International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 151

Research Paper | Computer Science & Engineering | Iraq | Volume 7 Issue 2, February 2018


Proposed Email System Security based Bio-Chaos Modified Hash and Modified AES

Dr. Haider K. Hoomod | Arkan Mohammed Radi


Abstract: Email messages transmitted over internet can be pose a real threat to the integrity of information, especially if it relates to military matters because it insecure channel. The cryptography achieves confidentiality and authentication to message contents, so must therefore choose efficient algorithm relevant to this field such as algorithm Advanced Encryption Standard (AES) or Data Encryption Standard (DES) as well as biometric recognition and chaotic system In this paper will be using modified AES algorithm, key-bio-chaos that consist from biometric (Fingerprint) and chaotic system (Lu and Lorenz or Lorenz), also uses modified hash function MSHA-768 and MSHA-160/224/256/384/512 in constructing Email system security achieves high level of security and authentication on messages against threats and be easy to use by users, in addition to being compatible with many MailServer


Keywords: Modified AES, chaos system Lu, Lorenz, biometric Fingerprint and palmprint, modified hash function SHA


Edition: Volume 7 Issue 2, February 2018,


Pages: 903 - 917


How to Cite this Article?

Dr. Haider K. Hoomod, Arkan Mohammed Radi, "Proposed Email System Security based Bio-Chaos Modified Hash and Modified AES", International Journal of Science and Research (IJSR), Volume 7 Issue 2, February 2018, pp. 903-917, https://www.ijsr.net/get_abstract.php?paper_id=ART2018102

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Modified AES'

Downloads: 116

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 2, February 2017

Pages: 1886 - 1889

Deduplication Using SHA-1 and IBE with Modified AES

Renuka C. Deshpande | S. S. Ponde

Share this Article

Downloads: 127

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 662 - 665

An Introduction of Advanced Encryption Algorithm: A Preview

Asfiya Shireen Shaikh Mukhtar | Ghousiya Farheen Shaikh Mukhtar

Share this Article


Top