Axes-Based Encryption Key

Security has always been a privilege for governments and banks, from the old Egyptian civilization to the latest technologies. Nowadays, security has become an essential part in our daily life; from protecting mobile chats to bank accounts to confidential data. It is everywhere due to the huge amoun...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Haidar, Imane (author)
مؤلفون آخرون: Haidar, Ali Massoud (author), Haraty, Ramzi A. (author)
التنسيق: conferenceObject
منشور في: 2018
الموضوعات:
الوصول للمادة أونلاين:http://hdl.handle.net/10725/10228
http://dx.doi.org/10.1109/AICCSA.2018.8612814
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
https://ieeexplore.ieee.org/abstract/document/8612814/keywords#keywords
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1864513486214660096
author Haidar, Imane
author2 Haidar, Ali Massoud
Haraty, Ramzi A.
author2_role author
author
author_facet Haidar, Imane
Haidar, Ali Massoud
Haraty, Ramzi A.
author_role author
dc.creator.none.fl_str_mv Haidar, Imane
Haidar, Ali Massoud
Haraty, Ramzi A.
dc.date.none.fl_str_mv 2018
2019-03-18T11:41:45Z
2019-03-18T11:41:45Z
2019-03-18
dc.identifier.none.fl_str_mv 9781538691205
http://hdl.handle.net/10725/10228
http://dx.doi.org/10.1109/AICCSA.2018.8612814
Haidar, I., Haidar, A. M., & Haraty, R. A. (2018, October). Axes-Based Encryption Key. In 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA) (pp. 1-8). IEEE.
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
https://ieeexplore.ieee.org/abstract/document/8612814/keywords#keywords
dc.language.none.fl_str_mv en
dc.publisher.none.fl_str_mv IEEE
dc.rights.*.fl_str_mv info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Computer systems -- Congresses
Computer networks -- Congresses
Computer engineering -- Congresses
dc.title.none.fl_str_mv Axes-Based Encryption Key
dc.type.none.fl_str_mv Conference Paper / Proceeding
info:eu-repo/semantics/publishedVersion
info:eu-repo/semantics/conferenceObject
description Security has always been a privilege for governments and banks, from the old Egyptian civilization to the latest technologies. Nowadays, security has become an essential part in our daily life; from protecting mobile chats to bank accounts to confidential data. It is everywhere due to the huge amount of data stored and transmitted over public and unsecure networks. On the other hand, computers are advancing so fast that some cryptosystems may vanish in the upcoming years. For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. The approach is based on concepts: transforming data, distributing data, and XORing it with other data. Several algorithms are applied to serve the goal, and promising results have been recuperated. Security has been maximized although there are limits concerning time and space.
eu_rights_str_mv openAccess
format conferenceObject
id LAURepo_25f6ddd7d70f7bafc9bbc3a30fdee8bd
identifier_str_mv 9781538691205
Haidar, I., Haidar, A. M., & Haraty, R. A. (2018, October). Axes-Based Encryption Key. In 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA) (pp. 1-8). IEEE.
language_invalid_str_mv en
network_acronym_str LAURepo
network_name_str Lebanese American University repository
oai_identifier_str oai:laur.lau.edu.lb:10725/10228
publishDate 2018
publisher.none.fl_str_mv IEEE
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
spelling Axes-Based Encryption KeyHaidar, ImaneHaidar, Ali MassoudHaraty, Ramzi A.Computer systems -- CongressesComputer networks -- CongressesComputer engineering -- CongressesSecurity has always been a privilege for governments and banks, from the old Egyptian civilization to the latest technologies. Nowadays, security has become an essential part in our daily life; from protecting mobile chats to bank accounts to confidential data. It is everywhere due to the huge amount of data stored and transmitted over public and unsecure networks. On the other hand, computers are advancing so fast that some cryptosystems may vanish in the upcoming years. For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. The approach is based on concepts: transforming data, distributing data, and XORing it with other data. Several algorithms are applied to serve the goal, and promising results have been recuperated. Security has been maximized although there are limits concerning time and space.IEEE Computer SocietyArab Computer SocietyInstitute of Electrical and Electronic EngineersN/AIncludes bibliographical references.IEEE2019-03-18T11:41:45Z2019-03-18T11:41:45Z20182019-03-18Conference Paper / Proceedinginfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/conferenceObject9781538691205http://hdl.handle.net/10725/10228http://dx.doi.org/10.1109/AICCSA.2018.8612814Haidar, I., Haidar, A. M., & Haraty, R. A. (2018, October). Axes-Based Encryption Key. In 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA) (pp. 1-8). IEEE.http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.phphttps://ieeexplore.ieee.org/abstract/document/8612814/keywords#keywordseninfo:eu-repo/semantics/openAccessoai:laur.lau.edu.lb:10725/102282022-08-02T10:54:08Z
spellingShingle Axes-Based Encryption Key
Haidar, Imane
Computer systems -- Congresses
Computer networks -- Congresses
Computer engineering -- Congresses
status_str publishedVersion
title Axes-Based Encryption Key
title_full Axes-Based Encryption Key
title_fullStr Axes-Based Encryption Key
title_full_unstemmed Axes-Based Encryption Key
title_short Axes-Based Encryption Key
title_sort Axes-Based Encryption Key
topic Computer systems -- Congresses
Computer networks -- Congresses
Computer engineering -- Congresses
url http://hdl.handle.net/10725/10228
http://dx.doi.org/10.1109/AICCSA.2018.8612814
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
https://ieeexplore.ieee.org/abstract/document/8612814/keywords#keywords