Quantum cryptography technique: A way to improve security challenges in mobile cloud computing (MCC)

S Abidin, A Swami, E Ramirez-Asís… - Materials Today …, 2022 - Elsevier
Quantum cryptography concentrates on the solution of cryptography that is imperishable due
to the reason of fortification of secrecy which is applied to the public key distribution of …

A novel approach for the development of the Twofish algorithm based on multi-level key space

SM Kareem, AMS Rahma - Journal of Information Security and Applications, 2020 - Elsevier
This paper presents a new modification of the Twofish algorithm for strengthening security.
This is done by using two additional control keys during 16 rounds of the standard Feistel …

New method for improving add round key in the advanced encryption standard algorithm

SM Kareem, AMS Rahma - Information Security Journal: A Global …, 2021 - Taylor & Francis
This paper proposes a new modification to the AES in order to ensure a high-level security.
This is accomplished by replacing the binary Exclusive OR (XOR) operation in each add …

[PDF][PDF] A modification on key stream generator for RC4 algorithm

SM Kareem, AMS Rahma - Engineering and Technology Journal, 2020 - iasj.net
Engineering and Technology Journal A Modification on Key Stream Generator for RC4
Algorithm Page 1 Engineering and Technology Journal Vol. 38, Part B (2020), No. ٠٢, Pages …

[HTML][HTML] A new modified DES algorithm based on the development of binary encryption functions

HKA Alsuwaiedi, AMS Rahma - Journal of King Saud University-Computer …, 2023 - Elsevier
One of the most commonly used symmetric encryption methods is the Data Encryption
Standard (DES), but it has a number of flaws. For instance, the encryption method only …

[PDF][PDF] Image Encryption Based on Multi-Level Keys on RC5 Algorithm.

AS Jamil, AMS Rahma - Int. J. Interact. Mob. Technol., 2022 - researchgate.net
In recent years, the need to develop encryption algorithms has led to an increase in the
working and efficiency of algorithms to protect the transmission and reception of information …

A new approach for data hiding with LSB steganography

G Prashanti, K Sandhyarani - Emerging ICT for Bridging the Future …, 2015 - Springer
Steganography is the art of hiding data into a media in such a way that the presence of data
can't be detected when the communication is taking place. This paper provides a review of …

An improvement for CAST-128 encryption based on magic square and matrix inversion

SM Kareem, A Al-Adhami, AMS Rahma - Bulletin of Electrical Engineering …, 2024 - beei.org
This paper presents two image encryption methods which aim to improve the CAST 128-bit
algorithm by increasing the security level of encrypted images. The first improvement uses a …

[PDF][PDF] New Approach for Modifying Blowfish Algorithm by Using Multiple Keys

AMA Al-Neaimi, RF Hassan - IJCSNS, 2011 - zuj.edu.jo
In this paper, cellular automata (CAs) are used to design a symmetric key cryptography
system based on Bluefish algorithm, CAs are applied to generate a multiple pseudo-random …

A new multi-level key block cypher based on the Blowfish algorithm

SM Kareem, AMS Rahma - … Computing Electronics and …, 2020 - telkomnika.uad.ac.id
Blowfish is a block cypher algorithm used in many applications to enhance security, but it
includes several drawbacks. For example, the mix between the key and data is limited. This …