المصدر: | مجلة كلية التربية |
---|---|
الناشر: | الجامعة المستنصرية - كلية التربية |
المؤلف الرئيسي: | Zagi, Hassan Rahmah (Author) |
مؤلفين آخرين: | Maolood, Abeer Tariq (Co-Author) |
المجلد/العدد: | ع2 |
محكمة: | نعم |
الدولة: |
العراق |
التاريخ الميلادي: |
2021
|
الصفحات: | 1 - 16 |
ISSN: |
1812-0380 |
رقم MD: | 1236068 |
نوع المحتوى: | بحوث ومقالات |
اللغة: | الإنجليزية |
قواعد المعلومات: | EduSearch |
مواضيع: | |
كلمات المؤلف المفتاحية: |
Cryptography | Encryption | Advanced Encryption Standard (AES) | Hash Function | Statistical Analysis
|
رابط المحتوى: |
الناشر لهذه المادة لم يسمح بإتاحتها. |
LEADER | 02350nam a22002297a 4500 | ||
---|---|---|---|
001 | 1984862 | ||
041 | |a eng | ||
044 | |b العراق | ||
100 | |9 660464 |a Zagi, Hassan Rahmah |e Author | ||
245 | |a A New Key Generation to Greate Enhanced Security Version of AES Encryption Method | ||
260 | |b الجامعة المستنصرية - كلية التربية |c 2021 | ||
300 | |a 1 - 16 | ||
336 | |a بحوث ومقالات |b Article | ||
520 | |b Encryption by AES algorithm plays a significant role in concurrent encryption algorithms because of its high performance. The AES algorithm cryptography and Cryptanalysis technology are always wrestling. The more the strength of the algorithm and the complexity of key generation, the more difficult it will be to break it by the various attackers. This paper provides changes to the AES algorithm to improve standard AES security. Optimization is effected by two modifications. The first modification, by generating keys to its algorithm (AES) by relying on (DES-key, Substitutions layer, and one-way function (MD5)) The keys are used for encryption and decryption, to boost layer-represented 'confusion' (Substitutions) characteristics And Layer-represented 'diffusion' properties (MD5). The second modification produces the variable values of the key to transfer the "state matrix" rows instead of the static keys (AES). The proposed revised algorithm reveals the high performance and encryption security. The experimental results showed that the proposed algorithm was efficient and powerful comparing the original algorithm with the improved algorithm using the Basic Five Statistical Tests, producing good and more complex results against different attackers on a freshly. | ||
653 | |a الخوارزميات التقنية |a التشفير الرقمية |a تقنيات التشفير |a المعلومات الرقمية |a مفاتيح التبديل | ||
692 | |b Cryptography |b Encryption |b Advanced Encryption Standard (AES) |b Hash Function |b Statistical Analysis | ||
700 | |a Maolood, Abeer Tariq |e Co-Author |9 517599 | ||
773 | |4 التربية والتعليم |6 Education & Educational Research |c 001 |l 002 |m ع2 |o 1151 |s مجلة كلية التربية |t Journal of Faculty of Education |v 021 |x 1812-0380 | ||
856 | |u 1151-021-002-001.pdf | ||
930 | |d n |p y |q n | ||
995 | |a EduSearch | ||
999 | |c 1236068 |d 1236068 |