Enhancing of CryptoBI algorithm for data security in local area network

العناوين الأخرى

تحسين خوارزمية CryptoBI لأمن البيانات في الشبكة المحلية

مقدم أطروحة جامعية

Abu Silmiyah, Zakariyya Muhammad Muhammad

مشرف أطروحة جامعية

Barhum, Tawfiq Sulayman

أعضاء اللجنة

al-Attar, Ashraf Muhammad
al-Sayigh, Sana Wafa

الجامعة

الجامعة الإسلامية

الكلية

كلية تكنولوجيا المعلومات

دولة الجامعة

فلسطين (قطاع غزة)

الدرجة العلمية

ماجستير

تاريخ الدرجة العلمية

2015

الملخص الإنجليزي

The CryptoBI version1 “A Novel Cryptography Method Based on Image for Key Generation” algorithm is a new type of symmetric encryption algorithm that prevents the attacks and avoids key exchange between the two sides of communication by creating the key in home on the sender/receiver machine.

In this research, we implemented the algorithm CryptoBI version1 and created a prototype for a specific scenario to measure the performance and the strength against the cryptanalysis attack.

As a result of this measurement, we found that the algorithm was weak against the cryptanalysis attack because it can be broken in a short time in munities.

In addition, we found that the algorithm was less efficient than the Blowfish.

According to unsatisfied results of these measurements, the performance and the strength of the CryptoBI version 1 are enhanced, the performance enhanced by removing the binarize step from the encryption/decryption algorithms but the strength against the cryptanalysis attack enhanced by randomize the scanning starting point of the key generation algorithm.

The enhanced CryptoBI called (CryptoBI version2).

The experiment results showed that the enhanced algorithm (CryptoBI version2) has higher data rate than CryptoBI version1, AES, Rijndael, DES, 3DES, RC2, RC6 and Blowfish algorithms.

Furthermore, the CryptoBI version2 is stronger than the CryptoBI version1 against the cryptanalysis attack.

This process is more flexible that any RGB image can be used for key generation as the key generation is directly based on the image content.

The algorithm can generate a key of more than 512 bits according to data size.

التخصصات الرئيسية

تكنولوجيا المعلومات وعلم الحاسوب

الموضوعات

عدد الصفحات

65

قائمة المحتويات

Table of contents.

Abstract.

Abstract in Arabic.

Chapter One : Introduction.

Chapter Two : Theory background.

Chapter Three : Related works.

Chapter Four : Design and system model.

Chapter Five : Experiments and results.

Chapter Six : Conclusions and future directions.

References.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

Abu Silmiyah, Zakariyya Muhammad Muhammad. (2015). Enhancing of CryptoBI algorithm for data security in local area network. (Master's theses Theses and Dissertations Master). Islamic University, Palestine (Gaza Strip)
https://search.emarefa.net/detail/BIM-688605

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

Abu Silmiyah, Zakariyya Muhammad Muhammad. Enhancing of CryptoBI algorithm for data security in local area network. (Master's theses Theses and Dissertations Master). Islamic University. (2015).
https://search.emarefa.net/detail/BIM-688605

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

Abu Silmiyah, Zakariyya Muhammad Muhammad. (2015). Enhancing of CryptoBI algorithm for data security in local area network. (Master's theses Theses and Dissertations Master). Islamic University, Palestine (Gaza Strip)
https://search.emarefa.net/detail/BIM-688605

لغة النص

الإنجليزية

نوع البيانات

رسائل جامعية

رقم السجل

BIM-688605