Proposal to Generate a Various Key from Image for Various Encryption Methods
There are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Each of these encryption methods have their own uses, advantages, and disadvantages. All three of these encryption methods use cryptography, or the science of scrambling data . Although there can...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Unviversity of Technology- Iraq
2013-01-01
|
Series: | Engineering and Technology Journal |
Subjects: | |
Online Access: | https://etj.uotechnology.edu.iq/article_84092_97036184f88e24148e7a223121095d9e.pdf |
_version_ | 1827358523300773888 |
---|---|
author | Shatha Habeeb Eman Shakeer |
author_facet | Shatha Habeeb Eman Shakeer |
author_sort | Shatha Habeeb |
collection | DOAJ |
description | There are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Each of these encryption methods have their own uses, advantages, and disadvantages. All three of these encryption methods use cryptography, or the science of scrambling data . Although there can be several pieces to an encryption process, the two main pieces are the algorithms and the keys. As stated earlier, algorithms used in computer systems are complex mathematical formulas that dictate the rules of how the plaintext will be turned into ciphertext. A key is a string of random bits that will be used by the algorithm.This paper proposed a method which generates the key that draw from parts of the image. The size of the key is used with the suggested algorithm to encryption of the text. This method could be applied to Symmetric cryptography or Asymmetric cryptography. |
first_indexed | 2024-03-08T06:12:03Z |
format | Article |
id | doaj.art-08ca1356f18840d99481a5dec71a4b0f |
institution | Directory Open Access Journal |
issn | 1681-6900 2412-0758 |
language | English |
last_indexed | 2024-03-08T06:12:03Z |
publishDate | 2013-01-01 |
publisher | Unviversity of Technology- Iraq |
record_format | Article |
series | Engineering and Technology Journal |
spelling | doaj.art-08ca1356f18840d99481a5dec71a4b0f2024-02-04T17:34:06ZengUnviversity of Technology- IraqEngineering and Technology Journal1681-69002412-07582013-01-01311B10711410.30684/etj.31.1B.1284092Proposal to Generate a Various Key from Image for Various Encryption MethodsShatha HabeebEman ShakeerThere are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Each of these encryption methods have their own uses, advantages, and disadvantages. All three of these encryption methods use cryptography, or the science of scrambling data . Although there can be several pieces to an encryption process, the two main pieces are the algorithms and the keys. As stated earlier, algorithms used in computer systems are complex mathematical formulas that dictate the rules of how the plaintext will be turned into ciphertext. A key is a string of random bits that will be used by the algorithm.This paper proposed a method which generates the key that draw from parts of the image. The size of the key is used with the suggested algorithm to encryption of the text. This method could be applied to Symmetric cryptography or Asymmetric cryptography.https://etj.uotechnology.edu.iq/article_84092_97036184f88e24148e7a223121095d9e.pdfencryption keyssymmetric keys and asymmetric keys |
spellingShingle | Shatha Habeeb Eman Shakeer Proposal to Generate a Various Key from Image for Various Encryption Methods Engineering and Technology Journal encryption keys symmetric keys and asymmetric keys |
title | Proposal to Generate a Various Key from Image for Various Encryption Methods |
title_full | Proposal to Generate a Various Key from Image for Various Encryption Methods |
title_fullStr | Proposal to Generate a Various Key from Image for Various Encryption Methods |
title_full_unstemmed | Proposal to Generate a Various Key from Image for Various Encryption Methods |
title_short | Proposal to Generate a Various Key from Image for Various Encryption Methods |
title_sort | proposal to generate a various key from image for various encryption methods |
topic | encryption keys symmetric keys and asymmetric keys |
url | https://etj.uotechnology.edu.iq/article_84092_97036184f88e24148e7a223121095d9e.pdf |
work_keys_str_mv | AT shathahabeeb proposaltogenerateavariouskeyfromimageforvariousencryptionmethods AT emanshakeer proposaltogenerateavariouskeyfromimageforvariousencryptionmethods |