Proposal to Generate a Various Key from Image for Various Encryption Methods

There are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Each of these encryption methods have their own uses, advantages, and disadvantages. All three of these encryption methods use cryptography, or the science of scrambling data . Although there can...

Full description

Bibliographic Details
Main Authors: Shatha Habeeb, Eman Shakeer
Format: Article
Language:English
Published: Unviversity of Technology- Iraq 2013-01-01
Series:Engineering and Technology Journal
Subjects:
Online Access:https://etj.uotechnology.edu.iq/article_84092_97036184f88e24148e7a223121095d9e.pdf
_version_ 1827358523300773888
author Shatha Habeeb
Eman Shakeer
author_facet Shatha Habeeb
Eman Shakeer
author_sort Shatha Habeeb
collection DOAJ
description There are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Each of these encryption methods have their own uses, advantages, and disadvantages. All three of these encryption methods use cryptography, or the science of scrambling data . Although there can be several pieces to an encryption process, the two main pieces are the algorithms and the keys. As stated earlier, algorithms used in computer systems are complex mathematical formulas that dictate the rules of how the plaintext will be turned into ciphertext. A key is a string of random bits that will be used by the algorithm.This paper proposed a method which generates the key that draw from parts of the image. The size of the key is used with the suggested algorithm to encryption of the text. This method could be applied to Symmetric cryptography or Asymmetric cryptography.
first_indexed 2024-03-08T06:12:03Z
format Article
id doaj.art-08ca1356f18840d99481a5dec71a4b0f
institution Directory Open Access Journal
issn 1681-6900
2412-0758
language English
last_indexed 2024-03-08T06:12:03Z
publishDate 2013-01-01
publisher Unviversity of Technology- Iraq
record_format Article
series Engineering and Technology Journal
spelling doaj.art-08ca1356f18840d99481a5dec71a4b0f2024-02-04T17:34:06ZengUnviversity of Technology- IraqEngineering and Technology Journal1681-69002412-07582013-01-01311B10711410.30684/etj.31.1B.1284092Proposal to Generate a Various Key from Image for Various Encryption MethodsShatha HabeebEman ShakeerThere are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Each of these encryption methods have their own uses, advantages, and disadvantages. All three of these encryption methods use cryptography, or the science of scrambling data . Although there can be several pieces to an encryption process, the two main pieces are the algorithms and the keys. As stated earlier, algorithms used in computer systems are complex mathematical formulas that dictate the rules of how the plaintext will be turned into ciphertext. A key is a string of random bits that will be used by the algorithm.This paper proposed a method which generates the key that draw from parts of the image. The size of the key is used with the suggested algorithm to encryption of the text. This method could be applied to Symmetric cryptography or Asymmetric cryptography.https://etj.uotechnology.edu.iq/article_84092_97036184f88e24148e7a223121095d9e.pdfencryption keyssymmetric keys and asymmetric keys
spellingShingle Shatha Habeeb
Eman Shakeer
Proposal to Generate a Various Key from Image for Various Encryption Methods
Engineering and Technology Journal
encryption keys
symmetric keys and asymmetric keys
title Proposal to Generate a Various Key from Image for Various Encryption Methods
title_full Proposal to Generate a Various Key from Image for Various Encryption Methods
title_fullStr Proposal to Generate a Various Key from Image for Various Encryption Methods
title_full_unstemmed Proposal to Generate a Various Key from Image for Various Encryption Methods
title_short Proposal to Generate a Various Key from Image for Various Encryption Methods
title_sort proposal to generate a various key from image for various encryption methods
topic encryption keys
symmetric keys and asymmetric keys
url https://etj.uotechnology.edu.iq/article_84092_97036184f88e24148e7a223121095d9e.pdf
work_keys_str_mv AT shathahabeeb proposaltogenerateavariouskeyfromimageforvariousencryptionmethods
AT emanshakeer proposaltogenerateavariouskeyfromimageforvariousencryptionmethods