A novel secret key generation based on image link

One of the main problems with symmetric encryption is key distribution especially when involving large number of users i.e to generate identical keys at different locations. To address this challenge, we proposed a novel algorithm of secret key infusion protocol (SKIP) to generate an identical...

Full description

Saved in:
Bibliographic Details
Main Authors: Sulaiman, Alyaa Ghanim, Taha Alshaikhli, Imad Fakhri, Wahiddin, Mohamed Ridza, Houri, S, Jamil, Norziana, Ismail, Ahmad Fadzil
Format: Article
Language:English
English
Published: Science Publishing Corporation Inc 2018
Subjects:
Online Access:http://irep.iium.edu.my/63930/1/63930_A%20novel%20secret%20key%20generation%20based%20on%20image%20link.pdf
http://irep.iium.edu.my/63930/2/63930_A%20novel%20secret%20key%20generation%20based%20on%20image%20link_SCOPUS.pdf
http://irep.iium.edu.my/63930/
https://www.sciencepubco.com/index.php/ijet/article/view/10048
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.iium.irep.63930
record_format dspace
spelling my.iium.irep.639302018-06-07T01:37:35Z http://irep.iium.edu.my/63930/ A novel secret key generation based on image link Sulaiman, Alyaa Ghanim Taha Alshaikhli, Imad Fakhri Wahiddin, Mohamed Ridza Houri, S Jamil, Norziana Ismail, Ahmad Fadzil QA75 Electronic computers. Computer science One of the main problems with symmetric encryption is key distribution especially when involving large number of users i.e to generate identical keys at different locations. To address this challenge, we proposed a novel algorithm of secret key infusion protocol (SKIP) to generate an identical secret key. While, the key is generated based on a provided image link, starting pattern and string length which must be kept in secret as the algorithm is publicly known. The image from website must be a static image and used as the input of random bits to produce string of hexadecimal values. In a case where image link is compromised, the adversary has to guess other layers of parameters in starting pattern and string length. The generated secret keys were identical at two different locations. In other observation, different secret keys were generated even with the same image link and pattern length but different starting pattern. Science Publishing Corporation Inc 2018-03-10 Article REM application/pdf en http://irep.iium.edu.my/63930/1/63930_A%20novel%20secret%20key%20generation%20based%20on%20image%20link.pdf application/pdf en http://irep.iium.edu.my/63930/2/63930_A%20novel%20secret%20key%20generation%20based%20on%20image%20link_SCOPUS.pdf Sulaiman, Alyaa Ghanim and Taha Alshaikhli, Imad Fakhri and Wahiddin, Mohamed Ridza and Houri, S and Jamil, Norziana and Ismail, Ahmad Fadzil (2018) A novel secret key generation based on image link. International Journal of Engineering and Technology, 7 (2.5). pp. 23-26. ISSN 2227-524X https://www.sciencepubco.com/index.php/ijet/article/view/10048 10.14419/ijet.v7i2.5.10048
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Sulaiman, Alyaa Ghanim
Taha Alshaikhli, Imad Fakhri
Wahiddin, Mohamed Ridza
Houri, S
Jamil, Norziana
Ismail, Ahmad Fadzil
A novel secret key generation based on image link
description One of the main problems with symmetric encryption is key distribution especially when involving large number of users i.e to generate identical keys at different locations. To address this challenge, we proposed a novel algorithm of secret key infusion protocol (SKIP) to generate an identical secret key. While, the key is generated based on a provided image link, starting pattern and string length which must be kept in secret as the algorithm is publicly known. The image from website must be a static image and used as the input of random bits to produce string of hexadecimal values. In a case where image link is compromised, the adversary has to guess other layers of parameters in starting pattern and string length. The generated secret keys were identical at two different locations. In other observation, different secret keys were generated even with the same image link and pattern length but different starting pattern.
format Article
author Sulaiman, Alyaa Ghanim
Taha Alshaikhli, Imad Fakhri
Wahiddin, Mohamed Ridza
Houri, S
Jamil, Norziana
Ismail, Ahmad Fadzil
author_facet Sulaiman, Alyaa Ghanim
Taha Alshaikhli, Imad Fakhri
Wahiddin, Mohamed Ridza
Houri, S
Jamil, Norziana
Ismail, Ahmad Fadzil
author_sort Sulaiman, Alyaa Ghanim
title A novel secret key generation based on image link
title_short A novel secret key generation based on image link
title_full A novel secret key generation based on image link
title_fullStr A novel secret key generation based on image link
title_full_unstemmed A novel secret key generation based on image link
title_sort novel secret key generation based on image link
publisher Science Publishing Corporation Inc
publishDate 2018
url http://irep.iium.edu.my/63930/1/63930_A%20novel%20secret%20key%20generation%20based%20on%20image%20link.pdf
http://irep.iium.edu.my/63930/2/63930_A%20novel%20secret%20key%20generation%20based%20on%20image%20link_SCOPUS.pdf
http://irep.iium.edu.my/63930/
https://www.sciencepubco.com/index.php/ijet/article/view/10048
_version_ 1643616453821202432
score 13.211869