algorithm,” International Journal of Recent
Trends in Engineering, vol. 1, no. 1, pp. 663-667, 2009.
[10] G. Hamissa, et al., “Securing JPEG architecture based on enhanced chaotic hill cipher algorithm,” in 2011
International Conference on Computer Engineering & Systems (ICCES), pp. 260-266, 2011.
[11] M. N. A. Rahman, et al., “Cryptography: A New Approach of Classical Hill Cipher,” International Journal of
Security and Its Applications, vol. 7, no. 2, pp. 179-190, 2013.
[12] K. Agrawal and A. Gera, “Elliptic Curve Cryptography with Hill Cipher Generation for Secure Text
Cryptosystem,” International journal of computer applications, vol. 106, no. 1, pp. 18-24, 2014.
[13] N. Sharma and S. Chirgaiya, “A Novel Approach to Hill Cipher,” International Journal of Computer
Applications, vol. 108, no. 11, pp. 34-37, 2014.
[14] A. Mahmoud and A. Chefranov, “Hill cipher modification based on pseudo-random eigenvalues,” Applied
Mathematics and Information Sciences, vol. 8, no. 2, pp. 505-516, 2014.
[15] A. Ramesh, “Enhancing the Security of Hill Cipher using Columnar Transposition,” in International Journal of
Engineering Research and Technology, vol. 4, no. 07, pp. 741-744, 2015.
[16] Z. E. Dawahdeh, et al., “A new image encryption technique combining Elliptic Curve Cryptosystem with Hill
Cipher,” Journal of King Saud University-Computer and Information Sciences, vol. 30, no. 3, pp. 349-355, 2018.
[17] J. Hoffstein, et al., “Elliptic Curves and Cryptography,” in An Introduction to Mathematical Cryptography,
pp. 299-371, 2014.
[18] Z. E. Dawahdeh, et al., “A New Modification for Menezes-Vanstone Elliptic Curve Cryptosystem,” Journal of
Theoretical and Applied Information Technology, vol. 85, no. 3, pp. 290-297, 2016.
[19] B. Nayak, “Signcryption schemes based on elliptic curve cryptography,” Master Thesis, National Institute of
Technology Rourkela, India, 2014.
[20] M. N. Udin, et al., “Application of message embedding technique in ElGamal elliptic curve cryptosystem,” in 2012
International Conference on Statistics in Science, Business, and Engineering (ICSSBE), pp. 1-6, 2012.
[21] L. S. Hill, “Cryptography in an algebraic alphabet,” The American Mathematical Monthly, vol. 36, no. 6,
pp. 306-312, 1929.
[22] B. Acharya, et al., “Novel methods of generating self-invertible matrix for hill cipher algorithm,” International
Journal of Security, vol. 1, no. 1, pp. 14-21, 2007.
[23] P. G. Mante, et al., “A Symmetrical Encryption Technique for Text Encryption Using Randomized Matrix Based
Key Generation,” in Advances in Data Science and Management, pp. 137-148, 2020.
[24] M. A. Naji, et al., “Cryptanalysis cipher text using new modeling: Text encryption using elliptic curve
cryptography,” in AIP Conference Proceedings, vol. 2203, no. 1, 2020.
[25] R. Anandkumar and R. Kalpana, “A Survey on Chaos Based Encryption Technique,” in Enabling Technologies and
Architectures for Next-Generation Networking Capabilities, pp. 147-165, 2019.
BIOGRAPHIES OF AUTHORS
Mohammed Amin Almaiah received his PhD in Computer Science from University
Malaysia Terengganu from Malaysia. MSc in Computer Information System from Middle
East University (MEU) in 2011 from Jordan. He is now working as Assistant Professor in
the Department of CIS at King Faisal Saudi Arabia. He has published over 15 research
papers in highly reputed journals such as the Engineering and Science Technology,
an International Journal, Education and Information Technologies, the Journal of
Educational Computing Research and others. Most of his publications were indexed under
the ISI Web of Science and Scopus. His current research interests include mobile learning,
software quality, network security and technology acceptance. He is a certified recognized
Reviewer by several leading journals in IEEE, Elsevier and Springer.
Ziad Dawahdeh, School of Computer and Communication Engineering, UniMAP
University, Perlis, Malaysia.
11. Int J Elec & Comp Eng ISSN: 2088-8708
A new hybrid text encryption approach over mobile ad hoc network (Mohammed Amin Almaiah)
6471
Omar Almomani, received his Bachelor and Master degree in Telecommunication
Technology from institute of Information Technology, University of Sindh on 2002 and
2003 respectively. Almomani received his PhD from UNIVERSITY UTARA MALAYSIA
in computer network. Currently he is Associate Professor in Network Computer and
Information Systems Department, Information Technology Faculty at the World Islamic
Sciences & Education University. His research interests involves mobile ad hoc networks,
Network Performance, Multimedia Networks, Network Quality of Service (QoS), IoT,
Network modelling and Simulation, Grid Computing, Network Security and Cloud Security.
Adeep Alsaaidah, received his Bachelor degree in computer engineering from faculty of
engineering at Balqa applied university and his Master degree in networking and computer
security at NYIT University. Alsaaidah received his PhD from university USIM Malaysia in
computer network. Currently he is Assistance Professor in Network Computer and
Information Systems Department, Information Technology Faculty at the World Islamic
Sciences & Education University. His research interests include Network Performance,
Multimedia Networks, Network Quality of Service (QoS), IoT, Network modelling and
Simulation, Network Security and Cloud Security.
Ahmad Al-Khasawneh is a professor of computer information systems. He holds the PhD
and M.Sc. of information systems and computer engineering from Newcastle University,
Australia and B.S in computer and automatic control engineering. Dr. Khasawneh has 25
years of experience in ICT field and in ICT applications and acts as technical advisor to
the Royal Jordanian Airlines (NDC Jordan) director on issues related to the development of
travel industry and ICT strategy. Prior to joining the Hashemite University of Jordan, he held
several key positions with major international ICT consultancy and solutions firms and
lecturer in IT related topics at Newcastle University, Australia. One of his key positions is
the director of eLearning center and, he is the former dean of the Prince Hussein Bin
Abdullah II for Information Technology at Hashemite University. Currently, he is
the director of center of information and communication technology and eLearning. He is
managing and coordinating three Tempus projects; and four erasmus+ project, and a head
and member of the many committees of another Tempus and Erasmus+ project. He is very
well-known in the EU project management.
Saleh Khawatreh, Associate professor of Computer Engineering, Al Ahliyya Amman
University, Jordan.