A novel improvement with an effective expansion to enhance the MD5 hash function for verification of a secure E-document

AM Ali, AK Farhan - IEEE Access, 2020 - ieeexplore.ieee.org
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity.
The application of a Hash function can provide much protection and privacy and …

A lightweight noise-tolerant encryption scheme for secure communication: An unmanned aerial vehicle application

A Shafique, A Mehmood, M Elhadef, KH Khan - PLoS One, 2022 - journals.plos.org
In the modern era, researchers have focused a great deal of effort on multimedia security
and fast processing to address computational processing time difficulties. Due to limited …

Multi chaotic system to generate novel S-box for image encryption

H Nasry, AA Abdallah, AK Farhan… - Journal of Physics …, 2022 - iopscience.iop.org
A novel method on the basis of multi chaos theory is suggested in the presented study. Also,
the study used two different dimensions to generate S-Box to get a strong cipher that is …

A novel dynamic mathematical model applied in hash function based on DNA algorithm and chaotic maps

NE El-Meligy, TO Diab, AS Mohra, AY Hassan… - Mathematics, 2022 - mdpi.com
This paper aims to improve SHA-512 security without increasing complexity; therefore, we
focused on hash functions depending on DNA sequences and chaotic maps. After analysis …

[PDF][PDF] A lightweight aes algorithm implementation for secure iot environment

MS Fadhil, AK Farhan, MN Fadhil - Iraqi Journal of Science, 2021 - iasj.net
In recent years, the rapid development in the field of wireless technologies led to the
appearance of a new topic, known as the Internet of things (IoT). The IoT applications can be …

Designing substitution box based on the 1D logistic map chaotic system

MS Fadhil, AK Farhan, MN Fadhil - IOP Conference Series …, 2021 - iopscience.iop.org
Many researchers have tried to use the chaotic systems in generating different cryptographic
tools, in order to provide high level of security to the data passing through network. In …

[PDF][PDF] Image encryption algorithm based on substitution principle and shuffling scheme

A Hamad, AK Farhan - Engineering and Technology Journal, 2020 - iasj.net
The dynamic progression in multimedia and communication industry attracted an increased
concern in regards to digital image security which are being sent via open or stored …

[PDF][PDF] Simple Lightweight Cryptographic Algorithm to Secure Imbedded IoT Devices.

HI Mhaibes, MH Abood, AK Farhan - International Journal of …, 2022 - researchgate.net
The internet of things (IoT) revolution has been sparked by the exponential increase in
connected devices caused by recent advances in wireless technology. These embedded …

A novel algebraic technique for design of computational substitution-boxes using action of matrices on Galois field

N Siddiqui, H Khalid, F Murtaza… - IEEE …, 2020 - ieeexplore.ieee.org
Cryptography entails the practice of designing mathematical algorithms to secure data
communication over insecure networks in the presence of adversaries. In this aspect, a …

[PDF][PDF] Creation of S-Box based One-Dimensional Chaotic Logistic Map: Colour Image Encryption Approach

RS Salman, AK Farhan, A Shakir - Int. J. Intell. Eng. Syst, 2022 - inass.org
Image security is evolving as an outstanding platform to provide security in the digital world.
The external features of the Internet have driven the transfer of digital images from one place …