 
								Symmetric Volatile Shared Key Encryption: A Two-way Communication Shared Key Encryption
								
									
										
											
											
												Audai Al-Fandi,
											
										
											
											
												Yazeed Al-Howifer
											
										
									
								 
								
									
										Issue:
										Volume 2, Issue 3, May 2017
									
									
										Pages:
										27-30
									
								 
								
									Received:
										11 May 2017
									
									Accepted:
										25 May 2017
									
									Published:
										7 July 2017
									
								 
								
								
								
									
									
										Abstract: When it comes to the subject of encryption of communication streams, two key exchange methods are widely used asymmetric and symmetric key algorithms. However, neither of these methods is perfect. This paper will an algorithm that changes keys periodically without exchanging them between parties of the communication, the paper will discuss how this algorithm will solve some of the drawbacks of the widely used asymmetric and symmetric key algorithms.
										Abstract: When it comes to the subject of encryption of communication streams, two key exchange methods are widely used asymmetric and symmetric key algorithms. However, neither of these methods is perfect. This paper will an algorithm that changes keys periodically without exchanging them between parties of the communication, the paper will discuss how this...
										Show More
									
								
								
							
							
								 
								Hybrid Symmetric Volatile Encryption Algorithm Using Array
								
									
										
											
											
												Mostafa Al-Romi,
											
										
											
											
												Raid Al-Malki
											
										
									
								 
								
									
										Issue:
										Volume 2, Issue 3, May 2017
									
									
										Pages:
										31-34
									
								 
								
									Received:
										11 May 2017
									
									Accepted:
										24 May 2017
									
									Published:
										7 July 2017
									
								 
								
								
								
									Abstract: This paper demonstrates the symmetric key algorithm and describes how this algorithm works. Also, discuss the most common challenges that facing this cryptosystem and how to solve these aspects, and discuss two major kinds of attackers, also discuss some prior works that related with Symmetric Key Algorithm, also present the proposed solution.