Search In this Thesis
   Search In this Thesis  
العنوان
Advanced Techniques for Encryption of Digital Identification ID \
المؤلف
Soliman, Ahmed Kamal Ibrahim.
هيئة الاعداد
باحث / أحمـــــد كمال إبراھ?م سل?مان
مشرف / حســن محمد الكمشـــوشى
مشرف / عـــــادل محمـــود الفحــار
01223677784
مشرف / عصام عبدالمج?د ھجرس
مناقش / محمد السع?د نصر
مناقش / نھى عثمـــــــان قــرنى
الموضوع
Electrical Engineering.
تاريخ النشر
2020.
عدد الصفحات
91 p. :
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
الهندسة الكهربائية والالكترونية
تاريخ الإجازة
1/1/2020
مكان الإجازة
جامعة الاسكندريه - كلية الهندسة - الهندسة الكهربية
الفهرس
Only 14 pages are availabe for public view

from 115

from 115

Abstract

In recent decades, usage of images notably increased across the network. It became an indispensable part of our life, because it contains personal or confidential data, and also it became a great source of information. So, strong security and protection for this information are essential. Also, securing data against different attacks is a very important issue. The transmitted data through the network have different levels of secrecy or privacy that could be compromised.Information security is responsible for defending the transferred data from unauthorized access. This thesis concerns the data confidentiality service, which is needed for retaining the transferred data unrevealed to an unauthorized user. Cryptography is the employed security mechanism to accomplish the task of data confidentiality.The main idea of the proposed technique is 1. Exploits the advantages of the elliptic curve for key exchange, in addition to increase the secrecy by using the hidden isomorphic elliptic curve technique. Thus, preserve the isomorphic elliptic curve parameters hidden from the malicious attackers and also enlarge the key space without making additional elliptic curve point multiplication operation that consumes a lot of time.2. Attain the confidentiality and authentication by building a fractional chaotic key generator, based on the fingerprint biometric identity key combined with the isomorphic elliptic curve produced keys and the proposed modular fractional chaotic sin map output to achieve randomness and chaocity for each operation. The fractional chaotic key generator works as a parameter ignitor for the key schedule which controls all the system.3. Improve rapidity, removal of the supplementary memory and the achievement of confusion and diffusion for fast and robust image encryption. Firstly, by using discrete wavelet transform for partial image confusion using 2D Arnold cat map. Secondly, combining elliptic curve cryptography with modular fractional chaotic sin map for constructing the self-invertible matrix to be used for encryption and decryption.