Mansoor Ahmed Khan - Academia.edu (original) (raw)
Uploads
Papers by Mansoor Ahmed Khan
Lecture Notes in Computer Science, 2012
In this paper we present a Walsh spectrum based method derived from the genetic hill climbing alg... more In this paper we present a Walsh spectrum based method derived from the genetic hill climbing algorithm to improve the non-linearity of functions belonging to Carlet-Feng infinite class of Boolean functions, without degrading other cryptographic properties they possess. We implement our modified algorithms to verify the results and also present a comparison of the resultant cryptographic properties with the original functions.
2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2008
IEEE 802.11i Standard offers arguably uncompromised Confidentiality and Integrity Services by uti... more IEEE 802.11i Standard offers arguably uncompromised Confidentiality and Integrity Services by utilizing Advance Encryption Standard in Counter with Cipher Block Chaining Message Authentication Code Protocol (AES CCMP). However the Nonce construction mechanism employed in ...
Information Sciences, 2014
Cryptographically strong Boolean functions play an imperative role in the design of almost every ... more Cryptographically strong Boolean functions play an imperative role in the design of almost every modern symmetric cipher. In this context, the cryptographic properties of Boolean functions, such as non-linearity, algebraic degree, correlation immunity and propagation criteria, are critically considered in the process of designing these ciphers. More recently, with the emergence of algebraic and fast algebraic attacks, algebraic immunity has also been included as an integral property to be considered. As a result, several constructions of Boolean functions with high non-linearity, maximal algebraic degree and optimal algebraic immunity have been devised since then. This paper focuses on some of these constructions and presents two hybrid classes of Boolean functions. The functions constructed within these classes possess maximal algebraic degree for balanced functions, optimal algebraic immunity, high non-linearity and good resistance to algebraic and fast algebraic attacks. A hybrid class of 1-resilient functions has also been proposed that also possesses high algebraic degree, optimal algebraic immunity, high non-linearity and good resistance to algebraic and fast algebraic attacks.
2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08), 2008
Abstract Wireless networks have gained unmatched popularity as compared to the wired network acce... more Abstract Wireless networks have gained unmatched popularity as compared to the wired network access technologies due to expedient deployment, flexibility and low cost. However, the security aspects in wireless local area networks (WLANs) is an active research area. ...
─Wireless networks have gained unmatched popularity as compared to the wired network access techn... more ─Wireless networks have gained unmatched popularity as compared to the wired network access technologies due to expedient deployment, flexibility and low cost. However, the security aspects in Wireless Local Area Networks (WLANs) is an active research area. The inherent security weaknesses of the wireless medium pose a much more stern threat as compared to the wired networks. Even with the ratification of 802.11i, WLANs based on 802.11 Standard remain vulnerable to Denial of Service (DoS) attacks due to unprotected and unauthenticated Management and Control Frames. Different types of defense techniques and protocols have been proposed to counter these threats. These either possess certain deficiencies or have implementation complexities. Moreover, no solution encompassing all DoS attacks based on Management and Control Frames has yet been proposed. The paper proposes a robust solution to effectively counter all Management and Control Frame based DoS attacks by using Pseudo Random Number Based authentication. The mechanism involves replacement of Cyclic Redundancy Checksum 32 (CRC32) in the Frame Check Sequence Field (FCS) with CRC16 and using the spared 16 bits for authentication. The proposed scheme is easily deployable without any implementation complexities and does not require any additional infrastructure or hardware for its employment. Index Terms─Denial of Service (DoS), IEEE 802.11, IEEE 802.11i, Management Frames, Control Frames, Pseudo Random Number.
Lecture Notes in Computer Science, 2012
In this paper we present a Walsh spectrum based method derived from the genetic hill climbing alg... more In this paper we present a Walsh spectrum based method derived from the genetic hill climbing algorithm to improve the non-linearity of functions belonging to Carlet-Feng infinite class of Boolean functions, without degrading other cryptographic properties they possess. We implement our modified algorithms to verify the results and also present a comparison of the resultant cryptographic properties with the original functions.
2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2008
IEEE 802.11i Standard offers arguably uncompromised Confidentiality and Integrity Services by uti... more IEEE 802.11i Standard offers arguably uncompromised Confidentiality and Integrity Services by utilizing Advance Encryption Standard in Counter with Cipher Block Chaining Message Authentication Code Protocol (AES CCMP). However the Nonce construction mechanism employed in ...
Information Sciences, 2014
Cryptographically strong Boolean functions play an imperative role in the design of almost every ... more Cryptographically strong Boolean functions play an imperative role in the design of almost every modern symmetric cipher. In this context, the cryptographic properties of Boolean functions, such as non-linearity, algebraic degree, correlation immunity and propagation criteria, are critically considered in the process of designing these ciphers. More recently, with the emergence of algebraic and fast algebraic attacks, algebraic immunity has also been included as an integral property to be considered. As a result, several constructions of Boolean functions with high non-linearity, maximal algebraic degree and optimal algebraic immunity have been devised since then. This paper focuses on some of these constructions and presents two hybrid classes of Boolean functions. The functions constructed within these classes possess maximal algebraic degree for balanced functions, optimal algebraic immunity, high non-linearity and good resistance to algebraic and fast algebraic attacks. A hybrid class of 1-resilient functions has also been proposed that also possesses high algebraic degree, optimal algebraic immunity, high non-linearity and good resistance to algebraic and fast algebraic attacks.
2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08), 2008
Abstract Wireless networks have gained unmatched popularity as compared to the wired network acce... more Abstract Wireless networks have gained unmatched popularity as compared to the wired network access technologies due to expedient deployment, flexibility and low cost. However, the security aspects in wireless local area networks (WLANs) is an active research area. ...
─Wireless networks have gained unmatched popularity as compared to the wired network access techn... more ─Wireless networks have gained unmatched popularity as compared to the wired network access technologies due to expedient deployment, flexibility and low cost. However, the security aspects in Wireless Local Area Networks (WLANs) is an active research area. The inherent security weaknesses of the wireless medium pose a much more stern threat as compared to the wired networks. Even with the ratification of 802.11i, WLANs based on 802.11 Standard remain vulnerable to Denial of Service (DoS) attacks due to unprotected and unauthenticated Management and Control Frames. Different types of defense techniques and protocols have been proposed to counter these threats. These either possess certain deficiencies or have implementation complexities. Moreover, no solution encompassing all DoS attacks based on Management and Control Frames has yet been proposed. The paper proposes a robust solution to effectively counter all Management and Control Frame based DoS attacks by using Pseudo Random Number Based authentication. The mechanism involves replacement of Cyclic Redundancy Checksum 32 (CRC32) in the Frame Check Sequence Field (FCS) with CRC16 and using the spared 16 bits for authentication. The proposed scheme is easily deployable without any implementation complexities and does not require any additional infrastructure or hardware for its employment. Index Terms─Denial of Service (DoS), IEEE 802.11, IEEE 802.11i, Management Frames, Control Frames, Pseudo Random Number.