ABJAD Arabic-Based Encryption

Abstract

The researcher introduced an enhanced classical Arabic-based encryption technique that is essentially designed for Arab nations. The new algorithm uses the shared key technique where the Keyword system Modulus is employed to add randomness and confusion to the table of alphabets being used. The results proved that the technique is resistant to brute force and cryptanalysis attacks. The time needed to break the algorithm is huge and the possibilities of decrypting the cipher text using the language frequency and language characteristics are hard and unfeasible. The technique assumes the existence of a secure channel for the keyword exchange.

Authors and Affiliations

Ahmad H. Al-Omari

Keywords

Related Articles

Fine-grained Accelerometer-based Smartphone Carrying States Recognition during Walking

Due to the dependency of our daily lives on smartphones, the states of the device have impact on the quality of services offered through a smartphone. In this article, we focus on the carrying states of the device while...

Browsing Behaviour Analysis using Data Mining

Now-a-days most of our time is spent online using some form of digital technology such as search engines, news portals, or social media websites. Our online presence makes us engaged most of the time and leads us to beco...

Face Recognition in Uncontrolled Environment

This paper presents a novel method of facial image representation for face recognition in uncontrolled environment. It is named as augmented local binary patterns (A-LBP) that works on both, uniform and non-uniform patte...

The Determination of Affirmative and Negative Intentions for Indirect Speech Acts by a Recommendation Tree

For context-based recommendation systems, it is necessary to detect affirmative and negative intentions from answers. However, traditional studies can not determine these intentions from indirect speech acts. In order to...

Deep Transfer Learning Application for Automated Ischemic Classification in Posterior Fossa CT Images

Computed Tomography (CT) imaging is one of the conventional tools used to diagnose ischemic in Posterior Fossa (PF). Radiologist commonly diagnoses ischemic in PF through CT imaging manually. However, such a procedure co...

Download PDF file
  • EP ID EP407465
  • DOI 10.14569/IJACSA.2018.091019
  • Views 116
  • Downloads 0

How To Cite

Ahmad H. Al-Omari (2018). ABJAD Arabic-Based Encryption. International Journal of Advanced Computer Science & Applications, 9(10), 164-170. https://europub.co.uk/articles/-A-407465