Please use this identifier to cite or link to this item: http://studentrepo.iium.edu.my/handle/123456789/5364
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAl-Dabbagh, Sufyan Salim Mahmooden_US
dc.date.accessioned2020-08-20T11:44:23Z-
dc.date.available2020-08-20T11:44:23Z-
dc.date.issued2015-
dc.identifier.urihttp://studentrepo.iium.edu.my/jspui/handle/123456789/5364-
dc.description.abstractAlthough the Advanced Encryption Standard (AES) is an excellent and preferred choice for almost all block cipher applications, it is not suitable for extremely constrained environments such as Radio-Frequency IDentification (RFID) tags and sensor networks. Therefore, the demand for lightweight algorithms is very strong and vital. Lightweight block ciphers are new and important branch of cryptography and they are the best way to secure the information in constrained devices. This research dealt with three problems; First, it is difficult to optimized three factors at same time. Second, there are many researches still trying to find an algorithm that has the highest level of security. Third, there is lack knowledge on key dependent S-box within lightweight algorithms. All these problems solved in three directions. The first direction proposed lightweight block cipher algorithm called OLBCA (Optimized Lightweight Block Cipher Algorithm) that it outperformed PRESENT, which is one of the famous lightweight algorithm through three factors security, performance and cost. The results showed that OLBCA is more secure than PRESENT in terms of (differential cryptanalysis, integral cryptanalysis and boomerang attack). Also, the cost of OLBCA is less than PRESENT and the OLBCA is faster than PRESENT. The second direction proposed another lightweight block cipher algorithm called HISEC (Highest Security lightweight block cipher algorithm). The results showed that HISEC has the higher security than many existing lightweight algorithms especially in the resistance of (differential cryptanalysis, integral cryptanalysis and boomerang attack) while the cost of HISEC still reasonable. The third direction proposed five novel methods for generating key dependent S-box in lightweight block cipher algorithms and we did intensive analysis regarding to the security and cost. To the best of our knowledge, this is the first study that analyse the methods for generating key dependent S-box with lightweight block cipher algorithms.en_US
dc.language.isoenen_US
dc.publisherKuala Lumpur : International Islamic University Malaysia, 2015en_US
dc.rightsCopyright International Islamic University Malaysia
dc.subject.lcshData encryption (Computer science)en_US
dc.subject.lcshSensor networksen_US
dc.subject.lcshRadio frequency identification systemsen_US
dc.subject.lcshCryptographyen_US
dc.titleEnhancement of lightweight block cipher algorithmsen_US
dc.typeDoctoral Thesisen_US
dc.identifier.urlhttps://lib.iium.edu.my/mom/services/mom/document/getFile/227ceZ3K9jTrUHDGfs7jiDgZCraJ9byy20150703095944809-
dc.description.identityt11100340685SufyanSalimen_US
dc.description.identifierThesis : Enhancement of lightweight block cipher algorithms /by Sufyan Salim Mahmood Al-Dabbaghen_US
dc.description.kulliyahKulliyyah of Information and Communication Technologyen_US
dc.description.programmeDoctor of Philosophy (Information Technology)en_US
dc.description.degreelevelDoctoralen_US
dc.description.callnumbert QA 76.9 A25 A316E 2015en_US
dc.description.notesThesis (Ph.D)--International Islamic University Malaysia, 2015en_US
dc.description.physicaldescriptionxviiii, 186 leaves : ill. ; 30cm.en_US
item.openairetypeDoctoral Thesis-
item.grantfulltextopen-
item.fulltextWith Fulltext-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
Appears in Collections:KICT Thesis
Files in This Item:
File Description SizeFormat 
t11100340685SufyanSalim_SEC_24.pdf24 pages file537.97 kBAdobe PDFView/Open
t11100340685SufyanSalim_SEC.pdf
  Restricted Access
Full text secured file3.27 MBAdobe PDFView/Open    Request a copy
Show simple item record

Page view(s)

12
checked on May 20, 2021

Download(s)

12
checked on May 20, 2021

Google ScholarTM

Check


Items in this repository are protected by copyright, with all rights reserved, unless otherwise indicated. Please give due acknowledgement and credits to the original authors and IIUM where applicable. No items shall be used for commercialization purposes except with written consent from the author.