Rasha S. Ali , Rajaa K. Hasoun , Inas Fadhil Jaleel , Ghassan H. Abdul-Majeed
{"title":"Proposal for providing secure Zoom meeting through Corona pandemic","authors":"Rasha S. Ali , Rajaa K. Hasoun , Inas Fadhil Jaleel , Ghassan H. Abdul-Majeed","doi":"10.1016/j.jer.2023.10.015","DOIUrl":null,"url":null,"abstract":"<div><p>The Zoom program is widely used to manage meetings around the world, but it is easy to leak the associated Personal Meeting ID. The present study aims at improving the security for Zoom meetings during the transmission process. A new encryption algorithm is proposed to achieve this goal. The system includes three steps namely; separating images, scrambling one-half of the image, encrypting, and substituting the other scrambled half. Implementation of these three steps is achieved by using: cutting the image vertically, Arnold Cut Map, and tRNA respectively. The Bioinformatics technique (tRNA) used in encrypting (red and green) colors, and the Arnold cut map used in the scrambling and shifting process in the encryption method. The performance of the proposed system is measured by using a series of tests such as key sensitivity, histogram analysis, information entropy, correlation analysis, NCPR, similarity, and PSNR test. The results reveal a high sensitivity for initial values, resistant to statistical attack, and have the best performance in the NCPR test. It also passes the evaluation criteria for the both encryption method and S-Box. The complexity of the suggested system is represented by the attacker's need to know many chaos parameters, the logistic method (Arnold cut map), the utilized visual cryptographic techniques, and the methods used to generate the S-Box and keys. The consumed time is fewer than AES algorithm because AES takes huge time in the encryption process especially for big data. The proposed key needs to refresh only one time to make big changed and produces high security.</p></div>","PeriodicalId":48803,"journal":{"name":"Journal of Engineering Research","volume":"12 2","pages":"Pages 91-100"},"PeriodicalIF":0.9000,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2307187723002754/pdfft?md5=29475c6488c06b10745e8634ee36c54b&pid=1-s2.0-S2307187723002754-main.pdf","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Engineering Research","FirstCategoryId":"5","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2307187723002754","RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0
Abstract
The Zoom program is widely used to manage meetings around the world, but it is easy to leak the associated Personal Meeting ID. The present study aims at improving the security for Zoom meetings during the transmission process. A new encryption algorithm is proposed to achieve this goal. The system includes three steps namely; separating images, scrambling one-half of the image, encrypting, and substituting the other scrambled half. Implementation of these three steps is achieved by using: cutting the image vertically, Arnold Cut Map, and tRNA respectively. The Bioinformatics technique (tRNA) used in encrypting (red and green) colors, and the Arnold cut map used in the scrambling and shifting process in the encryption method. The performance of the proposed system is measured by using a series of tests such as key sensitivity, histogram analysis, information entropy, correlation analysis, NCPR, similarity, and PSNR test. The results reveal a high sensitivity for initial values, resistant to statistical attack, and have the best performance in the NCPR test. It also passes the evaluation criteria for the both encryption method and S-Box. The complexity of the suggested system is represented by the attacker's need to know many chaos parameters, the logistic method (Arnold cut map), the utilized visual cryptographic techniques, and the methods used to generate the S-Box and keys. The consumed time is fewer than AES algorithm because AES takes huge time in the encryption process especially for big data. The proposed key needs to refresh only one time to make big changed and produces high security.
期刊介绍:
Journal of Engineering Research (JER) is a international, peer reviewed journal which publishes full length original research papers, reviews, case studies related to all areas of Engineering such as: Civil, Mechanical, Industrial, Electrical, Computer, Chemical, Petroleum, Aerospace, Architectural, Biomedical, Coastal, Environmental, Marine & Ocean, Metallurgical & Materials, software, Surveying, Systems and Manufacturing Engineering. In particular, JER focuses on innovative approaches and methods that contribute to solving the environmental and manufacturing problems, which exist primarily in the Arabian Gulf region and the Middle East countries. Kuwait University used to publish the Journal "Kuwait Journal of Science and Engineering" (ISSN: 1024-8684), which included Science and Engineering articles since 1974. In 2011 the decision was taken to split KJSE into two independent Journals - "Journal of Engineering Research "(JER) and "Kuwait Journal of Science" (KJS).