Ahmad Alfarjat - Academia.edu (original) (raw)

Uploads

Papers by Ahmad Alfarjat

Research paper thumbnail of A Survey over the Security Issues of Bluetooth using Elliptic Curve Cryptography

International Journal of Computer Applications, 2016

In this research paper,the authors are addressing the problem of algorithms for Wireless LAN for ... more In this research paper,the authors are addressing the problem of algorithms for Wireless LAN for Secured Transmission. This research work also proposes an overview of some of the major attacks that Blue tooth has faced over the years along with some possible solutions. The main aim of this research work is to investigate security features of Bluetooth using Elliptic Curve Cryptography(ECC). The ECC is the latest and fastest encryption method which offers stronger security. As it is known that although a vast majority of devices currently now communicates using Bluetooth methodology, the blue tooth security expert provides automatic updates to its security protocol and user privacy protection techniques. Further protection of the device user's personal information becomes the primary aim. The research work also explores the Bucket Brigade Attack on Bluetooth security using Elliptic Curve Cryptography (ECC). Also it is implied that Bucket Brigade Attack(BBA) is one of the amazing solution to the problem of key agreement or key swapping. Further the beauty of this scheme is when two parties who likes to communicate using symmetric key and an Elliptic Curve Cryptography(ECC) an Intruder(Hacker) enters in between a sender and a receiver. This paper is an attempt to

Research paper thumbnail of Investigations on the performance analysis of bluetooth security issues using advanced algorithms

Research paper thumbnail of Implementation of Bluetooth Secure Simple Pairing (SSP) using Elliptic Curve Cryptography (ECC)

In this paper we study the problem of implementation of security issues of blue tooth, especially... more In this paper we study the problem of implementation of security issues of blue tooth, especially secure simple pairing, with the help of an efficient four user authenticated key (4UAK) for an elliptic curve cryptography (ECC). This paper also deals with the design, implement and performance evaluation of secure simple pairing (SSP) using an elliptic curve cryptography, such as Diffie Hellman protocol when four users are involved. Here, we also compute the best, worst and average case step counts (time complexities). This work puts forth an efficient way of providing security in blue tooth. The time complexity of O(n4) is achieved using Rabin Miller Primality methodology. The method also reduces the calculation price and light communication loads.

Research paper thumbnail of A Mathematical Model to the Security Issues of Bluetooth using Elliptic Curve Cryptography

International Journal of Computer Applications, Mar 15, 2017

In this research paper,we are addressing the problem of aalgorithms for Wireless LAN for Secured ... more In this research paper,we are addressing the problem of aalgorithms for Wireless LAN for Secured Transmission. Our research work also proposes an overview of some of the major attacks that Bluetooth has faced over the years along with some possible solutions. The main aim of our research work also investigates security features of Bluetooth using Elliptic Curve Cryptography(ECC). The ECC is the latest and fastest encryption method which offers stronger security. As we know that although a vast majority of devices already currently now communicates using Bluetooth methodology. The Bluetooth security expert provides automatic updates to its security protocol and user privacy protection technique for every security breach so that protection of the device user's personal information becomes the primary aim. The research work also explores the Bucket Brigade Attack on Bluetooth security using Elliptic Curve Cryptography(ECC). As we know that Bucket Brigade Attack(BBA)(MITM)(WITM) is one of the amazing solution to the problem of key agreement or key swapping. The beauty of this scheme is when two parties who likes to communicate using symmetric key and an Elliptic

Research paper thumbnail of Automatic Transliteration Among Indic Scripts Using Code Mapping Formula

European Scientific Journal, Jun 15, 2012

This paper, discuss about developing an Automatic Transliterator which transliterates one Bramhi ... more This paper, discuss about developing an Automatic Transliterator which transliterates one Bramhi origin Indic script to another. This methodology is used specifically to map a text from one writing system to another and does not map the sounds of one language to the best matching script of another language. Here, we have discussed a method of Transliteration by finding out the patterns in Unicode Chart. It is mainly works for the following Indic Scripts: Bangla, Devanagari, Gurumukhi, Gujarati, Kannada, Malayalam, Oriya, Tamil, and Telugu. Each of these Indic Scripts can be interchangeably transliterated.

Research paper thumbnail of A Survey over the Security Issues of Bluetooth using Elliptic Curve Cryptography

International Journal of Computer Applications, 2016

In this research paper,the authors are addressing the problem of algorithms for Wireless LAN for ... more In this research paper,the authors are addressing the problem of algorithms for Wireless LAN for Secured Transmission. This research work also proposes an overview of some of the major attacks that Blue tooth has faced over the years along with some possible solutions. The main aim of this research work is to investigate security features of Bluetooth using Elliptic Curve Cryptography(ECC). The ECC is the latest and fastest encryption method which offers stronger security. As it is known that although a vast majority of devices currently now communicates using Bluetooth methodology, the blue tooth security expert provides automatic updates to its security protocol and user privacy protection techniques. Further protection of the device user's personal information becomes the primary aim. The research work also explores the Bucket Brigade Attack on Bluetooth security using Elliptic Curve Cryptography (ECC). Also it is implied that Bucket Brigade Attack(BBA) is one of the amazing solution to the problem of key agreement or key swapping. Further the beauty of this scheme is when two parties who likes to communicate using symmetric key and an Elliptic Curve Cryptography(ECC) an Intruder(Hacker) enters in between a sender and a receiver. This paper is an attempt to

Research paper thumbnail of Investigations on the performance analysis of bluetooth security issues using advanced algorithms

Research paper thumbnail of Implementation of Bluetooth Secure Simple Pairing (SSP) using Elliptic Curve Cryptography (ECC)

In this paper we study the problem of implementation of security issues of blue tooth, especially... more In this paper we study the problem of implementation of security issues of blue tooth, especially secure simple pairing, with the help of an efficient four user authenticated key (4UAK) for an elliptic curve cryptography (ECC). This paper also deals with the design, implement and performance evaluation of secure simple pairing (SSP) using an elliptic curve cryptography, such as Diffie Hellman protocol when four users are involved. Here, we also compute the best, worst and average case step counts (time complexities). This work puts forth an efficient way of providing security in blue tooth. The time complexity of O(n4) is achieved using Rabin Miller Primality methodology. The method also reduces the calculation price and light communication loads.

Research paper thumbnail of A Mathematical Model to the Security Issues of Bluetooth using Elliptic Curve Cryptography

International Journal of Computer Applications, Mar 15, 2017

In this research paper,we are addressing the problem of aalgorithms for Wireless LAN for Secured ... more In this research paper,we are addressing the problem of aalgorithms for Wireless LAN for Secured Transmission. Our research work also proposes an overview of some of the major attacks that Bluetooth has faced over the years along with some possible solutions. The main aim of our research work also investigates security features of Bluetooth using Elliptic Curve Cryptography(ECC). The ECC is the latest and fastest encryption method which offers stronger security. As we know that although a vast majority of devices already currently now communicates using Bluetooth methodology. The Bluetooth security expert provides automatic updates to its security protocol and user privacy protection technique for every security breach so that protection of the device user's personal information becomes the primary aim. The research work also explores the Bucket Brigade Attack on Bluetooth security using Elliptic Curve Cryptography(ECC). As we know that Bucket Brigade Attack(BBA)(MITM)(WITM) is one of the amazing solution to the problem of key agreement or key swapping. The beauty of this scheme is when two parties who likes to communicate using symmetric key and an Elliptic

Research paper thumbnail of Automatic Transliteration Among Indic Scripts Using Code Mapping Formula

European Scientific Journal, Jun 15, 2012

This paper, discuss about developing an Automatic Transliterator which transliterates one Bramhi ... more This paper, discuss about developing an Automatic Transliterator which transliterates one Bramhi origin Indic script to another. This methodology is used specifically to map a text from one writing system to another and does not map the sounds of one language to the best matching script of another language. Here, we have discussed a method of Transliteration by finding out the patterns in Unicode Chart. It is mainly works for the following Indic Scripts: Bangla, Devanagari, Gurumukhi, Gujarati, Kannada, Malayalam, Oriya, Tamil, and Telugu. Each of these Indic Scripts can be interchangeably transliterated.

Log In