Comparative study of some symmetric ciphers in mobile systems
Nowadays, the use of mobile communication systems are growing increasingly across the world, huge sensitive information exchanging over these systems. The security problems of information confidentiality, authenticity, and integrity became a prime concern of issue for users and society. Symmetr...
Main Authors: | , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2014
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/40248/ http://irep.iium.edu.my/40248/ http://irep.iium.edu.my/40248/1/40248.pdf |
id |
iium-40248 |
---|---|
recordtype |
eprints |
spelling |
iium-402482018-05-24T05:39:49Z http://irep.iium.edu.my/40248/ Comparative study of some symmetric ciphers in mobile systems Jassim, Khalid Fadhil Alshaikhli, Imad Fakhri Taha QA75 Electronic computers. Computer science Nowadays, the use of mobile communication systems are growing increasingly across the world, huge sensitive information exchanging over these systems. The security problems of information confidentiality, authenticity, and integrity became a prime concern of issue for users and society. Symmetric cryptographic algorithms have been proposed to protect the information of the senders and receivers through mobile systems. There are various symmetric cryptographic algorithms such as KASUMI cipher, SNOW cipher, ZUC cipher, and AES cipher have been developed for achieving secure mobile communication systems. Some cryptanalysis techniques (e.g. Sandwich Cryptanalysis Technique, Sliding Property Technique, Differential Cryptanalysis Technique, and Biclique Cryptanalysis Technique) can be used to attack these symmetric ciphers, therefore there is a need for more analysis studies to address the security problems of these ciphers. This paper presents a comparative study of these symmetric ciphers with focus on analysis of their specifications, components, and some cryptanalysis techniques over each other 2014-11-17 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/40248/1/40248.pdf Jassim, Khalid Fadhil and Alshaikhli, Imad Fakhri Taha (2014) Comparative study of some symmetric ciphers in mobile systems. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014), 17th-19th Nov. 2014, Kuching, Sarawak. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=7020587&queryText%3DComparative+study+of+some+symmetric+ciphers+in+mobile+systems |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Jassim, Khalid Fadhil Alshaikhli, Imad Fakhri Taha Comparative study of some symmetric ciphers in mobile systems |
description |
Nowadays, the use of mobile
communication systems are growing increasingly across
the world, huge sensitive information exchanging over
these systems. The security problems of information
confidentiality, authenticity, and integrity became a
prime concern of issue for users and society. Symmetric
cryptographic algorithms have been proposed to protect
the information of the senders and receivers through
mobile systems. There are various symmetric
cryptographic algorithms such as KASUMI cipher,
SNOW cipher, ZUC cipher, and AES cipher have been
developed for achieving secure mobile communication
systems. Some cryptanalysis techniques (e.g. Sandwich
Cryptanalysis Technique, Sliding Property Technique,
Differential Cryptanalysis Technique, and Biclique
Cryptanalysis Technique) can be used to attack these
symmetric ciphers, therefore there is a need for more
analysis studies to address the security problems of
these ciphers. This paper presents a comparative study
of these symmetric ciphers with focus on analysis of
their specifications, components, and some
cryptanalysis techniques over each other |
format |
Conference or Workshop Item |
author |
Jassim, Khalid Fadhil Alshaikhli, Imad Fakhri Taha |
author_facet |
Jassim, Khalid Fadhil Alshaikhli, Imad Fakhri Taha |
author_sort |
Jassim, Khalid Fadhil |
title |
Comparative study of some symmetric ciphers in mobile systems |
title_short |
Comparative study of some symmetric ciphers in mobile systems |
title_full |
Comparative study of some symmetric ciphers in mobile systems |
title_fullStr |
Comparative study of some symmetric ciphers in mobile systems |
title_full_unstemmed |
Comparative study of some symmetric ciphers in mobile systems |
title_sort |
comparative study of some symmetric ciphers in mobile systems |
publishDate |
2014 |
url |
http://irep.iium.edu.my/40248/ http://irep.iium.edu.my/40248/ http://irep.iium.edu.my/40248/1/40248.pdf |
first_indexed |
2023-09-18T20:57:44Z |
last_indexed |
2023-09-18T20:57:44Z |
_version_ |
1777410416793616384 |