A novel secret key generation based on image link

One of the main problems with symmetric encryption is key distribution especially when involving large number of users i.e to generate identical keys at different locations. To address this challenge, we proposed a novel algorithm of secret key infusion protocol (SKIP) to generate an identical...

Full description

Bibliographic Details
Main Authors: Sulaiman, Alyaa Ghanim, Taha Alshaikhli, Imad Fakhri, Wahiddin, Mohamed Ridza, Houri, S, Jamil, Norziana, Ismail, Ahmad Fadzil
Format: Article
Language:English
English
Published: Science Publishing Corporation Inc 2018
Subjects:
Online Access:http://irep.iium.edu.my/63930/
http://irep.iium.edu.my/63930/
http://irep.iium.edu.my/63930/
http://irep.iium.edu.my/63930/1/63930_A%20novel%20secret%20key%20generation%20based%20on%20image%20link.pdf
http://irep.iium.edu.my/63930/2/63930_A%20novel%20secret%20key%20generation%20based%20on%20image%20link_SCOPUS.pdf
id iium-63930
recordtype eprints
spelling iium-639302018-06-07T01:37:35Z http://irep.iium.edu.my/63930/ A novel secret key generation based on image link Sulaiman, Alyaa Ghanim Taha Alshaikhli, Imad Fakhri Wahiddin, Mohamed Ridza Houri, S Jamil, Norziana Ismail, Ahmad Fadzil QA75 Electronic computers. Computer science One of the main problems with symmetric encryption is key distribution especially when involving large number of users i.e to generate identical keys at different locations. To address this challenge, we proposed a novel algorithm of secret key infusion protocol (SKIP) to generate an identical secret key. While, the key is generated based on a provided image link, starting pattern and string length which must be kept in secret as the algorithm is publicly known. The image from website must be a static image and used as the input of random bits to produce string of hexadecimal values. In a case where image link is compromised, the adversary has to guess other layers of parameters in starting pattern and string length. The generated secret keys were identical at two different locations. In other observation, different secret keys were generated even with the same image link and pattern length but different starting pattern. Science Publishing Corporation Inc 2018-03-10 Article PeerReviewed application/pdf en http://irep.iium.edu.my/63930/1/63930_A%20novel%20secret%20key%20generation%20based%20on%20image%20link.pdf application/pdf en http://irep.iium.edu.my/63930/2/63930_A%20novel%20secret%20key%20generation%20based%20on%20image%20link_SCOPUS.pdf Sulaiman, Alyaa Ghanim and Taha Alshaikhli, Imad Fakhri and Wahiddin, Mohamed Ridza and Houri, S and Jamil, Norziana and Ismail, Ahmad Fadzil (2018) A novel secret key generation based on image link. International Journal of Engineering and Technology, 7 (2.5). pp. 23-26. ISSN 2227-524X https://www.sciencepubco.com/index.php/ijet/article/view/10048 10.14419/ijet.v7i2.5.10048
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Sulaiman, Alyaa Ghanim
Taha Alshaikhli, Imad Fakhri
Wahiddin, Mohamed Ridza
Houri, S
Jamil, Norziana
Ismail, Ahmad Fadzil
A novel secret key generation based on image link
description One of the main problems with symmetric encryption is key distribution especially when involving large number of users i.e to generate identical keys at different locations. To address this challenge, we proposed a novel algorithm of secret key infusion protocol (SKIP) to generate an identical secret key. While, the key is generated based on a provided image link, starting pattern and string length which must be kept in secret as the algorithm is publicly known. The image from website must be a static image and used as the input of random bits to produce string of hexadecimal values. In a case where image link is compromised, the adversary has to guess other layers of parameters in starting pattern and string length. The generated secret keys were identical at two different locations. In other observation, different secret keys were generated even with the same image link and pattern length but different starting pattern.
format Article
author Sulaiman, Alyaa Ghanim
Taha Alshaikhli, Imad Fakhri
Wahiddin, Mohamed Ridza
Houri, S
Jamil, Norziana
Ismail, Ahmad Fadzil
author_facet Sulaiman, Alyaa Ghanim
Taha Alshaikhli, Imad Fakhri
Wahiddin, Mohamed Ridza
Houri, S
Jamil, Norziana
Ismail, Ahmad Fadzil
author_sort Sulaiman, Alyaa Ghanim
title A novel secret key generation based on image link
title_short A novel secret key generation based on image link
title_full A novel secret key generation based on image link
title_fullStr A novel secret key generation based on image link
title_full_unstemmed A novel secret key generation based on image link
title_sort novel secret key generation based on image link
publisher Science Publishing Corporation Inc
publishDate 2018
url http://irep.iium.edu.my/63930/
http://irep.iium.edu.my/63930/
http://irep.iium.edu.my/63930/
http://irep.iium.edu.my/63930/1/63930_A%20novel%20secret%20key%20generation%20based%20on%20image%20link.pdf
http://irep.iium.edu.my/63930/2/63930_A%20novel%20secret%20key%20generation%20based%20on%20image%20link_SCOPUS.pdf
first_indexed 2023-09-18T21:30:41Z
last_indexed 2023-09-18T21:30:41Z
_version_ 1777412489642770432