A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm

A Abusukhon, MN Anwar, Z Mohammad… - Journal of Discrete …, 2019 - Taylor & Francis
Nowadays, the rapid growth of Internet applications open the doors for people to
communicate and do business around the world and thus saving time, efforts and money …

[PDF][PDF] Analyzing the efficiency of Text-to-Image encryption algorithm

A Abusukhon, M Talib, MA Nabulsi - International Journal of …, 2012 - academia.edu
Today many of the activities are performed online through the Internet. One of the methods
used to protect the data while sending it through the Internet is cryptography. In a previous …

[PDF][PDF] Secure network communication based on text-to-image encryption

A Abusukhon, M Talib, I Ottoum - International Journal of Cyber …, 2012 - academia.edu
Security becomes an important issue when secure or sensitive information is sent over a
network where all computers are connected together. In such a network a computer is …

Block cipher encryption for text-to-image algorithm

AS Abusukhon - International Journal of Computer Engineering & …, 2013 - sdbindex.com
The Internet is now providing many online services. These online services need both a client
and a server to communicate with each other (this model is known as a client-server model) …

[PDF][PDF] A novel network security algorithm based on encrypting text into a white-page image

ZM Ahmad Abusukhon, M Talib - Proceedings of the World Congress …, 2016 - academia.edu
Nowadays, data security becomes a big issue and a challenge when sending sensitive data
through the Internet. For example; sending user password, performing money transaction (e …

[PDF][PDF] Distributed text-to-image encryption algorithm

A Ahmad, T Mohammad, HM Almimi - International Journal of Computer …, 2014 - Citeseer
Data encryption techniques are used to protect data against hackers. Text-to-Image
encryption algorithm (TTIE) is an encryption algorithm proposed for data encryption. The …

[PDF][PDF] A review on DES, AES and blowfish for image encryption & decryption

A Devi, A Sharma, A Rangra - International Journal of Computer Science …, 2015 - Citeseer
Network Security is the most vital component in information security because it is
responsible for securing all information passed through networked computers.[1] In this …

[HTML][HTML] A fast text-to-image encryption-decryption algorithm for secure network communication

NS Noor, DA Hammood, A Al-Naji, J Chahl - Computers, 2022 - mdpi.com
Data security is the science of protecting data in information technology, including
authentication, data encryption, data decryption, data recovery, and user protection. To …

A hybrid cryptosystem of image and text files using blowfish and Diffie-Hellman techniques

TK Hazra, A Mahato, A Mandal… - 2017 8th Annual …, 2017 - ieeexplore.ieee.org
In this paper we have proposed a new algorithm of encrypting and decrypting images and
text files. The proposed method is implemented by combining the concepts of Diffie Hellman …

Analysis of Data Encryption Algorithms for Telecommunication Network‐Computer Network Communication Security

Y He, N Ye, R Zhang - Wireless Communications and Mobile …, 2021 - Wiley Online Library
Nowadays, the development of information technology can be described as extremely rapid,
especially with the widespread use of the Internet; the security of communications in the …