819 research outputs found

    Lightweight block ciphers: A comparative study

    Get PDF
    Although the AES is an excellent and preferred choice for almost all block cipher applications, it is not suitable for extremely constrained environments such as RFID (Radio-Frequency IDentification) tags and sensor networks. Therefore lightweight cryptography has become very vital and a strong demand in designing secure lightweight cryptographic modules is required. This paper meant to be a reference (for the cryptographic designers) on the lightweight block ciphers. It starts by doing a survey to collect the latest proposed ciphers, then to study them in terms of their algorithms specifications, hardware implementation and attacks. Finally, after the explanation and comparison, this research can be the basement for starting point to improve the lightweight block cipher in many directions like number of clock cycle, size of memory, number of Chosen Plaintext, GE, throughput and attacks. Also, this paper is under our investigatio

    Security threats of finger print biometric in network system environment

    Get PDF
    Biometrics-based personal authentication systems that use physiological (e.g., fingerprint, face) or behavioral (e.g., speech, handwriting) traits are becoming increasingly popular, compared to traditional systems that are based on tokens (e.g., key) or knowledge (e.g., password). On the other hand, biometric systems are vulnerable to attacks, which can decrease their security. This paper analyzes and surveys the vulnerabilities and security threats of the finger print biometric systems used for access control and the authentication of access to confidential information in network system environment. As analysis tools, two biometric network models are implemented and connected to see some of the arguments of the vulnerabilities and security threats. Based on that, analysis and surveying, experimental solutions and countermeasures are presented

    Protection of the texts using Base64 and MD5

    Get PDF
    The encryption process combines mathematics and computer science. Cryptography consists of a set of algorithms and techniques to convert the data into another form so that the contents are unreadable and unexplainable to anyone who does not have the authority to read or write on these data. The main objective of the use of encryption algorithms is to protect data and information in order to achieve privacy. This paper discusses an encryption method using base64, which is a set of encoding schemes that convert the same binary data to the form of a series of ASCII code. Also, The MD5 hash function is used to hash the encrypted file performed by Base64. As an example for the two protection mechanisms, Arabic letters are used to represent the texts. So using the two protection methods together will increase the security level for protecting the data

    MOIM: a novel design of cryptographic hash function

    Get PDF
    A hash function usually has two main components: a compression function or permutation function and mode of operation. In this paper, we propose a new concrete novel design of a permutation based hash functions called MOIM. MOIM is based on concatenating two parallel fast wide pipe constructions as a mode of operation designed by Nandi and Paul, and presented at Indocrypt 2010 where the size of the internal state is significantly larger than the size of the output. And the permutations functions used in MOIM are inspired from the SHA-3 finalist Grรธstl hash function which is originally inspired from Rijndael design (AES). As a consequence there is a very strong confusion and diffusion in MOIM. Also, we show that MOIM resists all the generic attacks and Joux attack in two defense security levels

    Comparative study on 4G/LTE cryptographic algorithms based on different factors

    Get PDF
    Recently, (LTE) Long Term Evolution appeared as a robust technology to meet (4G) Fourth Generation cellular networks requirements. Apparently, there are three sets of cryptographic algorithms that work on LTE technology and each set based on core algorithm. Therefore, in this paper we are focusing on reviewing the three sets of the LTE cryptographic algorithms and their core algorithms and then comparing them based on different factors in order to understand their cons and pros and provide valuable information about LTE security

    Antioxidant Status, C-Reactive Protein and Iron Status in Patients with Pulmonary Tuberculosis

    Get PDF
    Objectives:ย The objective of this study was to evaluate the influence of acute pulmonary tuberculosis and the effect of drug therapy on markers of oxidative stress (malondialdehyde [MDA] and total antioxidant status [TAS]), C-reactive protein (CRP) and iron body status indices.ย Methods:Forty patients with active pulmonary tuberculosis from the Advisory Clinic for Chest and Respiratory Diseases in Mosul City, Iraq,were included in this study, with fifty healthy age and sex matched subjects as controls. Assessment of serum concentrations of MDA, TAS, CRP, serum iron, total iron binding capacity, transferring saturation percent and ferritin were done for both patients and controls. After two months of therapy with a daily dose of isoniazid 75 mg, rifampicin 150mg, pyraziamide 400 mg, and ethambutol 275 mg, the same parameters were reassessed for the patients.ย Results:ย After two months of therapy, there was a significant reduction in the levels of MDA, CRP, and ferritin, with a significant increase in the TAS, serum iron, and transferring saturation percentage with an insignificant effect on the total iron binding capacity in comparison with the patientsโ€™ pre-therapy values. Conclusion: Active pulmonary tuberculosis is associated with oxidative stress; the increase in the levels of CRP indicated that pulmonary tuberculosis is associated with an inflammatory response. The initial two months therapy led to significant improvement in oxidative stress and suppression of inflammatory responses. Newly diagnosed cases of pulmonary tuberculosis often had chronic anaemia of inflammation, but this therapy resulted in a significant correction of such anaemia

    Rational drug design using genetic algorithm: case of malaria disease

    Get PDF
    With the rapid development in the amount of molecular biological structures, computational molecular docking (CMD) approaches become one of the crucial tools in rational drug design (RDD). Currently, number of researchers are working in this filed to overcome the recent issues of docking by using genetic algorithm approach. Moreover, Genetic Algorithm facilities the researchers and scientists in molecular docking experiments. Since conducting the experiment in the laboratory considered as time consuming and costly, the scientists determined to use the computational techniques to simulate their experiments. In this paper, auto dock 4.2, well known docking simulation has been used to perform the experiment in specific disease called malaria. The genetic algorithm (GA) approach in the autodock4.2 has been used to search for the potential candidate drug in the twenty drugs. It shows the great impacts in the results obtained from the CMD simulation. In the experiment, we used falcipain-2 as our target protein (2GHU.pdb) obtained from the protein data bank and docked with twenty different available anti malaria drugs in order to find the effective and efficient drugs. Drug Diocopeltine A was found as the best lowest binding energy with the value of -8.64 Kcal/mol. Thus, it can be selected as the anti malaria drug candidate

    Improving PRESENT lightweight algorithms

    Get PDF
    Lightweight block cipher algorithms are vital for constrained environment. Substitution box (S-box) is the essential constituent of many lightweight block cipher algorithms and it is the only nonlinear part. It is proficient to create confusion in the plaintext during the process of encryption. In this research, a new way of key dependent S-box is proposed by choosing one S-box out of 16 good S-boxes. Preliminary analysis of linear and differential cryptanalysis is showing that the proposed alg

    Smart cities: a survey

    Get PDF
    A smart city is one that uses a smart system characterized by the interaction between infrastructure, capital, behaviors and cultures, achieved through their integration. From our survey of the smart city concept by reading recent papers in this field, we found no uniform concept of the smart city; some papers discussed it as a general case study, while others dealt with specific parts. This paper is a survey of a number of articles , which we divided into two categories:1-General case study, which covers the topic of smart city in a general framework, and 2-Specific case study, which covers the topic of the smart city from a specific detailed application, such as Traffic Management System, Smart Grid, Wireless Technology,โ€ฆetc. The results of our research show that the information of communication technology (ICT) covers all areas on smart cities such as government facilities, buildings, traffic, electricity, health, water, and transport. Until now there is no unique definition for smart cities, most of researcher define the smart city form their needs or prospective
    • โ€ฆ
    corecore