A novel secret key generation based on image link
One of the main problems with symmetric encryption is key distribution especially when involving large number of users i.e to generate identical keys at different locations. To address this challenge, we proposed a novel algorithm of secret key infusion protocol (SKIP) to generate an identical...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
Science Publishing Corporation Inc
2018
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/63930/ http://irep.iium.edu.my/63930/ http://irep.iium.edu.my/63930/ http://irep.iium.edu.my/63930/1/63930_A%20novel%20secret%20key%20generation%20based%20on%20image%20link.pdf http://irep.iium.edu.my/63930/2/63930_A%20novel%20secret%20key%20generation%20based%20on%20image%20link_SCOPUS.pdf |
id |
iium-63930 |
---|---|
recordtype |
eprints |
spelling |
iium-639302018-06-07T01:37:35Z http://irep.iium.edu.my/63930/ A novel secret key generation based on image link Sulaiman, Alyaa Ghanim Taha Alshaikhli, Imad Fakhri Wahiddin, Mohamed Ridza Houri, S Jamil, Norziana Ismail, Ahmad Fadzil QA75 Electronic computers. Computer science One of the main problems with symmetric encryption is key distribution especially when involving large number of users i.e to generate identical keys at different locations. To address this challenge, we proposed a novel algorithm of secret key infusion protocol (SKIP) to generate an identical secret key. While, the key is generated based on a provided image link, starting pattern and string length which must be kept in secret as the algorithm is publicly known. The image from website must be a static image and used as the input of random bits to produce string of hexadecimal values. In a case where image link is compromised, the adversary has to guess other layers of parameters in starting pattern and string length. The generated secret keys were identical at two different locations. In other observation, different secret keys were generated even with the same image link and pattern length but different starting pattern. Science Publishing Corporation Inc 2018-03-10 Article PeerReviewed application/pdf en http://irep.iium.edu.my/63930/1/63930_A%20novel%20secret%20key%20generation%20based%20on%20image%20link.pdf application/pdf en http://irep.iium.edu.my/63930/2/63930_A%20novel%20secret%20key%20generation%20based%20on%20image%20link_SCOPUS.pdf Sulaiman, Alyaa Ghanim and Taha Alshaikhli, Imad Fakhri and Wahiddin, Mohamed Ridza and Houri, S and Jamil, Norziana and Ismail, Ahmad Fadzil (2018) A novel secret key generation based on image link. International Journal of Engineering and Technology, 7 (2.5). pp. 23-26. ISSN 2227-524X https://www.sciencepubco.com/index.php/ijet/article/view/10048 10.14419/ijet.v7i2.5.10048 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Sulaiman, Alyaa Ghanim Taha Alshaikhli, Imad Fakhri Wahiddin, Mohamed Ridza Houri, S Jamil, Norziana Ismail, Ahmad Fadzil A novel secret key generation based on image link |
description |
One of the main problems with symmetric encryption is key distribution especially when involving large number of users i.e to generate
identical keys at different locations. To address this challenge, we proposed a novel algorithm of secret key infusion protocol (SKIP) to
generate an identical secret key. While, the key is generated based on a provided image link, starting pattern and string length which must
be kept in secret as the algorithm is publicly known. The image from website must be a static image and used as the input of random bits
to produce string of hexadecimal values. In a case where image link is compromised, the adversary has to guess other layers of
parameters in starting pattern and string length. The generated secret keys were identical at two different locations. In other observation,
different secret keys were generated even with the same image link and pattern length but different starting pattern. |
format |
Article |
author |
Sulaiman, Alyaa Ghanim Taha Alshaikhli, Imad Fakhri Wahiddin, Mohamed Ridza Houri, S Jamil, Norziana Ismail, Ahmad Fadzil |
author_facet |
Sulaiman, Alyaa Ghanim Taha Alshaikhli, Imad Fakhri Wahiddin, Mohamed Ridza Houri, S Jamil, Norziana Ismail, Ahmad Fadzil |
author_sort |
Sulaiman, Alyaa Ghanim |
title |
A novel secret key generation based on image link |
title_short |
A novel secret key generation based on image link |
title_full |
A novel secret key generation based on image link |
title_fullStr |
A novel secret key generation based on image link |
title_full_unstemmed |
A novel secret key generation based on image link |
title_sort |
novel secret key generation based on image link |
publisher |
Science Publishing Corporation Inc |
publishDate |
2018 |
url |
http://irep.iium.edu.my/63930/ http://irep.iium.edu.my/63930/ http://irep.iium.edu.my/63930/ http://irep.iium.edu.my/63930/1/63930_A%20novel%20secret%20key%20generation%20based%20on%20image%20link.pdf http://irep.iium.edu.my/63930/2/63930_A%20novel%20secret%20key%20generation%20based%20on%20image%20link_SCOPUS.pdf |
first_indexed |
2023-09-18T21:30:41Z |
last_indexed |
2023-09-18T21:30:41Z |
_version_ |
1777412489642770432 |