ABJAD Arabic-Based Encryption
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 10
Abstract
The researcher introduced an enhanced classical Arabic-based encryption technique that is essentially designed for Arab nations. The new algorithm uses the shared key technique where the Keyword system Modulus is employed to add randomness and confusion to the table of alphabets being used. The results proved that the technique is resistant to brute force and cryptanalysis attacks. The time needed to break the algorithm is huge and the possibilities of decrypting the cipher text using the language frequency and language characteristics are hard and unfeasible. The technique assumes the existence of a secure channel for the keyword exchange.
Authors and Affiliations
Ahmad H. Al-Omari
Implementation of a basic Sonar of Echolocation for Education in Telecommunications
Currently, having a sonar of echolocation in an electronic lab is complicated due to the high cost of its implementation, which is why it is proposed the implementation of a basic sonar, using agile technologies such as...
Relationship Analysis on the Experience of Hospitalised Paediatric Cancer Patient in Malaysia using Text Analytics Approach
The purpose of this study is to analyse the keyword relationships of paediatric cancer patient’s experiences whilst being hospitalised during the treatment session. This study collects data through 40 days of observation...
Inter Prediction Complexity Reduction for HEVC based on Residuals Characteristics
High Efficiency Video Coding (HEVC) or H.265 is currently the latest standard in video coding. While this new standard promises improved performance over the previous H.264/AVC standard, the complexity has drastically in...
Simulation and Analysis of Quality of Service (QoS) Parameters of Voice over IP (VoIP) Traffic through Heterogeneous Networks
Identifying those causes and parameters that affect the Quality of Service (QoS) of Voice-over-Internet Protocol (VoIP) through heterogeneous networks such as WiFi, WiMAX and between them are carried out using the OPNET...
Semantic Retrieval Approach for Web Documents
Because of explosive growth of resources in the internet, the information retrieval technology has become particularly important. However the current retrieval methods are essentially based on the full text matching of k...