Md. Shamim Hossain Biswas - Academia.edu (original) (raw)
Papers by Md. Shamim Hossain Biswas
International Journal of Scientific & Engineering Research, 2019
The research paper aims to overcome the ambiguity of the Michael O. Rabin Cryptosystem. Because t... more The research paper aims to overcome the ambiguity of the Michael O. Rabin Cryptosystem. Because the Rabin cryptosystem often generates the same ciphertext from different plaintexts and multiple plaintexts from a single ciphertext, this problem arises from modular reduction arithmetic. Separating a particular encrypted text from the same type of cyphertext generated from different plaintexts is a bit cumbersome. A researcher might ask: How do I distinguish a specific ciphertext when several plaintexts produce the identical ciphertext? This paper introduces a new mathematical model that generates a unique cryptographic text for each plaintext to address the question. This mathematical model is a symmetric cipher because it can encrypt and decrypt messages with a symmetric key. The model consists of three algorithms: key generation, encryption, and decryption. The shared-secret key generation process uses the Diffie-Hellman key exchange protocol. The encryption depends on the floor value of the quadratic quotient and the quadratic residue. The decryption relies on computing the absolute value of the square root of an expression that multiplies the key with the floor value of the quadratic quotient and adds the quadratic residue. The advantage of the proposed model is that the intended receiver gets only one plain value, distinguishing the ciphertext against the plaintext. The idea came to mind when reviewing Michael O. Rabin's Cryptosystem. In this research, I utilized computational and exploratory research approaches. I used a focus group discussion, an online survey, and a review of the literature to gather data. The research population consisted of university students and academic professors.
International Journal of Scientific & Engineering Research, 2019
This research paper aims to attach a signature scheme that enables signature generation and verif... more This research paper aims to attach a signature scheme that enables signature generation and verification to a well-defined cryptosystem. So, the new system combines key generation, encryption, signature generation, signature verification, and decryption algorithms. The Michael O. Rabin signature scheme uses random padding to validate signatures. Analogously, the proposed cryptographic technique utilizes the same padding system and additional components, such as quadratic residue plus the floor value of the quadratic quotient. The only difference is that Michael O. Rabin's signature may double or triple in some cases, whereas the proposed model uses a four-tuple signature system. The Michael O. Rabin cryptosystem's ability to produce multiple plaintexts from a single ciphertext and identical ciphertexts from distinct plaintexts is one of its potential ambiguities. To address this issue, I constructed a cryptosystem proposing a mathematical solution. Specifically, I created a mathematical model to distinguish identical encrypted text generated from different plaintexts in the Michael O. Rabin cryptosystem. However, that model lacked an authentication mechanism to verify the authenticity of the sender and the message, as it had no signature scheme. The proposed crypto-intensive technique uses a two-time security key by slightly altering the Diffie-Hellman key exchange protocol. Through a signature verification mechanism of the suggested method, the intended recipient can recover the original plaintext, and the sender has the advantage of using the encrypted text to create a signature. The above-mentioned cryptographic technique provides secure protection against man-in-the-middle attacks. It is unforgeable, whereas Rabin’s signature is forgeable in a forgery attack. By the way, the initial research initiative was to review different cryptosystem construction techniques and signature schemes and then apply those mathematical concepts to construct an effective cryptographic technique. This research begins with an exploratory research approach and ends with a computational research method. I utilized data collection methods such as conducting a literature review, employing critical thinking strategies, solving various computational math problems, and facilitating focus group discussions. The research population includes academic professors and graduate students.
International Journal of Scientific and Research Publications (IJSRP), 2021
The aim of this research was to investigate students' writing problem among tertiary level studen... more The aim of this research was to investigate students' writing problem among tertiary level students of DEML (Department of English and modern language) at NSU-One of the leading private universities in Bangladesh. A mixed method research approach was applied: qualitative and quantitative. A survey questionnaire, focus group discussion, and an interview protocol were designed for collecting data. The population of this research were tertiary level students and from where 20 students were selected as a sample of quantitative data collection and in qualitative data collection, 10 students were participated on online interview and at digital focus group discussion. The questionnaire consists of 52 survey questions, 30 interview questions, and 10 themes for group discussion. The survey questions consist of 13 type's problems with 5 alternative answers. SPSS (Statistics package for social science) was used to analyze the data. Writing problems were categorized into two main types: Mechanical problem and Rhetorical problem. Research revealed that students face 13 types of writing problems in total: 5 types writing problems in mechanical grammar and 8 types writing problems in rhetorical grammar. The overall mean of tertiary level students' writing problems was (X=3.74038) that leveled as "low problem". It was observed that university students' problems in punctuation were (X=3.4875), problems in purpose (X=3.2625), problems in audience(X= 3.225). All the four categories are leveled as 'Medium' for university students. All other problems were leveled as 'low problems'. It means students did not have too many problems in terms of using mechanical grammar and rhetorical grammar in their writing. Index Terms-mechanical grammar, rhetorical grammar, L2 writing problems, qualitative research, quantitative research, mixed method research, statistical data analysis, thematic data analysis, inductive coding, mean score, SPSS I. INTRODUCTION nglish language is an excellent instrument for scientific communication. It is an international communicative language. If anyone wants to contribute their ideas among global scholars, he or she needs to have expertise in English language. One of the aims of learning English as a L2 is to develop a global communication skill. English language consists of four skills: Listening, speaking. Reading, and writing. Writing is one of the most complicated skills. It is an essential skill for both teacher and students. A good writing comes from prewriting, writing, and rewriting habits (Bonjour & Manuel, 2016). Writing is a process and it is considered a productive skill that is the most difficult task for students to communicate and ESL students face difficulty to earn this ability to become proficient in writing (Chamba et al., 2019). Writing is not a gift but learned skill; this communication competence can be acquired by engaging academic writing activities. Writing skill is related to extensive reading. Many things need to be done in order to achieve writing skill and one of them is critical thinking about mechanical-grammar and rhetorical-grammar. These grammatical aspects are required for effective English writing. Grammar makes writing more meaningful and more readable (Johnson, 1996). Writing is thought to be the creative and intellectual property of an educated person, compared to other three language skills. Academic writings are categorized into four types: persuasive, descriptive, critical, and analytical writing. Besides those some other types of writings are narrative, persuasive, scientific, expository, scientific, and technical writing. It is a difficult task for learners to achieve competency in all areas of writing. This study was conducted only for identifying academic writing difficulties among tertiary level students of NSU (North South University) in Bangladesh. This is not a new investigation, but many researchers also have a deep interest in conducting repetitive research in this topic in order to identify a genuine figure for L2 writing problems. The motivation of conducting the research in this topic is none of them 100% perfect. Many tertiary level students have been facing L2 writing problems. That is why it is urgent to find problems and design plans to solve writing problems accordingly. The purpose of this research is to identify the causes of writing problems and to be aware of student's writing problems. The importance of this research in Bangladeshi academic context is immense. Most of the tertiary level students in our country come from various streams like science, commerce, and engineering. These students take English course as an elective one. As a result they E
International Journal of Scientific and Research Publications (ISSN 2250-3153), 2024
The research aimed to investigate and reveal the construction mechanism of a component-based nonl... more The research aimed to investigate and reveal the construction mechanism of a component-based nonlinear S-box (substitution box). The S-box operates within a Boolean space, performing substitution through nonlinear mapping between input and output vectors to enhance confusion in the encryption process. The proposed nonlinear S-box (vectorial Boolean function) can be straight, compressible, and expandable when utilized in modern block ciphers. To engage the attention of scientific readers, this article explains how to construct a component-based nonlinear S-box using the n-variable affine, linear, and nonlinear Boolean functions. In essence, this procedure alludes to an action of the S-box, which is a mathematical function. The primary motivation for conducting this research was to review several existing S-box construction techniques and apply innovative ideas mathematically to construct a new S-box. The study employed both computational and exploratory research methods. The data collection methods included conducting a literature review, using critical thinking strategies, and facilitating focus group discussions to capture the mathematical notion underlying the nonlinear S-box construction technique. The research population included graduate and doctoral students as well as academic professors from Novosibirsk State University.
International Journal of Scientific and Research Publications (IJSRP), Jan 16, 2020
I hereby declare that this research monograph becomes the property of Md. Shamim Hossain Biswas a... more I hereby declare that this research monograph becomes the property of Md. Shamim Hossain Biswas and to be placed at the worldwide database access library for future cryptographic researchers and also be available Online. Md. Shamim Hossain Biswas is the owner of this Monograph and own all copyrights of the Work. IJSRP acts as publishing partner and author will remain owner of the content. Copyright©2020, All Rights Reserved No part of this Monograph may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as described below, without the permission in writing of the Author & publisher. Copying of content is not permitted except for personal and internal use, to the extent permitted by national copyright law, or under the terms of a license issued by the national Reproduction Rights Organization.
International Journal of Scientific and Research Publications (IJSRP)
The cryptography is the branch of Cryptology. It is a combination of mathematics and computer Sci... more The cryptography is the branch of Cryptology. It is a combination of mathematics and computer Science. It is the study of obscuring information in cyberspace. Cipher is a set of algorithm which comprise of encryption and decryption. The cipher paly important role in modern technology. The technologies involving communication including the Internet, Mobile Phones, Digital Television, and ATM machine rely on cipher in order to maintain security and privacy. Thinking about aforesaid importance of cipher in cryptography, in this article, we have designed a smallest cipher which may be efficient in RFID chips. The smallest cipher has been comprised of five mathematical operation: Exponentiation, Multiplication, Addition, Subtraction and Division based on systematic study of classical cipher. The proposed cipher is a keyless cipher, but it is very efficient in secret information passing.
Thesis Chapters by Md. Shamim Hossain Biswas
IJSER, 2008
This thesis deals with the investigation of transmission control protocol (TCP) performance in no... more This thesis deals with the investigation of transmission control protocol (TCP) performance in non-wire
line (Cellular Mobile System) environments. TCP Congestion Control analysis has been analyzed in
Java Programming Language. The congestion control has been simulated in Java programming
language environment and it also investigates of the effects of combining forward error correction
(FEC) with TCP in simulation environment of Java. FEC reduces the number of retransmissions and
shows better congestion control behavior, which can effectively run the network at a higher load. In
TCP/IP Protocol Architecture, TCP provides reliable end-to-end communication. Traditional TCP
implementations are tuned to work well over wired networks. A packet loss is occurred in a wired
network mainly due to network congestion. On the other hand in a wireless link packet losses are
caused mainly due to bit errors resulted from noise, interference, and various kind of fading. TCP has
no idea whether a packet loss is caused by congestion or bit error. TCP assumes loss is caused by
congestion and turns on its congestion control algorithms to slow down the amount of data it transmits.
So invoking congestion control algorithm for bit errors of wireless channel reduces TCP throughput
drastically. Proposal of this thesis is to analysis congestion/packet loss. FEC means adding some
redundancy information along with data that means this redundancy will consume some portion of
the available bandwidth. But using FEC reduces the number of retransmission at TCP level and thus
preserves time to send more data. As a result overall performance may be increased. By simulation in
Java Programming Language and in Windows Environment the comparison between various TCP
versions is done and it is demonstrated that in certain cases performance of accurate data transmission
can be increased significantl
International Journal of Scientific & Engineering Research, 2019
The research paper aims to overcome the ambiguity of the Michael O. Rabin Cryptosystem. Because t... more The research paper aims to overcome the ambiguity of the Michael O. Rabin Cryptosystem. Because the Rabin cryptosystem often generates the same ciphertext from different plaintexts and multiple plaintexts from a single ciphertext, this problem arises from modular reduction arithmetic. Separating a particular encrypted text from the same type of cyphertext generated from different plaintexts is a bit cumbersome. A researcher might ask: How do I distinguish a specific ciphertext when several plaintexts produce the identical ciphertext? This paper introduces a new mathematical model that generates a unique cryptographic text for each plaintext to address the question. This mathematical model is a symmetric cipher because it can encrypt and decrypt messages with a symmetric key. The model consists of three algorithms: key generation, encryption, and decryption. The shared-secret key generation process uses the Diffie-Hellman key exchange protocol. The encryption depends on the floor value of the quadratic quotient and the quadratic residue. The decryption relies on computing the absolute value of the square root of an expression that multiplies the key with the floor value of the quadratic quotient and adds the quadratic residue. The advantage of the proposed model is that the intended receiver gets only one plain value, distinguishing the ciphertext against the plaintext. The idea came to mind when reviewing Michael O. Rabin's Cryptosystem. In this research, I utilized computational and exploratory research approaches. I used a focus group discussion, an online survey, and a review of the literature to gather data. The research population consisted of university students and academic professors.
International Journal of Scientific & Engineering Research, 2019
This research paper aims to attach a signature scheme that enables signature generation and verif... more This research paper aims to attach a signature scheme that enables signature generation and verification to a well-defined cryptosystem. So, the new system combines key generation, encryption, signature generation, signature verification, and decryption algorithms. The Michael O. Rabin signature scheme uses random padding to validate signatures. Analogously, the proposed cryptographic technique utilizes the same padding system and additional components, such as quadratic residue plus the floor value of the quadratic quotient. The only difference is that Michael O. Rabin's signature may double or triple in some cases, whereas the proposed model uses a four-tuple signature system. The Michael O. Rabin cryptosystem's ability to produce multiple plaintexts from a single ciphertext and identical ciphertexts from distinct plaintexts is one of its potential ambiguities. To address this issue, I constructed a cryptosystem proposing a mathematical solution. Specifically, I created a mathematical model to distinguish identical encrypted text generated from different plaintexts in the Michael O. Rabin cryptosystem. However, that model lacked an authentication mechanism to verify the authenticity of the sender and the message, as it had no signature scheme. The proposed crypto-intensive technique uses a two-time security key by slightly altering the Diffie-Hellman key exchange protocol. Through a signature verification mechanism of the suggested method, the intended recipient can recover the original plaintext, and the sender has the advantage of using the encrypted text to create a signature. The above-mentioned cryptographic technique provides secure protection against man-in-the-middle attacks. It is unforgeable, whereas Rabin’s signature is forgeable in a forgery attack. By the way, the initial research initiative was to review different cryptosystem construction techniques and signature schemes and then apply those mathematical concepts to construct an effective cryptographic technique. This research begins with an exploratory research approach and ends with a computational research method. I utilized data collection methods such as conducting a literature review, employing critical thinking strategies, solving various computational math problems, and facilitating focus group discussions. The research population includes academic professors and graduate students.
International Journal of Scientific and Research Publications (IJSRP), 2021
The aim of this research was to investigate students' writing problem among tertiary level studen... more The aim of this research was to investigate students' writing problem among tertiary level students of DEML (Department of English and modern language) at NSU-One of the leading private universities in Bangladesh. A mixed method research approach was applied: qualitative and quantitative. A survey questionnaire, focus group discussion, and an interview protocol were designed for collecting data. The population of this research were tertiary level students and from where 20 students were selected as a sample of quantitative data collection and in qualitative data collection, 10 students were participated on online interview and at digital focus group discussion. The questionnaire consists of 52 survey questions, 30 interview questions, and 10 themes for group discussion. The survey questions consist of 13 type's problems with 5 alternative answers. SPSS (Statistics package for social science) was used to analyze the data. Writing problems were categorized into two main types: Mechanical problem and Rhetorical problem. Research revealed that students face 13 types of writing problems in total: 5 types writing problems in mechanical grammar and 8 types writing problems in rhetorical grammar. The overall mean of tertiary level students' writing problems was (X=3.74038) that leveled as "low problem". It was observed that university students' problems in punctuation were (X=3.4875), problems in purpose (X=3.2625), problems in audience(X= 3.225). All the four categories are leveled as 'Medium' for university students. All other problems were leveled as 'low problems'. It means students did not have too many problems in terms of using mechanical grammar and rhetorical grammar in their writing. Index Terms-mechanical grammar, rhetorical grammar, L2 writing problems, qualitative research, quantitative research, mixed method research, statistical data analysis, thematic data analysis, inductive coding, mean score, SPSS I. INTRODUCTION nglish language is an excellent instrument for scientific communication. It is an international communicative language. If anyone wants to contribute their ideas among global scholars, he or she needs to have expertise in English language. One of the aims of learning English as a L2 is to develop a global communication skill. English language consists of four skills: Listening, speaking. Reading, and writing. Writing is one of the most complicated skills. It is an essential skill for both teacher and students. A good writing comes from prewriting, writing, and rewriting habits (Bonjour & Manuel, 2016). Writing is a process and it is considered a productive skill that is the most difficult task for students to communicate and ESL students face difficulty to earn this ability to become proficient in writing (Chamba et al., 2019). Writing is not a gift but learned skill; this communication competence can be acquired by engaging academic writing activities. Writing skill is related to extensive reading. Many things need to be done in order to achieve writing skill and one of them is critical thinking about mechanical-grammar and rhetorical-grammar. These grammatical aspects are required for effective English writing. Grammar makes writing more meaningful and more readable (Johnson, 1996). Writing is thought to be the creative and intellectual property of an educated person, compared to other three language skills. Academic writings are categorized into four types: persuasive, descriptive, critical, and analytical writing. Besides those some other types of writings are narrative, persuasive, scientific, expository, scientific, and technical writing. It is a difficult task for learners to achieve competency in all areas of writing. This study was conducted only for identifying academic writing difficulties among tertiary level students of NSU (North South University) in Bangladesh. This is not a new investigation, but many researchers also have a deep interest in conducting repetitive research in this topic in order to identify a genuine figure for L2 writing problems. The motivation of conducting the research in this topic is none of them 100% perfect. Many tertiary level students have been facing L2 writing problems. That is why it is urgent to find problems and design plans to solve writing problems accordingly. The purpose of this research is to identify the causes of writing problems and to be aware of student's writing problems. The importance of this research in Bangladeshi academic context is immense. Most of the tertiary level students in our country come from various streams like science, commerce, and engineering. These students take English course as an elective one. As a result they E
International Journal of Scientific and Research Publications (ISSN 2250-3153), 2024
The research aimed to investigate and reveal the construction mechanism of a component-based nonl... more The research aimed to investigate and reveal the construction mechanism of a component-based nonlinear S-box (substitution box). The S-box operates within a Boolean space, performing substitution through nonlinear mapping between input and output vectors to enhance confusion in the encryption process. The proposed nonlinear S-box (vectorial Boolean function) can be straight, compressible, and expandable when utilized in modern block ciphers. To engage the attention of scientific readers, this article explains how to construct a component-based nonlinear S-box using the n-variable affine, linear, and nonlinear Boolean functions. In essence, this procedure alludes to an action of the S-box, which is a mathematical function. The primary motivation for conducting this research was to review several existing S-box construction techniques and apply innovative ideas mathematically to construct a new S-box. The study employed both computational and exploratory research methods. The data collection methods included conducting a literature review, using critical thinking strategies, and facilitating focus group discussions to capture the mathematical notion underlying the nonlinear S-box construction technique. The research population included graduate and doctoral students as well as academic professors from Novosibirsk State University.
International Journal of Scientific and Research Publications (IJSRP), Jan 16, 2020
I hereby declare that this research monograph becomes the property of Md. Shamim Hossain Biswas a... more I hereby declare that this research monograph becomes the property of Md. Shamim Hossain Biswas and to be placed at the worldwide database access library for future cryptographic researchers and also be available Online. Md. Shamim Hossain Biswas is the owner of this Monograph and own all copyrights of the Work. IJSRP acts as publishing partner and author will remain owner of the content. Copyright©2020, All Rights Reserved No part of this Monograph may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as described below, without the permission in writing of the Author & publisher. Copying of content is not permitted except for personal and internal use, to the extent permitted by national copyright law, or under the terms of a license issued by the national Reproduction Rights Organization.
International Journal of Scientific and Research Publications (IJSRP)
The cryptography is the branch of Cryptology. It is a combination of mathematics and computer Sci... more The cryptography is the branch of Cryptology. It is a combination of mathematics and computer Science. It is the study of obscuring information in cyberspace. Cipher is a set of algorithm which comprise of encryption and decryption. The cipher paly important role in modern technology. The technologies involving communication including the Internet, Mobile Phones, Digital Television, and ATM machine rely on cipher in order to maintain security and privacy. Thinking about aforesaid importance of cipher in cryptography, in this article, we have designed a smallest cipher which may be efficient in RFID chips. The smallest cipher has been comprised of five mathematical operation: Exponentiation, Multiplication, Addition, Subtraction and Division based on systematic study of classical cipher. The proposed cipher is a keyless cipher, but it is very efficient in secret information passing.
IJSER, 2008
This thesis deals with the investigation of transmission control protocol (TCP) performance in no... more This thesis deals with the investigation of transmission control protocol (TCP) performance in non-wire
line (Cellular Mobile System) environments. TCP Congestion Control analysis has been analyzed in
Java Programming Language. The congestion control has been simulated in Java programming
language environment and it also investigates of the effects of combining forward error correction
(FEC) with TCP in simulation environment of Java. FEC reduces the number of retransmissions and
shows better congestion control behavior, which can effectively run the network at a higher load. In
TCP/IP Protocol Architecture, TCP provides reliable end-to-end communication. Traditional TCP
implementations are tuned to work well over wired networks. A packet loss is occurred in a wired
network mainly due to network congestion. On the other hand in a wireless link packet losses are
caused mainly due to bit errors resulted from noise, interference, and various kind of fading. TCP has
no idea whether a packet loss is caused by congestion or bit error. TCP assumes loss is caused by
congestion and turns on its congestion control algorithms to slow down the amount of data it transmits.
So invoking congestion control algorithm for bit errors of wireless channel reduces TCP throughput
drastically. Proposal of this thesis is to analysis congestion/packet loss. FEC means adding some
redundancy information along with data that means this redundancy will consume some portion of
the available bandwidth. But using FEC reduces the number of retransmission at TCP level and thus
preserves time to send more data. As a result overall performance may be increased. By simulation in
Java Programming Language and in Windows Environment the comparison between various TCP
versions is done and it is demonstrated that in certain cases performance of accurate data transmission
can be increased significantl