Amany A. Naim

Work place: Faculty of Science, Al-Azhar University,Cairo, Egypt

E-mail: amany.naim@azher.edu.eg

Website:

Research Interests: Combinatorial Optimization, Analysis of Algorithms, Data Structures and Algorithms, Data Mining, Computational Learning Theory

Biography

Amany A. Naim received the B.Sc. degree in science, in 2009, and the M.Sc. and Ph.D. degrees in computer science, in 2015 and 2019, respectively. She is currently a lecrature in computer science with the Mathematics Department, Faculty of Science, Al- Azhar University, Cairo, Egypt. She has published several research papers in the field of AI, machine learning, meta-heuristic optimization, and data mining and analysis.

Author Articles
A 4-D HyperChaotic DNA Encryption/Decryption Algorithm for Securing Students Data System

By Ghada Yousef Gaber A. Elsharawy Amany A. Naim Heba F. Eid

DOI: https://doi.org/10.5815/ijmsc.2022.04.03, Pub. Date: 8 Oct. 2022

Data security has become a significant issue nowadays with the increase of information capacity and its transmission rate. The most common and widely used techniques in the data security fields is cryptography. Cryptography is the process of concealing and transmitting data in an appropriate format, so that only authorized people can access and process it. The main goal of the cryptographic process is protecting data from being hijacked and altered. This paper proposes an algorithm for encrypting data through the use of Deoxyribo Nucleic Acid (DNA) sequence and four-dimensional hyper chaotic system. Whereby, the hyper chaotic system is applied to generate a binary sequence which is later passed to a permutation function for the key generation of the first level encryption. The proposed encryption algorithm includes several intermediate steps, which are binary-coded form and the generation of arbitrary keys. Experimental results were analyzed by calculating encryption time, key generation time, histogram and correlation coefficient entropy. Furthermore, the proposed text encryption algorithm is implemented on two different students’ datasets to improve the security of educational systems.  Finally, experimental and comparative studies have shown that, the proposed encryption algorithm reported a uniform encrypted text distribution and correlation coefficient values  nearer to ‘0’, which are close to the theoretical optimal value.

[...] Read more.
Other Articles