Browsing by Author "Nur Izura Udzir"
Now showing 1 - 3 of 3
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication Designing New Block Cipher Based On Genetic Algorithm Approach(International Journal of Computer Science and Information Security, 2015) ;Nur Hafiza Binti Zakaria ;Ramlan Mahmod ;Nur Izura Udzir ;Zuriati Ahmad ZukarnainSuriyani AriffinThe development of block cipher have resulted in a number of cryptographic algorithms such as FOX, BC2, HIGHT, KLEIN, KAMFEE, KAMKAR, ARIA, BLOWFISH256, DESL, REBC2, DSDP, 3D-AES and many more. As time goes by, the evolvement of technology will also contribute towards the development of new block ciphers. Although there have been so much evolvement of the block cipher, the country still needs another block cipher as long as the cipher is secured and met all the security requirements. Other than that, recent advances in the cryptanalysis field motivate new designs. To satisfy the information security requirements and to enhance the information security, we need secured communication and data which can be attained by encrypting the data. In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. The study identifies the similarity elements and highlights the essential computation elements, namely crossover and mutation that generate idea to computational model. It can be applied in designing a new block cipher that fulfils Shanon�s confusion and diffusion properties. The structure of the components has a fixed block size which is 128 bits and a key size of 128 bits. There are three functions for each encryption process which are substitution function, crossover and mutation function and add round key function. In this research also, the algorithm has been tested with NIST Statistical Test suite to evaluate the randomness of the output. Based on the results, it is proven that the new proposed block cipher algorithm has successfully passed all the security requirements needed. Therefore, this new proposed block cipher can be used by countries, organizations, stakeholders or interested parties as one of the secure algorithm to increase the protection of the information and also will contribute as an alternative to other cryptographic algorithms in computer security research. - Some of the metrics are blocked by yourconsent settings
Publication Educating Users To Mitigate Social Engineering And Privacy Risks In Social Networking Services(Malaysian Society for Engineering & Technology, 2012) ;Nur Izura Udzir ;Ali Dehghantanha ;Mohd Taufik AbdullahZul Hilmi Bin AbdullahSocial engineering is a common tool for privacy attacks and identity theft. With the increasing popularity of social networking services, users are more susceptible to privacy risks as these websites can be used as a tool to harvest information from unsuspecting targets. This paper looks at how much information can be collected from seemingly harmless online quizzes designed for social network websites. We first design an experiment to carefully collect publicly available data from user profiles. We then discuss how the harvested information can be misused by the attacker to initiate different attacks against users� private information. Finally, we propose a solution to mitigate these risks by reducing the risk level on each individual as well as the organizational level. Our research is a strong indication of social networks potential for harvesting users� private information and reflects the positive role of user education in mitigate this risk. - Some of the metrics are blocked by yourconsent settings
Publication Enhancing Advanced Encryption Standard (AES) S-box Generation Using Affine Transformation(Little Lion Scientific, 2015) ;Nur Hafiza Zakaria ;Ramlan Mahmod ;Nur Izura UdzirZuriati Ahmad ZukarnainThe development of technology has resulted in a number of new suggestions done on block ciphers. Although there have been so much evolvement of the block cipher, the industry still needs another block cipher as long as the cipher is secured and met all the security requirements. One of the critical parts is, secured communication which assists to protect the confidentiality and integrity of the data. Secured communication can be attained by encrypting the data. In this research, we proposed to enhance Advanced Encryption Standard (AES) S-Box generation using affine transformation approach which shall meet the security requirements. AES is one of the best cryptographic algorithms that can be used to protect electronic information. Researchers have found a weakness in the AES algorithm. They managed to come up with a clever new attack that can recover the secret key four times easier than anticipated by experts. In this research, we are trying to remove the weaknesses of AES by changing the S-Box and adding one new function which are inspired from crossover and mutation process. This improvement will satisfy the security of AES.