Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Magdy Saeb is active.

Publication


Featured researches published by Magdy Saeb.


international conference on computer and communication engineering | 2010

A secure protocol using 6DP for quantum authentication and hash functions for key distribution (KDP-6DP)

Khalid A. Saeed Al-Khateeb; Magdy Saeb; Mohammed Munther A. Majeed; Mohamed Ridza Wahiddin

Security is the most tedious problem in highly sensitive communications. Quantum security is the key issue in solving the problem. A key distribution protocol based on the use of hash functions is proposed. The essential part of the protocol depends on sending a string of random characters from sender to receiver. Then, a selected hash or a cascade of two hash functions and a long-term shared secret are used to construct the key. Consequently, the session key is generated on-site by independently applying a hash function on the random string at the sender and receiver sides. However, this protocol requires a reliable method of authentication. Therefore, it is further proposed to use an out-of-band authentication methodology based on the deterministic six-state quantum protocol that is referred to as 6DP.


Archive | 2010

Hardware Implementation of the Stone Metamorphic Cipher

Rabie A. Mahmoud; Magdy Saeb


Archive | 2012

A Metamorphic-Enhanced Twofish Block Cipher And Associated FPGA Implementation

Rabie A. Mahmoud; Magdy Saeb


Archive | 2010

Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol

Mohammed Munther A. Majeed; Khalid A. Saeed Al-Khateeb; Mohamed Ridza Wahiddin; Magdy Saeb


Archive | 2010

Hardware Implementation of The Message Digest Procedure MDP-384

Rabie A. Mahmoud; Magdy Saeb


Archive | 2010

A protocol for secret key infusion from satellite transmissions

Mohamed Ridza Wahiddin; Noor Shamila Shanaz; Noor Sham; Magdy Saeb; Mior Hadi; Mior Hamdan


Archive | 2010

A secure key distribution protocol based on hash functions utilizing quantum authentication channel (kdp-6dp)

Mohammed Munther A. Majeed; Khalid A. Saeed Al-Khateeb; Magdy Saeb; Mohamed Ridza Wahiddin


Journal of Computer Science | 2010

Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)

Mohammed Munther A. Majeed; Khalid A. Saeed Al-Khateeb; Mohamed Ridza Wahiddin; Magdy Saeb


Archive | 2010

A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)

Khalid A. Saeed Al-Khateeb; Mohammed Munther A. Majeed; Mohamed Ridza; Magdy Saeb


Archive | 2010

Power-Based Key Hopping (PBKH) and Associated Hardware Implementation

Rabie A. Mahmoud; Magdy Saeb

Collaboration


Dive into the Magdy Saeb's collaboration.

Top Co-Authors

Avatar

Khalid A. Saeed Al-Khateeb

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mohamed Ridza Wahiddin

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mohammed Munther A. Majeed

International Islamic University Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge