Shihab A. Shawkat
University of Samarra

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Proposed system for data security in distributed computing in using ‎triple data encryption standard and ‎Rivest Shamir ‎Adlemen Shihab A. Shawkat; Bilal A. Tuama; Israa Al_Barazanchi
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 6: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i6.pp6496-6505

Abstract

Cloud computing is considered a distributed computing paradigm in which resources ‎are ‎provided as services. In cloud computing, the ‎applications do not run ‎from a user’s personal computer but are run and stored on distributed ‎servers on the Internet. The ‎resources of the cloud infrastructures are shared on cloud ‎computing on the Internet in the open ‎environment. This increases the security problems in ‎security such as data confidentiality, data ‎integrity and data availability, so the solution of such ‎problems are conducted by adopting data ‎encryption is very important for securing users data. ‎In this paper, a comparative ‎study is done between the two security algorithms on a cloud ‎platform called eyeOS. From the ‎comparative study it was found that the Rivest Shamir ‎Adlemen ‎(3kRSA) algorithm ‎outperforms that triple data encryption standard (3DES) algorithm with ‎respect to the complexity, and output bytes. The main ‎drawback of the 3kRSA algorithm is its ‎computation time, while 3DES is faster than that ‎‎3kRSA. This is useful for storing large amounts of ‎data used in the cloud computing, the key ‎distribution and authentication of the asymmetric ‎encryption, speed, data integrity and data ‎confidentiality of the symmetric encryption are also ‎important also it enables to execute ‎required computations on this encrypted data.‎
Optimization-based pseudo random key generation for fast encryption scheme Shihab A. Shawkat; Najiba Tagougui; Monji Kherallah
Bulletin of Electrical Engineering and Informatics Vol 12, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i2.4953

Abstract

Data encryption is being widely employed to secure data in order to provide confidentiality, authenticity and data privacy. In proposed method a novel method for (encryption, decryption) message through optimization using genetic algorithm (GA) is presented which aims to maintain the security of the message via increasing the complexity of the key used in the encryption. The proposed method is named stream cipher randomization using GA (SCRGA). It is characterized by its secrecy by hiding the statistical properties for the input message. The GA increases the key diffusion in order to eliminate the likelihood of using the statistical analysis and cryptanalysis techniques to obtain the original text. A key (k) will be supplied as input to pseudorandom bit generator and then it produces a random 8-bit output, The SCRGA evaluates the candidate keys and it would select the one that achieves the best value of the fitness function by maximization three criteria considered in matching the input message and the key. The test results were based on the comparison of the proposed method with two other state-of-the-art methods, that the SCRGA outperformed the other two methods in terms of the execution time (encryption, decryption) and encryption rounds key size.