About DJPS    Editorial Board    Advisory Board    Secretary of Journal    Events & News         

 

DJPS

Diyala Journal For Pure Science

Scientific Refereed Journal Published By College of Science - University of Diyala

 

Admin of Website

djps.1301.67A

Diyala Journal For Pure Sciences DJPS

ISRA Impact Factor:3.715

P- ISSN:2222-8373, E-ISSN:2518-9255

Volume 13, Issue 1, Part 1 , January. 2017

 

 

A new Algorithm for Encrypt Arabic Text by using first Order Equation for Three Variables

 

Basim najim al-din abed al-obaidi

 

Year: 2017, Volume: 13, Issue: 1, Part:1

 

Pages: 166-182, DOI: http://dx.doi.org/10.24237/djps.1301.67A 

 

Language: English

 

Download :  

 

Abstract    


 

In this days many data exchanged over the Internet, so finding the best solution that offer the necessary protection against the information hackers becomes the basic goals of many researches. Many researches focus on the Encryption algorithms that play a main role in information security systems. The goal of every encryption algorithm is to make it as hard as possible. If a good encryption algorithm is used, there is no technique considerably better than trying every possible key to break the cipher text. It is difficult to define the quality of an encryption algorithm. Sometimes algorithms look strong and complicated but turn out to be very easy to break.In this research, a new encryption method is proposed to encrypt Arabic text by using the standard of first order equation for three variables. The sender and the recipient will share a first order equation for three variables and two randomly constants represent the values of y, z which represent the keys of used in encryption\decryption process. The result of the equation xored with randomly shared value between both sides which is represent the third key for the proposed method to get final cipher text of the proposed method. By applying different cryptanalysis techniques such as berlekamp Massey cryptanalysis, linear feedback shift register (LFSR), autocorrelation attack, brute force attack , frequency attack, m-138 cipher text only attack and side – channel attack to test the inevitability of the proposed method, the results showed that the proposed method is hard to be broken by the crypt analytics and attackers. Moreover, comparing the timing and performance of the proposed method with the block and stream ciphers showed the proposed method is better than the block and stream ciphers in these measures.   

 

Key words : First order equation, berlekamp Massey, linear feedback shift register, autocorrelation attack, side-channel attack.

Copyright © 2017 Diyala Journal For Pure Science (DJPS) . All rights reserved
3:45