Axes-Based Encryption Key
Security has always been a privilege for governments and banks, from the old Egyptian civilization to the latest technologies. Nowadays, security has become an essential part in our daily life; from protecting mobile chats to bank accounts to confidential data. It is everywhere due to the huge amoun...
محفوظ في:
| المؤلف الرئيسي: | |
|---|---|
| مؤلفون آخرون: | , |
| التنسيق: | conferenceObject |
| منشور في: |
2018
|
| الموضوعات: | |
| الوصول للمادة أونلاين: | http://hdl.handle.net/10725/10228 http://dx.doi.org/10.1109/AICCSA.2018.8612814 http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php https://ieeexplore.ieee.org/abstract/document/8612814/keywords#keywords |
| الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
| _version_ | 1864513486214660096 |
|---|---|
| author | Haidar, Imane |
| author2 | Haidar, Ali Massoud Haraty, Ramzi A. |
| author2_role | author author |
| author_facet | Haidar, Imane Haidar, Ali Massoud Haraty, Ramzi A. |
| author_role | author |
| dc.creator.none.fl_str_mv | Haidar, Imane Haidar, Ali Massoud Haraty, Ramzi A. |
| dc.date.none.fl_str_mv | 2018 2019-03-18T11:41:45Z 2019-03-18T11:41:45Z 2019-03-18 |
| dc.identifier.none.fl_str_mv | 9781538691205 http://hdl.handle.net/10725/10228 http://dx.doi.org/10.1109/AICCSA.2018.8612814 Haidar, I., Haidar, A. M., & Haraty, R. A. (2018, October). Axes-Based Encryption Key. In 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA) (pp. 1-8). IEEE. http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php https://ieeexplore.ieee.org/abstract/document/8612814/keywords#keywords |
| dc.language.none.fl_str_mv | en |
| dc.publisher.none.fl_str_mv | IEEE |
| dc.rights.*.fl_str_mv | info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Computer systems -- Congresses Computer networks -- Congresses Computer engineering -- Congresses |
| dc.title.none.fl_str_mv | Axes-Based Encryption Key |
| dc.type.none.fl_str_mv | Conference Paper / Proceeding info:eu-repo/semantics/publishedVersion info:eu-repo/semantics/conferenceObject |
| description | Security has always been a privilege for governments and banks, from the old Egyptian civilization to the latest technologies. Nowadays, security has become an essential part in our daily life; from protecting mobile chats to bank accounts to confidential data. It is everywhere due to the huge amount of data stored and transmitted over public and unsecure networks. On the other hand, computers are advancing so fast that some cryptosystems may vanish in the upcoming years. For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. The approach is based on concepts: transforming data, distributing data, and XORing it with other data. Several algorithms are applied to serve the goal, and promising results have been recuperated. Security has been maximized although there are limits concerning time and space. |
| eu_rights_str_mv | openAccess |
| format | conferenceObject |
| id | LAURepo_25f6ddd7d70f7bafc9bbc3a30fdee8bd |
| identifier_str_mv | 9781538691205 Haidar, I., Haidar, A. M., & Haraty, R. A. (2018, October). Axes-Based Encryption Key. In 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA) (pp. 1-8). IEEE. |
| language_invalid_str_mv | en |
| network_acronym_str | LAURepo |
| network_name_str | Lebanese American University repository |
| oai_identifier_str | oai:laur.lau.edu.lb:10725/10228 |
| publishDate | 2018 |
| publisher.none.fl_str_mv | IEEE |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| spelling | Axes-Based Encryption KeyHaidar, ImaneHaidar, Ali MassoudHaraty, Ramzi A.Computer systems -- CongressesComputer networks -- CongressesComputer engineering -- CongressesSecurity has always been a privilege for governments and banks, from the old Egyptian civilization to the latest technologies. Nowadays, security has become an essential part in our daily life; from protecting mobile chats to bank accounts to confidential data. It is everywhere due to the huge amount of data stored and transmitted over public and unsecure networks. On the other hand, computers are advancing so fast that some cryptosystems may vanish in the upcoming years. For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. The approach is based on concepts: transforming data, distributing data, and XORing it with other data. Several algorithms are applied to serve the goal, and promising results have been recuperated. Security has been maximized although there are limits concerning time and space.IEEE Computer SocietyArab Computer SocietyInstitute of Electrical and Electronic EngineersN/AIncludes bibliographical references.IEEE2019-03-18T11:41:45Z2019-03-18T11:41:45Z20182019-03-18Conference Paper / Proceedinginfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/conferenceObject9781538691205http://hdl.handle.net/10725/10228http://dx.doi.org/10.1109/AICCSA.2018.8612814Haidar, I., Haidar, A. M., & Haraty, R. A. (2018, October). Axes-Based Encryption Key. In 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA) (pp. 1-8). IEEE.http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.phphttps://ieeexplore.ieee.org/abstract/document/8612814/keywords#keywordseninfo:eu-repo/semantics/openAccessoai:laur.lau.edu.lb:10725/102282022-08-02T10:54:08Z |
| spellingShingle | Axes-Based Encryption Key Haidar, Imane Computer systems -- Congresses Computer networks -- Congresses Computer engineering -- Congresses |
| status_str | publishedVersion |
| title | Axes-Based Encryption Key |
| title_full | Axes-Based Encryption Key |
| title_fullStr | Axes-Based Encryption Key |
| title_full_unstemmed | Axes-Based Encryption Key |
| title_short | Axes-Based Encryption Key |
| title_sort | Axes-Based Encryption Key |
| topic | Computer systems -- Congresses Computer networks -- Congresses Computer engineering -- Congresses |
| url | http://hdl.handle.net/10725/10228 http://dx.doi.org/10.1109/AICCSA.2018.8612814 http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php https://ieeexplore.ieee.org/abstract/document/8612814/keywords#keywords |