nur hafiza zakaria - Academia.edu (original) (raw)

Uploads

Papers by nur hafiza zakaria

Research paper thumbnail of A block cipher based on genetic algorithm

Research paper thumbnail of Modified A5/1 Based Stream Cipher For Secured GSM GSM Communication Communication Communication Communication

A5/1 is the stream cipher algorithm used in GSM communication in order to provide over the air co... more A5/1 is the stream cipher algorithm used in GSM communication in order to provide over the air communication privacy. The objective of this paper is to modify the algorithm of the existing A5/1 stream cipher in order to improve the security of GSM communication. Several statistical tests such as frequency test, serial test, runs test, long runs of ones test, and linear complexity test were used to test the strength of the algorithm. Two proposed modified A5/1 algorithms successfully passed all the basic statistical tests.

Research paper thumbnail of Systematic literature review: Trend analysis on the design of lightweight block cipher

Journal of King Saud University - Computer and Information Sciences

Research paper thumbnail of LAO-3D: A Symmetric Lightweight Block Cipher Based on 3D Permutation for Mobile Encryption Application

Symmetry

Data transmissions between smartphone users require security solutions to protect communications.... more Data transmissions between smartphone users require security solutions to protect communications. Hence, encryption is an important tool that must be associated with smartphones to keep the user’s data safe. One proven solution to enhance the security of encryption algorithms is by using 3D designs on symmetric block ciphers. Although a 3D cipher design could improve the algorithms, the existing methods enlarge the block sizes that will also expand the key sizes and encryption rounds, thus decreasing their efficiency. Therefore, we propose the LAO-3D block cipher using a 3D permutation that offers security by providing confusion and diffusion characteristics. Five security analyses were conducted to assess the strengths of LAO-3D. The findings suggest that LAO-3D achieves better results compared to other existing lightweight block ciphers, with 98.2% non-linearity, 50% bit error rates for both plaintext and key modifications, surpasses 100% of the randomness test, and is immune to d...

Research paper thumbnail of State of the Art Intrusion Detection System for Cloud Computing

International Journal of Communication Networks and Information Security (IJCNIS)

The term Cloud computing is not new anymore in computing technology. This form of computing techn... more The term Cloud computing is not new anymore in computing technology. This form of computing technology previously considered only as marketing term, but today Cloud computing not only provides innovative improvements in resource utilisation but it also creates a new opportunities in data protection mechanisms where the advancement of intrusion detection technologies are blooming rapidly. From the perspective of security, Cloud computing also introduces concerns about data protection and intrusion detection mechanism. This paper surveys, explores and informs researchers about the latest developed Cloud Intrusion Detection Systems by providing a comprehensive taxonomy and investigating possible solutions to detect intrusions in cloud computing systems. As a result, we provide a comprehensive review of Cloud Intrusion Detection System research, while highlighting the specific properties of Cloud Intrusion Detection System. We also present taxonomy on the key issues in Cloud Intrusion ...

Research paper thumbnail of A Theoretical Comparative Analysis of Dna Techniques Used in Dna Based Cryptography

JOURNAL OF SUSTAINABILITY SCIENCE AND MANAGEMENT

Cryptography has been extensively employed in the information security field for the purpose of p... more Cryptography has been extensively employed in the information security field for the purpose of providing security for confidential data. The field of cryptography has recently considered a hybrid cryptographic implementation that combines conventional cryptographic techniques with the knowledge of DNA technologies to formulate what is known as DNA cryptography. DNA based cryptography is considered a branch of sustainability science as it combines transdisciplinary structures from natural sciences (biology) and technological sciences (information security). This paper discusses the various biological DNA techniques that have been implemented in recent DNA cryptographic algorithms. Among them are the Watson-Crick Complementary Rules, DNA Encoding/Decoding Rules, DNA Operation Rules, the Triplet Codon DNA Code, DNA Segmentation, DNA Hybridisation (DNA Annealing) and DNA Transcription and DNA Replication from the Central Dogma Molecular Biology process. A description of the algorithms and a theoretical comparative analysis of these DNA cryptographic algorithms is also presented in this research paper. Comparisons have also been made based on the following parameters: Conventional cryptographic techniques visa -vis the techniques used by DNA cryptographic algorithms, the application of these algorithms, their limitations and a security analysis to see how well DNA cryptography perform as against current conventional cryptography.

Research paper thumbnail of 3D Design for Lightweight S-Box

2022 International Conference on Innovations in Science, Engineering and Technology (ICISET)

Research paper thumbnail of Modifications of Key Schedule Algorithm on RECTANGLE Block Cipher

Communications in Computer and Information Science, 2021

Key schedule algorithm is one of the core elements that significantly affect the security of an e... more Key schedule algorithm is one of the core elements that significantly affect the security of an encryption algorithm. While its importance is undeniable, the key schedule algorithm has not been given comprehensive attention compared to the encryption algorithm. RECTANGLE block cipher is very efficient in terms of encryption speed performance among the existing lightweight algorithms. However, its non-robust round keys generation seems to be the weakest point of the algorithm. A robust key schedule algorithm should produce round keys with random characteristics, independent, and not correlated to one another as defined in the randomization and confusion properties. Therefore, the objective of this paper is to improve the RECTANGLE key schedule algorithm to increase its randomization and confusion properties against high correlation keys as well as the speed and throughput performances. Three experiments were conducted based on the randomness, key sensitivity, and performance tests. The results show that our modified designs have produced lower correlation keys by 0.16% to 0.45% improvement, more random ciphertext with an increase of 13.34% to 20.00% passing rate, and better performance that recorded 1.30% to 7.82% faster and increased by 1.33% to 8.50% throughput than the original RECTANGLE.

Research paper thumbnail of Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT

IEEE Access, 2020

The Internet of Things (IoT) is a broad range of applications enabled by the connection of device... more The Internet of Things (IoT) is a broad range of applications enabled by the connection of devices such as sensors, actuators, and monitors accessible through the Internet. Massive IoT device connectivity and vast data transmission have made the information susceptible to various types of attacks. Therefore, encryption is required for secure communication in an IoT ecosystem. An IoT system is constrained by its complexities that require small computing power. Thus, lightweight block cipher is chosen as the solution to IoT security issues. RECTANGLE block cipher has very efficient encryption speed performance among the existing lightweight algorithms. Although RECTANGLE achieves such high efficiency, lack of focus on its security aspect needs to be addressed. The algorithm is short of confusion and diffusion characteristics that should be offered by a block cipher as one of the cryptographic security properties. Therefore, we extended RECTANGLE using a 3D cipher to improve its security features by enhancing the algorithm confusion and diffusion properties. Security analysis and performance tests were performed to verify the strength of the proposed 3D RECTANGLE. The results show that 3D RECTANGLE performs better than its original version in terms of the correlation between data input and output with an increase of 1.58% for non-linearity results, records approximately 50% bit error rate for sensitiveness against both modifications of plaintext and key, increase of passing rate in the randomness test by 22.22%, and achieves competitive performance results against existing algorithms with 0.9516 ms execution speed and 67.26 bit/ms throughput.

Research paper thumbnail of An Improved AES S-box Based on Fibonacci Numbers and Prime Factor

Int. J. Netw. Secur., 2018

This paper emphasises the study on ways of constructing the substitution boxes (S-boxes). To impr... more This paper emphasises the study on ways of constructing the substitution boxes (S-boxes). To improve the strength of block cipher, a new proposed substitution box for symmetric key cryptography was designed based on Fibonacci numbers and prime factor. This new security approach was designed for better security of block ciphers. The level of security S-box was evaluated based on the cryptographic properties such as balance criteria, nonlinearity, correlation immunity, algebraic degree, transparency order, propagation, number of fixed points and opposite fixed points, algebraic immunity, robustness to differential cryptanalysis, signal to noise ratio (SNR) Differential Power Analysis (DPA) as well as confusion coefficient. The AES S-box and the new proposed S-box were analysed to verify the cryptographical security of the S-box. Result showed that the new proposed S-box using the Fibonacci numbers and prime factor possessed good cryptographic properties compared to the AES S-box.

Research paper thumbnail of Security Analysis Between Static and Dynamic S-Boxes in Block Ciphers

Journal of Information System and Technology Management, 2021

The development of block ciphers has resulted in a number of cryptographic algorithms such as AES... more The development of block ciphers has resulted in a number of cryptographic algorithms such as AES, aria, blowfish256, desl, and 3d-aes. AES is one of the best cryptographic algorithms that can be used to protect electronic data. However, the principal weakness in AES is the linearity in the s-box. The objective of this research is to investigate and evaluate the existing work related to the dynamic s-box. Other than that, the aim of this research is to design a dynamic s-box using affine transformation in order to increase the security of the encryption. The method to design is using java with the NetBeans software. The proposed block cipher will be tested using NIST statistical test suite to test the randomness of the algorithm. Besides, the strength of the s-box will be analyzed using the s-box evaluation tool (set). The cryptographic strength depends strongly on the choice of s-box. Therefore, this new proposed block cipher can be used by countries, organizations, stakeholders, o...

Research paper thumbnail of A block cipher based on genetic algorithm

Research paper thumbnail of Modified A5/1 Based Stream Cipher For Secured GSM GSM Communication Communication Communication Communication

A5/1 is the stream cipher algorithm used in GSM communication in order to provide over the air co... more A5/1 is the stream cipher algorithm used in GSM communication in order to provide over the air communication privacy. The objective of this paper is to modify the algorithm of the existing A5/1 stream cipher in order to improve the security of GSM communication. Several statistical tests such as frequency test, serial test, runs test, long runs of ones test, and linear complexity test were used to test the strength of the algorithm. Two proposed modified A5/1 algorithms successfully passed all the basic statistical tests.

Research paper thumbnail of Systematic literature review: Trend analysis on the design of lightweight block cipher

Journal of King Saud University - Computer and Information Sciences

Research paper thumbnail of LAO-3D: A Symmetric Lightweight Block Cipher Based on 3D Permutation for Mobile Encryption Application

Symmetry

Data transmissions between smartphone users require security solutions to protect communications.... more Data transmissions between smartphone users require security solutions to protect communications. Hence, encryption is an important tool that must be associated with smartphones to keep the user’s data safe. One proven solution to enhance the security of encryption algorithms is by using 3D designs on symmetric block ciphers. Although a 3D cipher design could improve the algorithms, the existing methods enlarge the block sizes that will also expand the key sizes and encryption rounds, thus decreasing their efficiency. Therefore, we propose the LAO-3D block cipher using a 3D permutation that offers security by providing confusion and diffusion characteristics. Five security analyses were conducted to assess the strengths of LAO-3D. The findings suggest that LAO-3D achieves better results compared to other existing lightweight block ciphers, with 98.2% non-linearity, 50% bit error rates for both plaintext and key modifications, surpasses 100% of the randomness test, and is immune to d...

Research paper thumbnail of State of the Art Intrusion Detection System for Cloud Computing

International Journal of Communication Networks and Information Security (IJCNIS)

The term Cloud computing is not new anymore in computing technology. This form of computing techn... more The term Cloud computing is not new anymore in computing technology. This form of computing technology previously considered only as marketing term, but today Cloud computing not only provides innovative improvements in resource utilisation but it also creates a new opportunities in data protection mechanisms where the advancement of intrusion detection technologies are blooming rapidly. From the perspective of security, Cloud computing also introduces concerns about data protection and intrusion detection mechanism. This paper surveys, explores and informs researchers about the latest developed Cloud Intrusion Detection Systems by providing a comprehensive taxonomy and investigating possible solutions to detect intrusions in cloud computing systems. As a result, we provide a comprehensive review of Cloud Intrusion Detection System research, while highlighting the specific properties of Cloud Intrusion Detection System. We also present taxonomy on the key issues in Cloud Intrusion ...

Research paper thumbnail of A Theoretical Comparative Analysis of Dna Techniques Used in Dna Based Cryptography

JOURNAL OF SUSTAINABILITY SCIENCE AND MANAGEMENT

Cryptography has been extensively employed in the information security field for the purpose of p... more Cryptography has been extensively employed in the information security field for the purpose of providing security for confidential data. The field of cryptography has recently considered a hybrid cryptographic implementation that combines conventional cryptographic techniques with the knowledge of DNA technologies to formulate what is known as DNA cryptography. DNA based cryptography is considered a branch of sustainability science as it combines transdisciplinary structures from natural sciences (biology) and technological sciences (information security). This paper discusses the various biological DNA techniques that have been implemented in recent DNA cryptographic algorithms. Among them are the Watson-Crick Complementary Rules, DNA Encoding/Decoding Rules, DNA Operation Rules, the Triplet Codon DNA Code, DNA Segmentation, DNA Hybridisation (DNA Annealing) and DNA Transcription and DNA Replication from the Central Dogma Molecular Biology process. A description of the algorithms and a theoretical comparative analysis of these DNA cryptographic algorithms is also presented in this research paper. Comparisons have also been made based on the following parameters: Conventional cryptographic techniques visa -vis the techniques used by DNA cryptographic algorithms, the application of these algorithms, their limitations and a security analysis to see how well DNA cryptography perform as against current conventional cryptography.

Research paper thumbnail of 3D Design for Lightweight S-Box

2022 International Conference on Innovations in Science, Engineering and Technology (ICISET)

Research paper thumbnail of Modifications of Key Schedule Algorithm on RECTANGLE Block Cipher

Communications in Computer and Information Science, 2021

Key schedule algorithm is one of the core elements that significantly affect the security of an e... more Key schedule algorithm is one of the core elements that significantly affect the security of an encryption algorithm. While its importance is undeniable, the key schedule algorithm has not been given comprehensive attention compared to the encryption algorithm. RECTANGLE block cipher is very efficient in terms of encryption speed performance among the existing lightweight algorithms. However, its non-robust round keys generation seems to be the weakest point of the algorithm. A robust key schedule algorithm should produce round keys with random characteristics, independent, and not correlated to one another as defined in the randomization and confusion properties. Therefore, the objective of this paper is to improve the RECTANGLE key schedule algorithm to increase its randomization and confusion properties against high correlation keys as well as the speed and throughput performances. Three experiments were conducted based on the randomness, key sensitivity, and performance tests. The results show that our modified designs have produced lower correlation keys by 0.16% to 0.45% improvement, more random ciphertext with an increase of 13.34% to 20.00% passing rate, and better performance that recorded 1.30% to 7.82% faster and increased by 1.33% to 8.50% throughput than the original RECTANGLE.

Research paper thumbnail of Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT

IEEE Access, 2020

The Internet of Things (IoT) is a broad range of applications enabled by the connection of device... more The Internet of Things (IoT) is a broad range of applications enabled by the connection of devices such as sensors, actuators, and monitors accessible through the Internet. Massive IoT device connectivity and vast data transmission have made the information susceptible to various types of attacks. Therefore, encryption is required for secure communication in an IoT ecosystem. An IoT system is constrained by its complexities that require small computing power. Thus, lightweight block cipher is chosen as the solution to IoT security issues. RECTANGLE block cipher has very efficient encryption speed performance among the existing lightweight algorithms. Although RECTANGLE achieves such high efficiency, lack of focus on its security aspect needs to be addressed. The algorithm is short of confusion and diffusion characteristics that should be offered by a block cipher as one of the cryptographic security properties. Therefore, we extended RECTANGLE using a 3D cipher to improve its security features by enhancing the algorithm confusion and diffusion properties. Security analysis and performance tests were performed to verify the strength of the proposed 3D RECTANGLE. The results show that 3D RECTANGLE performs better than its original version in terms of the correlation between data input and output with an increase of 1.58% for non-linearity results, records approximately 50% bit error rate for sensitiveness against both modifications of plaintext and key, increase of passing rate in the randomness test by 22.22%, and achieves competitive performance results against existing algorithms with 0.9516 ms execution speed and 67.26 bit/ms throughput.

Research paper thumbnail of An Improved AES S-box Based on Fibonacci Numbers and Prime Factor

Int. J. Netw. Secur., 2018

This paper emphasises the study on ways of constructing the substitution boxes (S-boxes). To impr... more This paper emphasises the study on ways of constructing the substitution boxes (S-boxes). To improve the strength of block cipher, a new proposed substitution box for symmetric key cryptography was designed based on Fibonacci numbers and prime factor. This new security approach was designed for better security of block ciphers. The level of security S-box was evaluated based on the cryptographic properties such as balance criteria, nonlinearity, correlation immunity, algebraic degree, transparency order, propagation, number of fixed points and opposite fixed points, algebraic immunity, robustness to differential cryptanalysis, signal to noise ratio (SNR) Differential Power Analysis (DPA) as well as confusion coefficient. The AES S-box and the new proposed S-box were analysed to verify the cryptographical security of the S-box. Result showed that the new proposed S-box using the Fibonacci numbers and prime factor possessed good cryptographic properties compared to the AES S-box.

Research paper thumbnail of Security Analysis Between Static and Dynamic S-Boxes in Block Ciphers

Journal of Information System and Technology Management, 2021

The development of block ciphers has resulted in a number of cryptographic algorithms such as AES... more The development of block ciphers has resulted in a number of cryptographic algorithms such as AES, aria, blowfish256, desl, and 3d-aes. AES is one of the best cryptographic algorithms that can be used to protect electronic data. However, the principal weakness in AES is the linearity in the s-box. The objective of this research is to investigate and evaluate the existing work related to the dynamic s-box. Other than that, the aim of this research is to design a dynamic s-box using affine transformation in order to increase the security of the encryption. The method to design is using java with the NetBeans software. The proposed block cipher will be tested using NIST statistical test suite to test the randomness of the algorithm. Besides, the strength of the s-box will be analyzed using the s-box evaluation tool (set). The cryptographic strength depends strongly on the choice of s-box. Therefore, this new proposed block cipher can be used by countries, organizations, stakeholders, o...