Browsing by Author "Elbehiery, Hussam"
Now showing 1 - 4 of 4
- Results Per Page
- Sort Options
Item Multi-symmetric Ciphering System Module Based on Microcontroller(Proceedings of the World Congress on Engineering, 2012) Abdelhady, Ghada; Elbehiery, HussamIt is widely recognized that data security will play a central role in the design of future IT systems. Many of those IT applications will be realized as embedded systems, which rely heavily on security mechanisms. Examples include security for wireless phones, wireless computing, and ATM security system in Banks. All modern security protocols use symmetrickey and public-key algorithms. This contribution presents a ciphering module that surveys several important cryptographic concepts and their relevance to embedded system applications. This study presents a module that includes three different symmetric ciphering algorithms: DES, DES-EC and AES based on microcontroller. Depending on the application and the data type, each user can select the suitable algorithm from the presented module. This study provides a comparison between the regular DES and the presented new DES. A comparison has been conducted for those encryption algorithms at different settings such as the key size, block size, speed, security, and the execution time.Item Multimodal Biometrics Cryptosystem using Elliptic Curve(2014) Abdelhady, Ghada; Ismail, Mohammed; Elbehiery, HussamBiometrics is a technology that strives towards identifying or authenticating the identity of a living person based on biological key that make the process definitive and effortless. A person's live biometric data is being matched against a bio print in the database, such as a smart card. If it matches, it means that the person is who he or she claims to be and access is granted. This process is called verification. Using the password in one to many systems is checking against a full database of passwords. This process is called identification. The system only cares if the password is valid one, not if the person using the password is authorized to use it. Biometric Encryption is a best method to secure our data and information. It guarantees the identification and authentication of the encryption process. To implement this technology, a powerful mathematical is used which known as Ciphering. Ciphering algorithms can be divided into two categories: private-key (symmetric) and publickey (asymmetric). Private-key systems use a common private key shared between the communicating parties, while public-key do not require any key exchange [2]. The implementation of ciphering systems presents several requirements and challenges. First, the performance of the algorithms is often crucial. One needs encryption algorithms to run at the transmission rates of the communication links. Slow running cryptographic algorithms translate into consumer dissatisfaction and inconvenience. On the other hand, fast running encryption might mean high product costs since traditionally, higher speeds were achieved through custom hardware devices. In addition to performance requirements, guaranteeing security is a formidable challenge. Our study will present a new algorithm that will be added to the known symmetric encryption algorithms. This system is called New DES based on Elliptic curve. It has the benefits of DES and also the benefits of Elliptic Curve Cryptosystem (ECC) as a public key algorithm. It has the simplicity of DES algorithm also it has the strength of ECC. Except that the key in ECC is a public key but the key in our new algorithm is still private and generated by a new technique mentioned in details in [1]. Also we will use different keys as we are going to use three biometric scanners, Fingerprint, retina and iris scanners. Biometric Encryption is the most suitable method to secure our data and information, in which the security is forced to check the incoming objects by scanning of our body and the scanned objects are stored in database as an image. Then, the stored images are compared with the original image that already stored in database. The coming sections explain History and state of the art, how DES is modified to be secured. Also, we explain the flowchart of our system and the proposed prototype pictures. The last section demonstrates industry and market analysis includingItem Secured and Transparent Computerized Voting System accessible everywhere(American Science, 2014) Elbarbary, Enas; Abdelhady, Ghada; Elbehiery, Hussam; Zekry, AbdelhahimAiding the user to have secured voting system is a must. Early regular voting systems have many drawbacks like the overcrowding of people in the polling stations and hence the traffic problems. The need for great amount of documents that are vulnerable, exposed to forgery, also the difficulty of achieving votes counting, analysis are considered as drawbacks for regular voting systems. This work presents a new smart system for voting process to be secured and transparent. We will call it "Secured and Transparent Computerized Voting system (STCVS)". "STCVS" system could eliminate counterfeiting, hacking. Also, while accessing it from any location, this would save the time spent for voting processes and countries economic performance would be better. Finally, "STCVS" system assures that user's vote will be his own opinion, not influenced by any others. [Enas Elbarbary, Ghada Abdelhady, Hussam Elbehiery, Abdelhahim Zekry. Secured and Transparent Computerized Voting System accessible everywhereItem Secured Transparent Computerized Voting System performance measurements(Science Publishing Corporation, 2015) Elbarbary, Enas; Abdelhady, Ghada; Elbehiery, Hussam; Zekry, AbdelhahimIn this paper, a multipurpose Secured Transparent Computerized Voting System (STCVS) is proposed. STCVS introduces an improvement methodology to the regular election systems. It could handle electronic ballots with multiple scopes at the same time, e.g., presidential, parliamentary, local, amongst others. STCVS's design warrants well-secured identification and authentication processes for the voter via using voter's digital signatures, certificates. Also, it guarantees voting data protection via encryption. Tallying of the voting counts is achieved automatically; candidates recorded percentages are displayed as charts for the supervision trusted parties. STCVS eliminates counting errors, voting duplication, and vote attack raised in paper-based elections systems. Voting transparency is achieved through the election process steps to assure voting credibility. This is confirmed by a feedback e-mail that the voter receives after finalizing the voting process. In addition, the proposed system saves the huge budget required for authentication devices, Electronic Voting Machines (EVM) that consist similar voting systems. To evaluate the robustness and reliability of the proposed system, performance measurements were achieved by applying the Avalanche Effect (AE) tests. Results of these measurements show the degree of security and the performance of the proposed system.