Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/8492
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAbdulAziz, Rafid-
dc.contributor.authorSagheer, Ali-
dc.contributor.authorDawood, Omar-
dc.date.accessioned2022-11-12T18:11:27Z-
dc.date.available2022-11-12T18:11:27Z-
dc.date.issued2019-01-01-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/8492-
dc.description.abstractThe protection of secret and sensitive data shared through internet network is one of the most important issues that faces internet users. Despite the advance technology emerged lots of solutions to secure secret data sharing, but still the data sharing matter through an open environment is the main challenge. The sharing secret methods play great role in the key management strategy for the sensitive data and the cryptographic keys in terms of generation, exchange and managing in a secure method. The secret sharing scheme built based on proven mathematical concepts that allows the dealer to distribute the secret keys among several participants securely. In this thesis four new mathematical algorithms were proposed which completely based on the magic cube’s principles and the Lagrange mathematical background. The first algorithm relied on generation an odd order folded magic cube that exploits the pivot element of the first magic square in magic cube to be the secret and then embedded in polynomial equation. The pivot element will support in transfer the magic cube properties to the participants to be able to reconstruct the original magic cube again. The Hermite interpolation mathematical method was used in the second algorithm which considers more complex than the Lagrange interpolation method. Because, it depends on the derivative of polynomial and Lagrange derivative in the process of constructing and reconstruction the secret by the dealer and the participants. The third algorithm assumes that the dimension order (N) of the magic cube is the secret key that will be embedded within the polynomial equation and sent to the trusted subscribers. The participants will be able to get the secret (cube dimensions) after using the Lagrange interpolation. The algorithm requires finding the start number and the difference value between the magic cube elements to reconstruct it again. The third algorithm can work with different types of magic cubes of (odd order, singly or doubly even order). The fourth proposed algorithm is newton’s divided difference numerical analysis mathematical method. The newton interpolation was applied on the second polynomial algorithm and showed good results compared with its predecessor in the process of protecting the secret keys. The process of integrating the secret sharing methods with the mathematical characteristics of magic cubes gave a great flexibility in X dealing with different numerical analysis methods. The proposed secret sharing methods have been tested and measured according to some important metrics like the elapsed time and the computational complexity factor. The implemented tests indicated a reasonable and accepted results for the secret computation. All adopted numerical analysis methods provided good results during the process of sharing the secret and gave the necessary protection in trusting the sensitive information. The proposed methods produced distinct results and put the users in front of multi-options in choosing the appropriate way to transfer their confidential and sensitive information to the trusted subscribers in order to protect them from theft, loss or the risk of cryptanalysis. The proposed methods were programmed by Visual Studio 2016 C# programming language under Windows-10 Ultimate version of 64-bit operating system using processor core (TM) i7-77HQ CPU @ 2.80 GHz, Ram 16.0 GB, HD 1TB, and 4GB VGA.en_US
dc.language.isoenen_US
dc.publisherUniversity of Anbaren_US
dc.subjectSecret Sharingen_US
dc.subjectMagic Cubeen_US
dc.subjectMagic Squareen_US
dc.subjectKey Management Protocolen_US
dc.subjectLagrange Interpolationen_US
dc.subjectThreshold Encryptionen_US
dc.subjectShamir’s Secret Sharingen_US
dc.subjectSecure Computation,en_US
dc.subjectConditional Secure Secreten_US
dc.subjectSecret Reconstruction Schemesen_US
dc.titleSecret Sharing Key Management Based on Magic Cubeen_US
dc.typeThesisen_US
Appears in Collections:قسم علوم الحاسبات

Files in This Item:
File Description SizeFormat 
رافد.pdf2.49 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.