Abdul Monem S. Rahma
University of Technology

Published : 4 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : International Journal of Electrical and Computer Engineering

Design and implement a new secure prototype structure of e-commerce system Farah Tawfiq Abdul Hussien; Abdul Monem S. Rahma; Hala Bahjat Abdul Wahab
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i1.pp560-571

Abstract

The huge development of internet technologies and the widespread of modern and advanced devices lead to an increase in the size and diversity of e-commerce system development. These developments lead to an increase in the number of people that navigate these sites asking for their services and products. Which leads to increased competition in this field. Moreover, the expansion in the size of currency traded makes transaction protection an essential issue in this field. Providing security for each online client especially for a huge number of clients at the same time, causing an overload on the system server. This problem may lead to server deadlock, especially at rush time, which reduce system performance. To solve security and performance problems, this research suggests a prototype design for agent software. This agent will play the role of broker between the clients and the electronic marketplace. This is done by providing security inside the client device and converting the client’s order into a special form which is called a record form to be sent to the commercial website. Experimental results showed that this method increase system performance in terms of page loading time, transaction processing and improves the utilization of system resources.
New modification on feistel DES algorithm based on multi-level keys Suhad M. Kareem; Abdul Monem S. Rahma
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1271.191 KB) | DOI: 10.11591/ijece.v10i3.pp3125-3135

Abstract

The data encryption standard (DES) is one of the most common symmetric encryption algorithms, but it experiences many problems. For example, it uses only one function (XOR) in the encryption process, and the combination of data is finite because it occurs only twice and operates on bits. This paper presents a new modification of the DES to overcome these problems. This could be done through adding a new level of security by increasing the key space (using three keys) during the 16 rounds of the standard encryption algorithm and by replacing the predefined XOR operation with a new # operation. Our proposed algorithm uses three keys instead of one. The first key is the input key used for encrypting and decrypting operations. The second key is used for determining the number of bits, while the third key is used for determining the table numbers, which are from 0 to 255. Having evaluated the complexity of our proposed algorithm, the results show that it is the most complex compared with the well-known DES and other modified algorithms. Consequently, in our proposed algorithm, the attacker try a number of attempts 21173 at minimum to decrypt the message. This means that the proposed DES algorithm will increase the security level of the well-known DES.
Multi-level encryption for 3D mesh model based on 3D Lorenz chaotic map and random number generator Nashwan Alsalam Ali; Abdul Monem S. Rahma; Shaimaa H. Shaker
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 6: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i6.pp6486-6495

Abstract

The increasing 3D model applications in various areas of life and widespread use like industry leads to 3D models being stolen and attacked by hackers; therefore, 3D model protection is a fundamental matter nowadays. In this paper, the proposed scheme will provide stringent security for the 3D models by implementing multiple levels of security with preserving the original dimensionality of the 3D model using the weight factor (w). The first level of security is achieved by applying a shuffling process for the vertices based on a key from random number generator (RNG), which provides good confusion. The second level is implemented by modifying the vertices values based on 3D keys from 3D Lorenz chaotic map, which provides good diffusion. The proposed scheme was applied on different 3D models varying in the vertices and faces number. The results illustrate that the proposed scheme deforms the entire 3D model based on Hausdorff distance (HD) approximately 100 after the encryption process, making it resist statistical attack. The scheme provides high security against brute force attack because it has a large key space equal to 10,105 and high security against deferential attack through secret key sensitivity using number of pixels change rate (NPCR) near to 99:6% and unified average changing intensity (UACI) near to 33:4%.