By Topic

A novel network security algorithm based on private key encryption

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Abusukhon, A. ; Comput. Network Dept., Al-Zaytoonah Univ. of Jordan, Amman, Jordan ; Talib, M.

In cryptographic application, the data sent to a remote host are encrypted first at the source machine using an encryption key then the encrypted data are sent to the destination machine. This way the attacker will not have the encryption key which is required to get the original data and thus the hacker will be unable to do anything with the session. In this paper, we propose a novel method for data encryption and our method is based on the transformation of a text file into an image file on both client and server machines. We analyze our algorithm by calculating the number of all possible key permutations.

Published in:

Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on

Date of Conference:

26-28 June 2012