Publication:
Design new symmetric cryptographic algorithm for mobile communication systems

dc.contributor.affiliation#PLACEHOLDER_PARENT_METADATA_VALUE#en_US
dc.contributor.authorJasim, Khalid Fadhilen_US
dc.date.accessioned2024-10-08T07:37:27Z
dc.date.available2024-10-08T07:37:27Z
dc.date.issued2018
dc.description.abstractThe evolution of mobile communication systems began with the 1st generation (1G) in the 1980s, the second generation Global System for Mobile Communications (2G-GSM) in the early 1990s, the third generation Universal Mobile Telecommunications System (3G-UMTS) in 2002, and the fourth generation Long Term Evolution (4G-LTE) technology in 2010. There are more people going online via mobile communication systems, and huge amounts of data pertaining to bank transactions, emails, and voice calls are transmitted every hour. This makes online security paramount, and security systems such as symmetric cryptographic algorithms are used to ensure security of information confidentiality, authenticity and integrity. Symmetric ciphers are ubiquitous in information security of mobile systems, where the SNOW 3G cipher, ZUC cipher, and AES cipher have been used to secure 3G-UMTS and 4G-LTE mobile systems. Certain cryptanalysis techniques (e.g. Chosen-IV attack, Differential Cryptanalysis Technique, and Meet-in-the-Middle with Biclique Cryptanalysis Technique) can be used to attack these symmetric ciphers, therefore, there is a need for more analytical studies to address the security problems associated with these ciphers. This research presents a framework that can be used to investigate the security of symmetric ciphers based on analysing randomness properties, correlation properties, and applying cryptanalysis attacks to search for cryptanalysis weaknesses in the aforementioned ciphers. It focuses on analysing the specifications, components, operation, and the implementation of the three ciphers (SNOW 3G cipher, ZUC cipher, and AES cipher). First, analyse the mobile generations (from mobile 1G - 4G) and cryptographic algorithms used in them. The study is based on certain factors, such as features, services, standards, and techniques adopted in each generation. The randomness properties were analysed and evaluated for the basic components of the SNOW 3G cipher, ZUC cipher, and the AES cipher. The NIST test suit (SP 800-22) was used to evaluate and test their corresponding randomness properties. The correlation properties of different components of the three symmetric ciphers have been investigated, and different cryptanalysis attacks have been applied on the three symmetric ciphers to evaluate the security level of these ciphers. Based on the results in this research, weaknesses were found in the length of IV and secret keys (K) and in the initialisation procedure of the SNOW 3G and ZUC ciphers. The undesirable randomness properties were noted in the ZUC and AES ciphers. Also pinpointed some drawback pertaining to the cryptanalysis in the SNOW 3G and ZUC ciphers. Finally, the Secure Cipher Algorithm (SCAL) was designed and proposed to deal with problems in current symmetric ciphers and enhance the security in mobile communication systems. New techniques introduced in our design of SCAL cipher algorithm. The design includes three stages (Stage#1, Stage#2, and Stage#3) connected in a cascade manner. The proposed design relies on Multi Address Permutation, Multi Address Dynamic Substitution Box (DS-Box) and Multi Address Function. The results showed that the SCAL cipher passed the randomness tests, with random correlations, lack cryptanalysis weaknesses, and is more secure compared to the three symmetric ciphers based on the compared cryptanalysis attacks.en_US
dc.description.callnumbert TK 5103.2 J39D 2018en_US
dc.description.degreelevelDoctoralen_US
dc.description.identifierThesis : Design new symmetric cryptographic algorithm for mobile communication systems /by Khalid Fadhil Jasimen_US
dc.description.identityt11100401337KhalidFadhilJasimen_US
dc.description.kulliyahKulliyyah of Information and Communication Technologyen_US
dc.description.notesThesis (Ph.D)--International Islamic University Malaysia, 2018.en_US
dc.description.physicaldescriptionxvi, 183 leaves :colour illustrations ;30cm.en_US
dc.description.programmeDoctor of Philosophy in Computer Scienceen_US
dc.identifier.urihttps://studentrepo.iium.edu.my/handle/123456789/9325
dc.identifier.urlhttps://lib.iium.edu.my/mom/services/mom/document/getFile/75HYK4F8RbSJkViZhK5f4nvpvUriaoTT20190403153752553
dc.language.isoenen_US
dc.publisherKuala Lumpur :International Islamic University Malaysia,2018en_US
dc.rightsCopyright International Islamic University Malaysia
dc.subject.lcshMobile communication systems -- Security measuresen_US
dc.subject.lcshCryptographyen_US
dc.subject.lcshCiphersen_US
dc.titleDesign new symmetric cryptographic algorithm for mobile communication systemsen_US
dc.typeDoctoral Thesisen_US
dspace.entity.typePublication

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
t11100401337KhalidFadhilJasim_SEC_24.pdf
Size:
284.6 KB
Format:
Adobe Portable Document Format
Description:
24 pages file
Loading...
Thumbnail Image
Name:
t11100401337KhalidFadhilJasim_SEC.pdf
Size:
2.22 MB
Format:
Adobe Portable Document Format
Description:
Full text secured file

Collections