Benner
زين العابدين عبد الصمد سلطان ( مدرس )
كلية
[email protected]
 
 
 
Secure Keys Constructing
بحث النوع:
علوم التخصص العام:
Zainalabideen Abdullasamd Rashee اسم الناشر:
Ali Abdul Azeez Mohammad Baker اسماء المساعدين:
International Journal of Advanced Research inComputer Science and Software Engineering الجهة الناشرة:
International Journal of Advanced Research inComputer Science and Software Engineering Volume 4, Issue 11,November 2014  
2014 سنة النشر:

الخلاصة

Abstract—Security is one of the most important things in current era because of danger effects of extracting secure information by any unwanted partwhere information is critical and effective. There are many methods applied to ensure information security like steganography, cryptography, biometrics, barcodes, and passwords, all these methods have different levels of security and havestrong and/or weak features in different cases. cryptography provide strong method for keeping information secured and undiscovered from unwanted persons, and this state depends on some parameters like method complexity, key length, key randomness,andkey security. In this paper a new method will be suggested to construct secure and randomness keys and avoiding the problems of changing and sending keys between authorized parts. The proposed method constructingfifteenth digit key from colored image by discovering sixteen digits from each band throughextracting the essential repetitive colors and two digits from the size of the image. the most important feature of this key that it can be reconstructed in all authorized parts that received the specific image in spite of changing could be happened through channel in the networks that will be used in sendingsecure information from one part to all other authorized parts