Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 1 SI
Page No. 3866 - 3876

New Block Cipher Key with RADG Automata

Authors : Salah A. Albermany and Fatima Radi Hamade

References

Abdelmged, A.A., S.S. Al-Hussien and N. Hussien, 2016. A technique of image steganography using parity checker and LSBraille. Intl. J. Comput. Appl., 144: 37-41.
Direct Link  |  

Abdelmgeid, A.A., A.A. Tarek, S.S. Al-Hussien and M.H. Shaimaa, 2016. New image steganography method using zero order hold zooming. Intl. J. Comput. Appl., 133: 27-31.
CrossRef  |  Direct Link  |  

Adil, A.R., 2015. Text steganography to border image using novel method. Appl. Math. Sci., 9: 3087-3096.
Direct Link  |  

Al-Asadi, S.A. and W. Bhaya, 2016. Text steganography in excel documents using color and type of fonts. Res. J. Appl. Sci., 11: 1054-1059.

Al-Shatanawi, O.M. and N.N. El-Emam, 2015. A new image steganography algorithm based on Mlsb method with random pixels selection. Intl. J. Network Secur. Appl., 7: 37-53.
Direct Link  |  

Albermany, S.A. and G.A. Safda, 2014. Keyless security in wireless networks. Wirel. Pers. Commun., 79: 1713-1731.
CrossRef  |  Direct Link  |  

Ali, N.H.M., A.M.S. Rahma and A.S. Jamil, 2015. Text hiding in color images using the secret key transformation function in GF (2 n). Iraqi J. Sci., 56: 3240-3245.

Alshahrani, A.M. and S. Walker, 2015. New approach in symmetric block cipher security using a new cubical technique. Intl. J. Comput. Sci. Inf. Technol., 7: 69-75.
CrossRef  |  Direct Link  |  

Bandyopadhyay, D., K. Dasgupta, J.K. Mandal and P. Dutta, 2014. A novel secure image steganography method based on Chaos theory in spatial domain. Intl. J. Secur. Privacy Trust Manage., 3: 11-22.
Direct Link  |  

Bansod, S. and G. Bhure, 2014. Data encryption by image steganography. Intl. J. Inf. Comput. Technol., 4: 453-458.
Direct Link  |  

Bawaneh, M.J. and A.A. Obeidat, 2016. A secure robust gray scale image steganography using image segmentation. J. Inf. Secur., 7: 152-164.

Biham, E., R. Anderson and L. Knudsen, 1998. Serpent: A New Block Cipher Proposal. In: Fast Software Encryption, Vaudenay, S. (Ed.). Springer, Berlin, Germany, pp: 222-238.

Blaze, M. and B. Schneier, 1994. The MacGuffin block cipher algorithm. Proceedings of the 2nd International Workshop on Fast Software Encryption, December 14-16, 1994, Springer, Berlin, Germany, pp: 97-110.

Coron, J.S., 2006. What is cryptography ?. IEEE. Secur. Privacy, 4: 70-73.
CrossRef  |  Direct Link  |  

El-Ramly, S. H., T. El-Garf and A.H. Soliman, 2001. Dynamic generation of S-boxes in block cipher systems. Proceedings of the IEEE Eighteenth National Radio Science Conference, March 27-29, 2001, Mansoura, pp: 389-397.

Hamid, N., A. Yahya, R.B. Ahmad and O.M. Al-Qershi, 2012. Image steganography techniques: An overview. Intl. J. Comput. Sci. Secur., 6: 168-187.
Direct Link  |  

Huang, X., S. Wijesekera and D. Sharma, 2009. Quantum cryptography for wireless network communications. Proceedings of the 4th International Symposium on Wireless Pervasive Computing (ISWPC 2009), February 11-13, 2009, IEEE, Melbourne, Victoria, Australia, ISBN:978-1-4244-2965-3, pp: 1-5.

Karygiannis, T. and L. Owens, 2002. Wireless Network Security, 802.11, Bluetooth and Handheld Devices. NIST Special Publication, Hamburg, Germany, Pages: 119.

Kaul, N. and M. Chandra, 2015. A proposed algorithm for text in image steganography based on character pairing and positioning. Intl. J. Comput. Appl., 126: 19-22.
Direct Link  |  

Khan, I., S. Gupta and S. Singh, 2016. A new data hiding approach in images for secret data communication with Steganography. Intl. J. Comput. Appl., 135: 9-14.
Direct Link  |  

Masuda, N., G. Jakimoski, K. Aihara and L. Kocarev, 2006. Chaotic block ciphers: From theory to practical algorithms. IEEE. Trans. Circuits Syst., 53: 1341-1352.
CrossRef  |  Direct Link  |  

Milenkovic, O., 2001. On the generalized hamming weight enumerators and coset weight distributions of even isodual codes. Proceedings of the IEEE International Symposium on Information Theory, June 29, 2001, IEEE, Washington, DC., USA., ISBN:0-7803-7123-2, pp: 62-62.

Neelima, S. and S. Mandal, 2015. Review paper on cryptography. Intl. J. Res., 2: 45-49.

Neuman, C. and T. Ts'o, 1994. Kerberos: An authentication service for computer networks. IEEE Commun. Maga., 32: 33-38.
Direct Link  |  

Oppliger, R., 2007. Providing certified mail services on the internet. IEEE. Secur. Privacy, 5: 16-22.
CrossRef  |  Direct Link  |  

Petrank, E. and C. Rackoff, 2000. CBC MAC for real-time data sources. J. Cryptology, 13: 315-338.
Direct Link  |  

Pradesh, U., 2015. The RC7 encryption algorithm. Intl. J. Secur. Appl., 9: 55-59.
CrossRef  |  

Schneier, B. and J. Kelsey, 1996. Unbalanced feistel networks and block cipher design. Proceedings of the 3rd International Workshop on Fast Software Encryption, February 21-23, 1996, Springer, Cambridge, UK, pp: 121-144.

Schneier, B. and J. Kelsey, 1996. Unbalanced feistel networks and block cipher design. Proceedings of the 3rd International Workshop on Fast Software Encryption, February 21-23, 1996, Springer, Cambridge, UK, pp: 121-144.

Schneier, B., 1996. Applied Cryptography: Protocols, Algorithms and Source Code in C. 2nd Edn., John Wiley and Sons, New York, USA., ISBN-13: 978-0471117094, pp: 758.

Sharma, R., 2012. A novel approach to combine public-key encryption with symmetric-key encryption. Intl. J. Comput. Sci. Appl., 1: 8-15.
Direct Link  |  

Stallings, W., 2011. Cryptography and Network Security: Principles and Practice. 5th Edn., Prentice Hall, USA., ISBN: 9780136097044, Pages: 719.

Stinson, R., 2006. Cryptography: Theory and Practice. 3rd Edn., CRC Press, London, ISBN: 1584885084, pp: 593.

Tayel, M. and H. Shawky, 2014. A proposed assessment metrics for image steganography. Intl. J. Cryptography Inf. Secur., 4: 1-11.
CrossRef  |  

Wang, Y., G. Attebury and B. Ramamurthy, 2006. A survey of security issues in wireless sensor networks. IEEE Communi. Surveys Tutorials, 8: 2-23.
CrossRef  |  Direct Link  |  

Zhou, J. and D. Gollmann, 1997. An efficient non-repudiation protocol. Proceedings of the 10th Workshop on Computer Security Foundations, June 10-12, 1997, IEEE, Rockport, Massachusetts, USA., ISBN:0-8186-7990-5, pp: 126-132.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved