Browsing by Author "Azni Haslizan Ab Halim"
Now showing 1 - 6 of 6
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication Enhancing Cyber-attacks Awareness Via Mobile Gamification Techniques(Asian Scholars Network, 2022) ;Sakinah Ali Pitchay ;Anis Syahira Suhaimi ;Najwa Hayaati Mohd Alwi ;Farida RidzuanAzni Haslizan Ab HalimNowadays, the changes in online behavior make data privacy extremely relevant which requires a suitable approach for raising cyber-attacks awareness. Every generation is constantly relying on the cyber world to run their life and they often are lacking in knowledge on security, which exposes them to attackers. Gamification techniques is chosen to be implemented in this research as the use of gamification are increasingly used in education to improve learner’s motivation and engagement. This research introduces a cyber-attacks awareness via mobile gamification techniques known as CYBERPOLY. This quiz-based game combined with the board game concept assists in increasing cyber-attacks awareness and reduces the incidents report and victim risk of any cyber traps. CYBERPOLY promotes Naqli (Revealed knowledge) and Aqli (Rational knowledge) (iNAQ) via board game where users can learn a few Arabic terms that are related to Muslim life such as Tawakkal (hibah, infaq, waqaf, qard, sedeqah), Ta’alim, Iktikaf, Muhasabah. CYBERPOLY offers password complexity indicator feature while offering portability, accessibility, off-line service (anytime, anywhere) and fun learning. It provides four levels of interactive quiz which are beginner, moderate, advanced, and professional that implement the Bloom’s Taxonomy keyword for more effective learning process. The user will be rewarded with score by earning their own money via security awareness quiz that will be used later as their initial salary to begin the board game. The game will end when the player’s money balance reached negative. Thus, this game is mainly developed to educate netizen about cyber-attacks in fun and interactive. Based on the end user feedbacks of functional testing and security authentication, the results show that CYBERPOLY has huge potential as an education tool on cultivating cyber-attacks awareness for digital society. For future planning, the additional scope can be expanded by creating more quiz questions according to specific cyberattack topics, add multiplayer game mode, made available for the iOS platform and save the game result for monitoring the learning performance of each user. - Some of the metrics are blocked by yourconsent settings
Publication Security Analysis Between Static And Dynamic S-boxes In Block Ciphers(Global Academic Excellence, 2019) ;Nur Hafiza Zakaria ;Azuan Ahmad ;Azni Haslizan Ab HalimFarida Hazwani Mohd RidzuanThe development of block ciphers has resulted in a number of cryptographic algorithms such as AES, aria, blowfish256, desl, and 3d-aes. AES is one of the best cryptographic algorithms that can be used to protect electronic data. However, the principal weakness in AES is the linearity in the s-box. The objective of this research is to investigate and evaluate the existing work related to the dynamic s-box. Other than that, the aim of this research is to design a dynamic s-box using affine transformation in order to increase the security of the encryption. The method to design is using java with the NetBeans software. The proposed block cipher will be tested using NIST statistical test suite to test the randomness of the algorithm. Besides, the strength of the s-box will be analyzed using the s-box evaluation tool (set). The cryptographic strength depends strongly on the choice of s-box. Therefore, this new proposed block cipher can be used by countries, organizations, stakeholders, or interested parties as one of the secure algorithms to increase the protection of the information and also will contribute as an alternative to other cryptographic algorithms in computer security research. - Some of the metrics are blocked by yourconsent settings
Publication Substitution Box Design Based From Symmetric Group Composition(IOP Publishing Ltd, 2019) ;Muhammad Fahim Roslan ;Kamaruzzaman Seman ;Azni Haslizan Ab HalimM Norazizi Sham Mohd SayutiThis work shows a new design of substitution box (S-Box) construction for the implementation in the block cipher. The S-Box is the only component in block cipher such as advanced encryption standard (AES) that possess the nonlinearity characteristics. Hence, it is crucial to properly design so that it able resist the cipher against known attack such as linear and differential attacks. Thee construction is based on composition of permutation within the symmetric group. This paper focus on the AES S-Box class which received 8-bit input and produced 8-bit output. This bijective S-Box consist of 256 elements which later involve in the process of composition. Initially, a set of 30 S-Box with high nonlinearity is generated using 30 irreducible polynomials under the finite field GF(28). These S-Box is then undergoing two rounds of composition which finally yield about 1.62 million S-Box. More than half of the generated S-Box achieve the nonlinearity of at least 100 with the maximum recorded nonlinearity of 110. This method also guarantee that the generated S-Box is bijective. To show the security level of our construction method, a comparison to other constriction methods is conducted. The methods introduced in this paper have slightly higher nonlinearity compared to several construction with the value of differential uniformity not on the par as AES however comparable to other similar heuristic construction. - Some of the metrics are blocked by yourconsent settings
Publication Systematic Literature Review for Lightweight Authentication Algorithm in the Iot(Penerbit UMT, 2022) ;Sakiinah Altaf Hussain ;Azni Haslizan Ab HalimNajwa Hayaati Mohd AlwiThe Internet of Things (IoT) being a promising technology of the future is expected to generate a tremendous amount of data that may be exposed to security flaws. Hence, to protect IoT applications from hackers, lightweight cryptography has been identified as one of the suitable mechanisms since it is designed to fulfil security demands in resource-constrained hardware and software. This paper aims to analyse the current security requirements in designing lightweight cryptography for IoT applications, specifically for integrity and authentication algorithms. There are three objectives to focus on: Determine the current state of integrity and authentication research, investigate the integrity and authentication requirements, and analyse the lightweight authentication algorithm currently used. The Kitchenham systematic review method was adopted using a four-step process. The selected articles in this study were retrieved from four reputable databases and 57 of them were deemed suitable for analysis after meeting the selection criteria. From this systematic literature review, it was discovered that there were three active research focuses on the IoT. The research focuses were mostly on cyberattacks against IoT applications, system security requirements and algorithms for lightweight authentication. Furthermore, the analysis also revealed the convergence of lightweight authentication algorithms to ensure the future sustainability of applications. This study may provide researchers with a reference in designing lightweight authentication algorithms to achieve the desired security requirements for sustainable security management in IoT. - Some of the metrics are blocked by yourconsent settings
Publication A Systematic Literature Review On Lightweight Secured S-box Design For Mhealth Applications(UNISEL, 2021) ;Nur Hafiza Zakaria ;Azni Haslizan Ab HalimTasnuva AliThe process of designing powerful and secured S-Boxes is becoming an essential constituent in the field of modern cryptography. Different S-Box designs have been proposed to make it more suitable for IoT, mHealth and WBAN applications but proper implementation is still deficient for their design complexity. In this paper, major criteria of S-Boxes for mHealth systems were conducted following a systematic literature review process and required findings were outlined. The paper also demonstrates the current designs in different areas like security, low power and less memory to find out the challenges and opportunities for designing a new S-Box in modern mHealth applications. Finally, the SLR also gives a research direction to choose major design properties of new S-Boxes for mHealth as well as IoT applications. After evaluating the result, this paper also suggested a composite S-Box with the 3D design based on rotation, shifting and Galois Field 24 to (22)2 pipelining structures for less memory, power and secured applications. Thus, the intimation of Systematic Literature Review (SLR) is to give a clear concept to future researchers in the area of composite 3D S- Box design in terms of security in mHealth applications. - Some of the metrics are blocked by yourconsent settings
Publication A Theoretical Comparative Analysis Of Dna Techniques Used In Dna Based Cryptography(Penerbit UMT, 2022) ;Nik Azura Nik Abdullah ;Nur Hafiza Zakaria ;Azni Haslizan Ab Halim ;Farida Hazwani Mohd Ridzuan ;Azuan Ahmad ;Kamaruzzaman SemanSuriyani AriffinCryptography has been extensively employed in the information security field for the purpose of providing security for confidential data. The field of cryptography has recently considered a hybrid cryptographic implementation that combines conventional cryptographic techniques with the knowledge of DNA technologies to formulate what is known as DNA cryptography. DNA based cryptography is considered a branch of sustainability science as it combines transdisciplinary structures from natural sciences (biology) and technological sciences (information security). This paper discusses the various biological DNA techniques that have been implemented in recent DNA cryptographic algorithms. Among them are the Watson-Crick Complementary Rules, DNA Encoding/Decoding Rules, DNA Operation Rules, the Triplet Codon DNA Code, DNA Segmentation, DNA Hybridisation (DNA Annealing) and DNA Transcription and DNA Replication from the Central Dogma Molecular Biology process. A description of the algorithms and a theoretical comparative analysis of these DNA cryptographic algorithms is also presented in this research paper. Comparisons have also been made based on the following parameters: Conventional cryptographic techniques vis-a-vis the techniques used by DNA cryptographic algorithms, the application of these algorithms, their limitations and a security analysis to see how well DNA cryptography perform as against current conventional cryptography.