• العربية
    • English
  • English 
    • العربية
    • English
  • Login
Home
Publisher PoliciesTerms of InterestHelp Videos
Submit Thesis
IntroductionIUGSpace Policies
JavaScript is disabled for your browser. Some features of this site may not work without it.
View Item 
  •   Home
  • Faculty of Information Technology
  • PhD and MSc Theses- Faculty of Information Technology
  • View Item
  •   Home
  • Faculty of Information Technology
  • PhD and MSc Theses- Faculty of Information Technology
  • View Item

Please use this identifier to cite or link to this item:

http://hdl.handle.net/20.500.12358/20069
TitleEnhancing of CryptoBI Algorithm for Data Security in Local Area Network
Title in Arabicتحسين خوارزمية cryptobi لامن البيانات في الشبكة المحلية
Abstract

The CryptoBI version1 “A Novel Cryptography Method Based on Image for Key Generation” algorithm is a new type of symmetric encryption algorithm that prevents the attacks and avoids key exchange between the two sides of communication by creating the key in home on the sender/receiver machine. In this research, we implemented the algorithm CryptoBI version1 and created a prototype for a specific scenario to measure the performance and the strength against the cryptanalysis attack. As a result of this measurement, we found that the algorithm was weak against the cryptanalysis attack because it can be broken in a short time in munities. In addition, we found that the algorithm was less efficient than the Blowfish. According to unsatisfied results of these measurements, the performance and the strength of the CryptoBI version 1 are enhanced, the performance enhanced by removing the binarize step from the encryption/decryption algorithms but the strength against the cryptanalysis attack enhanced by randomize the scanning starting point of the key generation algorithm. The enhanced CryptoBI called (CryptoBI version2). The experiment results showed that the enhanced algorithm (CryptoBI version2) has higher data rate than CryptoBI version1, AES, Rijndael, DES, 3DES, RC2, RC6 and Blowfish algorithms. Furthermore, the CryptoBI version2 is stronger than the CryptoBI version1 against the cryptanalysis attack. This process is more flexible that any RGB image can be used for key generation as the key generation is directly based on the image content. The algorithm can generate a key of more than 512 bits according to data size.

Authors
Abusilmiyeh, Zakaria M.
Supervisors
Barhoom, Tawfig S.
Typeرسالة ماجستير
Date2015
LanguageEnglish
Publisherالجامعة الإسلامية - غزة
Citation
License
Collections
  • PhD and MSc Theses- Faculty of Information Technology [124]
Files in this item
file_1.pdf3.441Mb
Thumbnail

The institutional repository of the Islamic University of Gaza was established as part of the ROMOR project that has been co-funded with support from the European Commission under the ERASMUS + European programme. This publication reflects the views only of the author, and the Commission cannot be held responsible for any use which may be made of the information contained therein.

Contact Us | Send Feedback
 

 

Browse

All of IUGSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsSupervisorsThis CollectionBy Issue DateAuthorsTitlesSubjectsSupervisors

My Account

LoginRegister

Statistics

View Usage Statistics

The institutional repository of the Islamic University of Gaza was established as part of the ROMOR project that has been co-funded with support from the European Commission under the ERASMUS + European programme. This publication reflects the views only of the author, and the Commission cannot be held responsible for any use which may be made of the information contained therein.

Contact Us | Send Feedback