Thesis Chapters by Omar G . Abood

Omar G. Abood, https://scholar.google.com.eg/citations?user=hwC8sKkAAAAJ&hl=ar&gmla=AJsN-F5FkZ60iRkl5RoH8gmQaTNKcKJKOdPPej93-E9wNHo3ISkts0_s3gjYw2yinBunb005io5R3sO-lWdTvQAkTLxi1RiT2Jglw6v3sS-K7jvUnWP966KrDQqczoXr689zwOVLKzmmZE1dJC4s_PWMfnDfka6XjDHq2wbgpAFDTcCLa-lggVI&sciund=18339398078938948894, 2019
Traditional cryptographic systems are built on strong mathematical and theoretical basis. Therefo... more Traditional cryptographic systems are built on strong mathematical and theoretical basis. Therefore, an important perception is needed to be developed that the DNA cryptography is not only to negate the tradition, but also to develop more interaction between existing and new technology. This thesis introduces and applies a proposed DNA sequence enhanced Advanced Encryption standard (AES) design. The proposed algorithm is implemented with all its features (data, algorithms operations and used functions) using DNA sequence rather than bits in mix column step. The proposed technique demonstrates the possibility of building such an intricate system of DNA sequence in a method for making it an appropriate contender for usage in the biological environment or on DNA computers. To prevent plain-text attack, we generated three secret keys. (1) A main key presents the main key for AES algorithm. (2) A key presents the DNA base where the number of probabilities of the key, and we call DNA Rule 1. (3) A key presents the number of possibilities of binding between the helical structures of DNA increasing the key length. And is conducted in order to achieve a higher security level, and we call DNA Rule 2. The proposed algorithm is implemented and evaluated using MATLAB 2016b. The results proved better security against brute-force-attack and needed longer time to break when compared to other techniques. The security tests, performance analysis and evaluation of other techniques indicate that the proposed algorithm has higher security and more complexity. The proposed algorithm is secure and efficient to be used for image encryption-based applications. The standard images have been used to test and evaluate the proposed algorithm.
Uploads
Thesis Chapters by Omar G . Abood