Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (19)
  • Open Access

    REVIEW

    A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices

    Sunil Kumar1, Dilip Kumar1, Ramraj Dangi2, Gaurav Choudhary3, Nicola Dragoni4, Ilsun You5,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 31-63, 2024, DOI:10.32604/cmc.2023.047084

    Abstract The widespread and growing interest in the Internet of Things (IoT) may be attributed to its usefulness in many different fields. Physical settings are probed for data, which is then transferred via linked networks. There are several hurdles to overcome when putting IoT into practice, from managing server infrastructure to coordinating the use of tiny sensors. When it comes to deploying IoT, everyone agrees that security is the biggest issue. This is due to the fact that a large number of IoT devices exist in the physical world and that many of them have constrained resources such as electricity, memory,… More >

  • Open Access

    ARTICLE

    Nonlinear Components of a Block Cipher over Eisenstein Integers

    Mohammad Mazyad Hazzazi1, Muhammad Sajjad2, Zaid Bassfar3, Tariq Shah2,*, Ashwag Albakri4

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3659-3675, 2023, DOI:10.32604/cmc.2023.039013

    Abstract In block ciphers, the nonlinear components, also known as substitution boxes (S-boxes), are used with the purpose to induce confusion in cryptosystems. For the last decade, most of the work on designing S-boxes over the points of elliptic curves, chaotic maps, and Gaussian integers has been published. The main purpose of these studies is to hide data and improve the security levels of crypto algorithms. In this work, we design pair of nonlinear components of a block cipher over the residue class of Eisenstein integers (EI). The fascinating features of this structure provide S-boxes pair at a time by fixing… More >

  • Open Access

    ARTICLE

    A Mathematical Approach for Generating a Highly Non-Linear Substitution Box Using Quadratic Fractional Transformation

    Abid Mahboob1, Muhammad Asif2, Rana Muhammad Zulqarnain3,*, Imran Saddique4, Hijaz Ahmad5, Sameh Askar6

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2565-2578, 2023, DOI:10.32604/cmc.2023.040371

    Abstract Nowadays, one of the most important difficulties is the protection and privacy of confidential data. To address these problems, numerous organizations rely on the use of cryptographic techniques to secure data from illegal activities and assaults. Modern cryptographic ciphers use the non-linear component of block cipher to ensure the robust encryption process and lawful decoding of plain data during the decryption phase. For the designing of a secure substitution box (S-box), non-linearity (NL) which is an algebraic property of the S-box has great importance. Consequently, the main focus of cryptographers is to achieve the S-box with a high value of… More >

  • Open Access

    ARTICLE

    An Innovative Technique for Constructing Highly Non-Linear Components of Block Cipher for Data Security against Cyber Attacks

    Abid Mahboob1, Muhammad Asif2, Rana Muhammad Zulqarnain3,*, Imran Siddique4, Hijaz Ahmad5, Sameh Askar6, Giovanni Pau7

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2547-2562, 2023, DOI:10.32604/csse.2023.040855

    Abstract The rapid advancement of data in web-based communication has created one of the biggest issues concerning the security of data carried over the internet from unauthorized access. To improve data security, modern cryptosystems use substitution-boxes. Nowadays, data privacy has become a key concern for consumers who transfer sensitive data from one place to another. To address these problems, many companies rely on cryptographic techniques to secure data from illegal activities and assaults. Among these cryptographic approaches, AES is a well-known algorithm that transforms plain text into cipher text by employing substitution box (S-box). The S-box disguises the relationship between cipher… More >

  • Open Access

    ARTICLE

    Improved Cloud Storage Encryption Using Block Cipher-Based DNA Anti-Codify Model

    E. Srimathi1,*, S. P. Chokkalingam2

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 903-918, 2023, DOI:10.32604/csse.2023.029790

    Abstract When it comes to data storage, cloud computing and cloud storage providers play a critical role. The cloud data can be accessed from any location with an internet connection. Additionally, the risk of losing privacy when data is stored in a cloud environment is also increased. A variety of security techniques are employed in the cloud to enhance security. In this paper, we aim at maintaining the privacy of stored data in cloud environment by implementing block-based modelling to boost the privacy level with Anti-Codify Technique (ACoT) and block cipher-based algorithms. Initially, the cipher text is generated using Deoxyribo Nucleic… More >

  • Open Access

    ARTICLE

    Temperature-Triggered Hardware Trojan Based Algebraic Fault Analysis of SKINNY-64-64 Lightweight Block Cipher

    Lei Zhu, Jinyue Gong, Liang Dong*, Cong Zhang

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5521-5537, 2023, DOI:10.32604/cmc.2023.037336

    Abstract SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length, and it is mainly used on the Internet of Things (IoT). Currently, faults can be injected into cryptographic devices by attackers in a variety of ways, but it is still difficult to achieve a precisely located fault attacks at a low cost, whereas a Hardware Trojan (HT) can realize this. Temperature, as a physical quantity incidental to the operation of a cryptographic device, is easily overlooked. In this paper, a temperature-triggered HT (THT) is designed, which, when activated, causes a specific bit of the intermediate state… More >

  • Open Access

    ARTICLE

    Designing Pair of Nonlinear Components of a Block Cipher over Gaussian Integers

    Muhammad Sajjad1,*, Tariq Shah1, Robinson Julian Serna2

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5287-5305, 2023, DOI:10.32604/cmc.2023.035347

    Abstract In block ciphers, the nonlinear components, also known as substitution boxes (S-boxes), are used with the purpose of inducing confusion in cryptosystems. For the last decade, most of the work on designing S-boxes over the points of elliptic curves has been published. The main purpose of these studies is to hide data and improve the security levels of crypto algorithms. In this work, we design pair of nonlinear components of a block cipher over the residue class of Gaussian integers (GI). The fascinating features of this structure provide S-boxes pair at a time by fixing three parameters. But the prime… More >

  • Open Access

    ARTICLE

    Split-n-Swap: A New Modification of the Twofish Block Cipher Algorithm

    Awny Sayed1,2, Maha Mahrous3, Enas Elgeldawi1,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1723-1734, 2023, DOI:10.32604/cmc.2023.032838

    Abstract Securing digital data from unauthorized access throughout its entire lifecycle has been always a critical concern. A robust data security system should protect the information assets of any organization against cybercriminal activities. The Twofish algorithm is one of the well-known symmetric key block cipher cryptographic algorithms and has been known for its rapid convergence. But when it comes to security, it is not the preferred cryptographic algorithm to use compared to other algorithms that have shown better security. Many applications and social platforms have adopted other symmetric key block cipher cryptographic algorithms such as the Advanced Encryption Standard (AES) algorithm… More >

  • Open Access

    ARTICLE

    Mordell Elliptic Curve Based Design of Nonlinear Component of Block Cipher

    Hafeez ur Rehman1,*, Tariq Shah1, Mohammad Mazyad Hazzazi2, Ali Alshehri3, Bassfar Zaid4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2913-2930, 2022, DOI:10.32604/cmc.2022.028765

    Abstract Elliptic curves (ECs) are deemed one of the most solid structures against modern computational attacks because of their small key size and high security. In many well-known cryptosystems, the substitution box (S-box) is used as the only nonlinear portion of a security system. Recently, it has been shown that using dynamic S-boxes rather than static S-boxes increases the security of a cryptosystem. The conferred study also extends the practical application of ECs in designing the nonlinear components of block ciphers in symmetric key cryptography. In this study, instead of the Mordell elliptic curve (MEC) over the prime field, the Galois… More >

  • Open Access

    ARTICLE

    A Block Cipher Algorithm Based on Magic Square for Secure E-bank Systems

    Farah Tawfiq Abdul Hussien*, Abdul Monem S. Rahma, Hala Bahjat Abdul Wahab

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1329-1346, 2022, DOI:10.32604/cmc.2022.027582

    Abstract Nowadays the E-bank systems witnessed huge growth due to the huge developments in the internet and technologies. The transmitted information represents crucial information that is exposed to various kinds of attacks. This paper presents a new block cipher technique to provide security to the transmitted information between the customers and the e-bank systems. The proposed algorithm consists of 10 rounds, each round involves 5 operations. The operations involve Add round key, Sub bytes, Zigzag method, convert to vector, and Magic Square of order 11. The purpose of this algorithm is to make use of the complexity of the Magic Square… More >

Displaying 1-10 on page 1 of 19. Per Page