Random keys Generating for Asymmetric Cryptography using Video Entropy Random keys Generating for Asymmetric Cryptography using Video Entropy
Because of the widespread of the Internet usage and the emergence of multiple means of communication like Social media and email applications. also the rapid development in the field of communications lead to arising of difficulties, such as finding methods for protecting transmitted data and diffi...
Uložené v:
| Vydané v: | Academic Science Journal Ročník 3; číslo 3; s. 1 - 11 |
|---|---|
| Hlavní autori: | , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
College of science, university of Diyala
01.07.2025
|
| Predmet: | |
| ISSN: | 2958-4612, 2959-5568 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Because of the widespread of the Internet usage and the emergence of multiple means of communication like Social media and email applications. also the rapid development in the field of communications lead to arising of difficulties, such as finding methods for protecting transmitted data and difficulty of controlling data penetration. Public key encryption methods are considered the most suitable techniques for correspondence over the Internet, but there is a major problem facing most of the methods of this system, which is the methods of exchanging keys between the sender and the recipient. In this paper, a new technique for generating keys proposed. by using some video properties to generate keys from data in the video randomly. The proposed method led to solve two problems at the same time. The first problem is the problem of exchanging keys, because sending the video via any means of communication does not raise the suspicion of the attacker, in addition to the difficulty of extracting the keys. The second problem is the methods of selecting the keys, because the proposed method generates many keys randomly. |
|---|---|
| AbstractList | Because of the widespread of the Internet usage and the emergence of multiple means of communication like Social media and email applications. also the rapid development in the field of communications lead to arising of difficulties, such as finding methods for protecting transmitted data and difficulty of controlling data penetration. Public key encryption methods are considered the most suitable techniques for correspondence over the Internet, but there is a major problem facing most of the methods of this system, which is the methods of exchanging keys between the sender and the recipient. In this paper, a new technique for generating keys proposed. by using some video properties to generate keys from data in the video randomly. The proposed method led to solve two problems at the same time. The first problem is the problem of exchanging keys, because sending the video via any means of communication does not raise the suspicion of the attacker, in addition to the difficulty of extracting the keys. The second problem is the methods of selecting the keys, because the proposed method generates many keys randomly. |
| Author | Saba Fouad Hassan Mohammed, Rasha Ismail Ahmed, Rasha |
| Author_xml | – sequence: 1 givenname: Rasha orcidid: 0000-0003-3623-3116 surname: Ismail Ahmed fullname: Ismail Ahmed, Rasha – sequence: 2 givenname: Rasha orcidid: 0000-0003-4381-5421 surname: Mohammed fullname: Mohammed, Rasha – sequence: 3 orcidid: 0009-0009-7875-1799 surname: Saba Fouad Hassan fullname: Saba Fouad Hassan |
| BookMark | eNo9kEtLw0AUhQepYK1du80fSDvvZJYltLUiCL62w2Qyt0abTJiJi_x7k1aEA-dyOXyL7xbNWt86hO4JXlFOWbbevD6uMJuSC1FcoTlVQqVCyHx2vvOUS0Jv0DLGusQiY5RgyuZo92LayjfJtxtisnetC6av22MCPiSbODSN60NtkyIMXe-PwXSfQ_ITp8VHXTmfbNs--G64Q9dgTtEt_3qB3nfbt-IhfXreH4rNU2oJz2yqOFRAgFNhIS-hZEIAx0I6bsaBBDyWc6SUFhyUThqLFVFS5YJmsgTMFuhw4VbefOku1I0Jg_am1ueHD0dtQl_bk9OV5URmihMOjKusMtRUOJcMjOAcuBlZ6wvLBh9jcPDPI1ifrerRqsZsymSV_QJ6r20J |
| ContentType | Journal Article |
| DBID | AAYXX CITATION DOA |
| DOI | 10.24237/ASJ.03.03.855C |
| DatabaseName | CrossRef Directory of Open Access Journals (DOAJ) |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | CrossRef |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
| DeliveryMethod | fulltext_linktorsrc |
| EISSN | 2959-5568 |
| EndPage | 11 |
| ExternalDocumentID | oai_doaj_org_article_dc41679414f3497da2ad0863fa544f4a 10_24237_ASJ_03_03_855C |
| GroupedDBID | AAYXX ALMA_UNASSIGNED_HOLDINGS CITATION M~E GROUPED_DOAJ |
| ID | FETCH-LOGICAL-c147c-94fdf1f425cf8bfb355f4056e4ac146f0ac1ee1b6cfefbe6ac09196985276bf03 |
| IEDL.DBID | DOA |
| ISSN | 2958-4612 |
| IngestDate | Tue Oct 14 19:06:17 EDT 2025 Sat Nov 29 07:37:15 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Language | English |
| License | https://creativecommons.org/licenses/by/4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c147c-94fdf1f425cf8bfb355f4056e4ac146f0ac1ee1b6cfefbe6ac09196985276bf03 |
| ORCID | 0000-0003-4381-5421 0000-0003-3623-3116 0009-0009-7875-1799 |
| OpenAccessLink | https://doaj.org/article/dc41679414f3497da2ad0863fa544f4a |
| PageCount | 11 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_dc41679414f3497da2ad0863fa544f4a crossref_primary_10_24237_ASJ_03_03_855C |
| PublicationCentury | 2000 |
| PublicationDate | 2025-07-01 |
| PublicationDateYYYYMMDD | 2025-07-01 |
| PublicationDate_xml | – month: 07 year: 2025 text: 2025-07-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationTitle | Academic Science Journal |
| PublicationYear | 2025 |
| Publisher | College of science, university of Diyala |
| Publisher_xml | – name: College of science, university of Diyala |
| SSID | ssib057321023 ssib059950748 |
| Score | 2.295918 |
| Snippet | Because of the widespread of the Internet usage and the emergence of multiple means of communication like Social media and email applications. also the rapid... |
| SourceID | doaj crossref |
| SourceType | Open Website Index Database |
| StartPage | 1 |
| SubjectTerms | Cryptography, asymptomatic key, video processing, entropy metric |
| Subtitle | Random keys Generating for Asymmetric Cryptography using Video Entropy |
| Title | Random keys Generating for Asymmetric Cryptography using Video Entropy |
| URI | https://doaj.org/article/dc41679414f3497da2ad0863fa544f4a |
| Volume | 3 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2959-5568 dateEnd: 99991231 omitProxy: false ssIdentifier: ssib057321023 issn: 2958-4612 databaseCode: DOA dateStart: 20230101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2959-5568 dateEnd: 99991231 omitProxy: false ssIdentifier: ssib059950748 issn: 2958-4612 databaseCode: M~E dateStart: 20230101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LSwMxEA5SPHgRRcX6IgcPXtbuYzaPYy0t4qGIL3pbsklGeuiDtgr9906yVerJi7CwsISwO5Mw37Bfvo-x69RhXrhUJ75EkwDVpER7Tz2PV9aozIezA9FsQg6HajTSj1tWX4ET1sgDN4HrOAvhTwFkgAVo6UxuHMHwAk0JgBChUSr1VjNFK6mU4WhK9HbLdakSoDre6PoE-CA73eeHKG1a3Kqy7P0qSVvK_bHEDA7Y_gYb8m7zTodsx0-P2OCJev3ZhNNmW_JGJDowlTmBTd5drieTYIlleW-xnq828tM8kNnf-dvY-RnvByr6fH3MXgf9l959sjE_SGwG0iYa0GGGtKUsqhprwgVI4Ep4MDRAYEo377NaWPRYe2EsVX4ttCpzKWpMixPWms6m_pRxnaM2DkReQwGeGkIHslZe5A6MQyza7Ob7-6t5o3FRUW8QQ1VRqKq0CFcIVZvdhfj8DAvi1PEBpazapKz6K2Vn_zHJOdvLgxVvZM5esNZq8eEv2a79XI2Xi6u4Gr4AT-G4Jw |
| linkProvider | Directory of Open Access Journals |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Random+keys+Generating+for+Asymmetric+Cryptography+using+Video+Entropy&rft.jtitle=Academic+Science+Journal&rft.au=Ismail+Ahmed%2C+Rasha&rft.au=Mohammed%2C+Rasha&rft.au=Saba+Fouad+Hassan&rft.date=2025-07-01&rft.issn=2958-4612&rft.eissn=2959-5568&rft.volume=3&rft.issue=3&rft.spage=1&rft.epage=11&rft_id=info:doi/10.24237%2FASJ.03.03.855C&rft.externalDBID=n%2Fa&rft.externalDocID=10_24237_ASJ_03_03_855C |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2958-4612&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2958-4612&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2958-4612&client=summon |