Symmetric cryptosystems based on finite automata /

The security of information is an important aspect of communication, which always requires constant improvement to its cryptosystems. Modern designs come with high security and improved performance in real-time applications in response to the increased danger from hacking effort. Since finite automa...

Full description

Saved in:
Bibliographic Details
Main Author: Salloom, Ghassan Khaleel (Author)
Format: Thesis
Language:English
Published: Kuala Lumpur : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2017
Subjects:
Online Access:Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library.
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 041810000a22003010004500
008 170817s2017 my a f m 000 0 eng d
040 |a UIAM  |b eng  |e rda 
041 |a eng 
043 |a a-my--- 
050 0 0 |a TK5102.94 
100 1 |a Salloom, Ghassan Khaleel,  |e author 
245 1 |a Symmetric cryptosystems based on finite automata /  |c by Ghassan Khaleel Salloom 
264 1 |a Kuala Lumpur :  |b Kulliyyah of Information and Communication Technology, International Islamic University Malaysia,  |c 2017 
300 |a xviii, 196 leaves :  |b illustrations ;  |c 30cm. 
336 |2 rdacontent  |a text 
347 |2 rdaft  |a text file  |b PDF 
502 |a Thesis (Ph.D)--International Islamic University Malaysia, 2017. 
504 |a Includes bibliographical references (leaves 189-195). 
520 |a The security of information is an important aspect of communication, which always requires constant improvement to its cryptosystems. Modern designs come with high security and improved performance in real-time applications in response to the increased danger from hacking effort. Since finite automata are formal models of computing devices, cryptosystems based on them can be efficiently implemented at software and hardware levels. Several cryptosystems based on the Mealy and Rabin-Scott models of finite automata and cellular automata have been developed. Mealy model based cryptosystems have serious security vulnerabilities; while cellular automata based cryptosystems have serious technical realization difficulties. Although Dӧmӧsi's cryptosystems based on the Rabin -Scott model combines the simplicity and the security of the above cryptosystems, the backtracking drawbacks in the encryption algorithms affect the performance of the whole cryptosystem. In addition, the resistance against crypt attacks depends on the construction of large size automata and relatively large minimal and maximal block lengths of ciphertext. This results in producing much longer ciphertext than the given plaintext. The purpose of this study is to propose a modified version of Dӧmӧsi's cryptosystems, introducing a novel stream cipher based on nondeterministic finite automata, and construct a new block cipher based on parallel finite automata systems. This study develops and designs formal models of finite automata as keys for encryption and decryption, where it considers modified Dӧmӧsi's cryptosystems, nondeterministic finite automata based cryptosystems, cryptosystems based on parallel and sequential finite automata systems. The performance and security analysis is tested for the introduced cryptosystems. It is found that the time complexity of the modified encryption algorithm in the modified Dӧmӧsi's cryptosystem drastically reduces the exponential time to the linear time with at least the same level of security. Regarding a novel stream cipher based on nondeterministic automata, the analysis illustrates that the nondeterministic automata are irreversible automata and they can be used to reduce the size of ciphertext blocks. Consequently, improving the security level as well as the performance. Moreover, the results show that a new block cipher has high security and throughput compared to the sequential counterpart. The research also shows that the cryptosystems can be implemented as an integrated component into large scale software and hardware. 
596 |a 1 
655 7 |a Theses, IIUM local 
690 |a Dissertations, Academic  |x Kulliyyah of Information and Communication Technology  |z IIUM 
710 2 |a International Islamic University Malaysia.  |b Kulliyyah of Information and Communication Technology 
856 4 |u http://studentrepo.iium.edu.my/handle/123456789/5545  |z Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library. 
900 |a sbh-aaz-ls-naw 
999 |c 440818  |d 471913 
952 |0 0  |6 T TK 005102.94 S169S 2017  |7 0  |8 THESES  |9 764419  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o t TK 5102.94 S169S 2017  |p 11100380816  |r 2018-10-02  |t 1  |v 0.00  |y THESIS 
952 |0 0  |6 TS CDF TK 5102.94 S169S 2017  |7 0  |8 THESES  |9 856258  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o ts cdf TK 5102.94 S169S 2017  |p 11100380806  |r 2018-10-02  |t 1  |v 0.00  |y THESISDIG