Multi-Level Encryption Framework
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 4
Abstract
Multi-level encryption approaches are becoming more popular as they combine the strength of multiple basic/traditional approaches into a complex one. Many multi-level encryption approaches have been introduced for different systems, like Internet of Things, sensor networks, big data, and the web. The main obstacles in building such approaches are to have a secure as well as a computationally efficient multi-level encryption approach. In this paper, we propose a computationally efficient multi-level encryption framework that combines the strength of symmetric, the encryption algorithm AES (Advance Encryption Standard), Feistel network, Genetic Algorithm’s Crossover and Mutation techniques, and HMAC. The framework was evaluated and compared to a set of benchmark symmetric encryption algorithms, such as RC5, DES, and 3-DES. The evaluation was carried out on an identical platform and the algorithms were compared using the throughput and running time performance metrics and Avalanche effect security metric. The results show that the proposed framework can achieve the highest throughput and the lowest running time compared to the considered benchmarked symmetric encryption algorithms and passes the avalanche effect criterion.
Authors and Affiliations
Ahmad Habboush
Helpful Statistics in Recognizing Basic Arabic Phonemes
The recognition of continuous speech is one of the main challenges in the building of automatic speech recognition (ASR) systems, especially when it comes to phonetically complex languages such as Arabic. An ASR system s...
Format SPARQL Query Results into HTML Report
SPARQL is one of the powerful query language for querying semantic data. It is recognized by the W3C as a query language for RDF. As an efficient query language for RDF, it has defined several query result formats such a...
A Survey on Content-based Image Retrieval
The widespread of smart devices along with the exponential growth of virtual societies yield big digital image databases. These databases can be counter-productive if they are not coupled with efficient Content-Based Ima...
Reconsideration of Potential Problems of Applying EMIM for Text Analysis
It seems that the term dependence methods developed using the expected mutual information measure (EMIM) have not achieved their potential in many areas of science, involving statistical text analysis or document process...
Detection of Chronic Kidney Disease using Machine Learning Algorithms with Least Number of Predictors
Chronic kidney disease (CKD) is one of the most critical health problems due to its increasing prevalence. In this paper, we aim to test the ability of machine learning algorithms for the prediction of chronic kidney dis...