Browsing by Author "Supervisor: Chikouche, Noureddine"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item Open Access Contribution au développement d’une méthode hybride pour le cryptage d’image numérique (Contribution to the development of a hybrid method for digital image encryption)(MOHAMED BOUDIAF UNIVERSITY OF M’SILA, 2024-10-10) Benaissi, Sellami; Supervisor: Chikouche, Noureddine; President: Mehenni, Tahar; Examiner: Terrissa, Labib Sadek; Examiner: Nouioua, Farid; Examiner: Guezouli, Lyamine; Examiner: Brahimi, BelkacemOne of the most important data currently shared on the Internet is images of various sizes and types, gray and color, private and public, civilian and military, medical and scientific, commercial, and others. The biggest challenge and problem is the secure transmission of these images in this insecure environment. In this context, this dissertation proposes a new image encryption algorithm using a hybrid of three modified and improved chaotic one-dimensional (1D) maps to avoid the shortcom- ings of 1D maps and multidimensional (MD) maps. A key image is used to initialize the chaotic maps and is also used as a mask in the diffusion phase with the eXclusive OR (XOR) operator. The encryption process involves using a variable called "Ex- traParam" that is extracted from the original image, which is very sensitive to bit changes during the initialization of the chaotic maps. The proposed encryption pro- cess consists of two main phases: confusion and diffusion processes. The proposed image encryption algorithm has successfully passed numerous tests and cryptanal- ysis. We also measure the proposed algorithm with various analysis experiments, such as histogram and entropy analysis, the number of pixel change rate (NPCR), the unified average changing intensity (UACI), the mean square error(MSE), the peak signal-to-noise ratio (PSNR) and Key Space. The experimental results and comparative analysis show that the proposed encryption algorithm has excellent performance, is strong enough to withstand various attacks, and provides excellent privacy to digital images.Item Open Access Preventing SQL Injection Attacks Using a Cryptography Technique(University of M'sila, 2016-06-10) Radjai, Marwan; Supervisor: Chikouche, Noureddine; Co- Supervisor: Fernini, L. BelabdelouahabWith the spread of Internet use in the world, security threats in the Internet increased dramatically. Among the vulnerabilities of the web application is SQL injection, which is based on the insertion of malicious requests to the DBMS, which executes these requests denier allowing access to. sensitive and confidentiel data. The purpose of this research paper is to find the best way to protect Web applications and sensitive data against hackers and security breaches through the use of effective encryption systems which, in turn, provide a significant degree of protection for Web applications. We made a thorough stildy of the different optimal strategies based on encryption in their content. We dealt With the e-Signature and its effective role in the protection of data. We applied encryption algorithms such as ECC, NTRUand of some of the techniques used to protect and prevent contaminated queries that are entered by the attacker.