7 research outputs found

    Comparative study on 4G/LTE cryptographic algorithms based on different factors

    Get PDF
    Recently, (LTE) Long Term Evolution appeared as a robust technology to meet (4G) Fourth Generation cellular networks requirements. Apparently, there are three sets of cryptographic algorithms that work on LTE technology and each set based on core algorithm. Therefore, in this paper we are focusing on reviewing the three sets of the LTE cryptographic algorithms and their core algorithms and then comparing them based on different factors in order to understand their cons and pros and provide valuable information about LTE security

    Project and change management success factors from Malaysian government departments and agencies perspective

    Get PDF
    A project is considered as a core element in any organization and its continuity can be guaranteed through a successful change management. Confronting merciless challenges at the current time particularly at the market field, the emergency need has been raised to overcome those obstacles and step ahead on rivals. One way that most organizations have moved towards its capabilities and put the pressure on it to produce quality and optimal outcomes is ICT. Thus, various types of IT projects with variant intended objectives have been conducted. As being witnessed recently and noticed previously, that a lot of IT projects turned to fail due to several reasons. Additionally, way of life changes from time to time and people requirements have changed and become so complicated recently with the exposure to advanced technology that has been attached with our daily life activities. A survey has been conducted among some Malaysian Government departments and agencies to elicit the main factors which participate in the success of projects and what the importance level of implementing an effective change management over projects that lead to sustainability and productivity of the organizations. This survey results have been received as a quantitative feedback that makes it clear to make a conclusion

    A novel secret key generation based on image link

    Get PDF
    One of the main problems with symmetric encryption is key distribution especially when involving large number of users i.e to generate identical keys at different locations. To address this challenge, we proposed a novel algorithm of secret key infusion protocol (SKIP) to generate an identical secret key. While, the key is generated based on a provided image link, starting pattern and string length which must be kept in secret as the algorithm is publicly known. The image from website must be a static image and used as the input of random bits to produce string of hexadecimal values. In a case where image link is compromised, the adversary has to guess other layers of parameters in starting pattern and string length. The generated secret keys were identical at two different locations. In other observation, different secret keys were generated even with the same image link and pattern length but different starting pattern

    Change management and its contribution to the success of IT project implementation

    No full text
    Witnessing our contemporary time, Technology and its rapid advancement could make a tremendous impact on every aspect of our life. Technology has been used in various daily life operations regardless of their fields. Most business sectors have moved toward ICT and consider it as one of potential competitive advantages. Thus, more IT projects are conducted. It has been shown that the numbers of IT projects failure are currently high and this due to various factors but the main factor stated was poor project management. Additionally, time gets change from day-to-day rapidly and creating a dynamic organization becomes very challenging. Projects are long-term process where project management is short-term process. Therefore, proper management is required to ensure the effectiveness of the projects implementation plus felicitous change management is much demanded since it focuses on the enhancement of the projects after being implemented to cope with the current massive change aspect to ensure the productivity and sustainability of any organizations

    Lightweight block cipher algorithms: review paper

    No full text
    Lightweight block cipher algorithms are very important for constraint environment. This paper analyses most of the known lightweight block cipher algorithms such as, HISEC, OLBCA, PRINCE, TWINE, KLEIN, LED, LBLOCK, PRINT, PRESENT through four factors (Algorithm specifications, S-boxes, Cost, Cryptanalysis). All the results have been presented

    Improving the cost factor of DLBCA lightweight block cipher algorithm

    No full text
    The needing to secure information in restricted environments is very important so that lightweight block cipher algorithm is suitable for these environments. This paper improved DLBCA algorithm by decreasing the cost factor through using the less number of S-boxes. Also, differential and boomerang attacks have been applied in this paper. Finally, all the results have been presented

    Improving the cost factor of DLBCA lightweight block cipher algorithm

    No full text
    The needing to secure information in restricted environments is very important so that lightweight block cipher algorithm is suitable for these environments. This paper improved DLBCA algorithm by decreasing the cost factor through using the less number of S-boxes. Also, differential and boomerang attacks have been applied in this paper. Finally, all the results have been presented
    corecore