Browsing by Author "Suriyani Ariffin"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication Designing New Block Cipher Based On Genetic Algorithm Approach(International Journal of Computer Science and Information Security, 2015) ;Nur Hafiza Binti Zakaria ;Ramlan Mahmod ;Nur Izura Udzir ;Zuriati Ahmad ZukarnainSuriyani AriffinThe development of block cipher have resulted in a number of cryptographic algorithms such as FOX, BC2, HIGHT, KLEIN, KAMFEE, KAMKAR, ARIA, BLOWFISH256, DESL, REBC2, DSDP, 3D-AES and many more. As time goes by, the evolvement of technology will also contribute towards the development of new block ciphers. Although there have been so much evolvement of the block cipher, the country still needs another block cipher as long as the cipher is secured and met all the security requirements. Other than that, recent advances in the cryptanalysis field motivate new designs. To satisfy the information security requirements and to enhance the information security, we need secured communication and data which can be attained by encrypting the data. In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. The study identifies the similarity elements and highlights the essential computation elements, namely crossover and mutation that generate idea to computational model. It can be applied in designing a new block cipher that fulfils Shanon�s confusion and diffusion properties. The structure of the components has a fixed block size which is 128 bits and a key size of 128 bits. There are three functions for each encryption process which are substitution function, crossover and mutation function and add round key function. In this research also, the algorithm has been tested with NIST Statistical Test suite to evaluate the randomness of the output. Based on the results, it is proven that the new proposed block cipher algorithm has successfully passed all the security requirements needed. Therefore, this new proposed block cipher can be used by countries, organizations, stakeholders or interested parties as one of the secure algorithm to increase the protection of the information and also will contribute as an alternative to other cryptographic algorithms in computer security research. - Some of the metrics are blocked by yourconsent settings
Publication A Theoretical Comparative Analysis Of Dna Techniques Used In Dna Based Cryptography(Penerbit UMT, 2022) ;Nik Azura Nik Abdullah ;Nur Hafiza Zakaria ;Azni Haslizan Ab Halim ;Farida Hazwani Mohd Ridzuan ;Azuan Ahmad ;Kamaruzzaman SemanSuriyani AriffinCryptography has been extensively employed in the information security field for the purpose of providing security for confidential data. The field of cryptography has recently considered a hybrid cryptographic implementation that combines conventional cryptographic techniques with the knowledge of DNA technologies to formulate what is known as DNA cryptography. DNA based cryptography is considered a branch of sustainability science as it combines transdisciplinary structures from natural sciences (biology) and technological sciences (information security). This paper discusses the various biological DNA techniques that have been implemented in recent DNA cryptographic algorithms. Among them are the Watson-Crick Complementary Rules, DNA Encoding/Decoding Rules, DNA Operation Rules, the Triplet Codon DNA Code, DNA Segmentation, DNA Hybridisation (DNA Annealing) and DNA Transcription and DNA Replication from the Central Dogma Molecular Biology process. A description of the algorithms and a theoretical comparative analysis of these DNA cryptographic algorithms is also presented in this research paper. Comparisons have also been made based on the following parameters: Conventional cryptographic techniques vis-a-vis the techniques used by DNA cryptographic algorithms, the application of these algorithms, their limitations and a security analysis to see how well DNA cryptography perform as against current conventional cryptography.