Ahmad Amro

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Due to the rapid increase of the Internet traffic encryption HTTPS, and the newly adopted protocols HTTP2 and SPDY, the need for a comprehensive high-level information extraction tool that supports the new protocols becomes essential for critical applications such as digital and network forensic and web penetration testing. In spite of the availability of(More)
Cryptanalysis combines a set of techniques and heuristics to reveal existing security flaws in a certain cryptographic scheme, for the sake of improvement or sometimes violation. In this paper, we analyze a newly proposed text cryptosystem that uses three different schemes for a pseudorandom number generator (PRNG). We show that two of the suggested methods(More)
Block ciphers, hash-based encryption, and public-key ciphers are examples of data encryption techniques with different desired features. Strong block ciphers, like AES, must run in some mode of operation to encrypt data larger than the block size. Public-key ciphers, like RSA, are costly and usually used for key-sharing rather than encrypting the data(More)
  • 1