A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm

被引:18
作者
Abusukhon, Ahmad [1 ]
Anwar, Muhammad Naveed [2 ]
Mohammad, Zeyad [1 ]
Alghannam, Bareeq [3 ]
机构
[1] Al Zaytoonah Univ Jordan, Fac Sci & Informat Technol, Dept Comp Sci, POB 130, Amman 11733, Jordan
[2] Northumbria Univ, Fac Engn & Environm, Dept Comp & Informat Sci, Newcastle Upon Tyne NE2 1XE, Tyne & Wear, England
[3] Publ Author Appl Educ & Training, Coll Business Studies, Dept Comp Sci & Informat Syst, Kuwait, Kuwait
关键词
Encryption; Private Key; Secured Communication; Text-to-Image Encryption; Diffie Hellman algorithm;
D O I
10.1080/09720529.2019.1569821
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Nowadays, the rapid growth of Internet applications open the doors for people to communicate and do business around the world and thus saving time, efforts and money. However, the success of these applications is based on protecting the data from hackers. It is well known that preventing sensitive data from hackers while they are sent through the global network is a big challenge. There are many techniques used for securing data. Some of these techniques are based on encrypting a readable text into an unreadable text using mathematical operations, while other techniques are based on encrypting a readable text into an image (e.g., the Text-to-Image Encryption algorithm - TTIE) or into musical notes using an encryption key. The encryption key must be secure and should not be sent through the Internet. This paper proposes adding a new security level to the TTIE algorithm, and demonstrates how the encryption key produced by the TTIE algorithm is exchanged with the other party using the Diffie Hellman technique. Thus, this paper proposes a modified TTIE algorithm called the Diffie Hellman Text-to-Image Encryption algorithm (DHTTIE), and tests and analyses the proposed algorithm.
引用
收藏
页码:65 / 81
页数:17
相关论文
共 30 条
[1]  
Abusukhon A., 2013, INT J COMPUT ENG TEC, V4, P50
[2]  
Abusukhon A., 2012, P INT C CYB SEC CYB, P263
[3]  
Abusukhon A., 2014, INT J COMPUT APPL, V106, P1
[4]  
Abusukhon A, 2012, INT J ADV COMPUT SC, V3, P35
[5]  
Abusukhon Ahmad., 2012, International Journal of Cyber-Security and Digital Forensics (IJCSDF), V1, P263
[6]  
Ahmad A, 2015, INT J ADV COMPUT SC, V6, P64
[7]  
Arun M., 2015, INT J RECENT RES SCI, V1, P37
[8]  
BaniYounes M., 2008, INT J COMPUTER SCI I, V35, P407
[9]  
Brasil, 2008, NON TRADITIONAL REF
[10]  
Chan A., ACM T SENSOR NETWORK, V7