Symmetric cryptosystems based on finite automata /
The security of information is an important aspect of communication, which always requires constant improvement to its cryptosystems. Modern designs come with high security and improved performance in real-time applications in response to the increased danger from hacking effort. Since finite automa...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
Kuala Lumpur :
Kulliyyah of Information and Communication Technology, International Islamic University Malaysia,
2017
|
Subjects: | |
Online Access: | Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 041810000a22003010004500 | ||
---|---|---|---|
008 | 170817s2017 my a f m 000 0 eng d | ||
040 | |a UIAM |b eng |e rda | ||
041 | |a eng | ||
043 | |a a-my--- | ||
050 | 0 | 0 | |a TK5102.94 |
100 | 1 | |a Salloom, Ghassan Khaleel, |e author | |
245 | 1 | |a Symmetric cryptosystems based on finite automata / |c by Ghassan Khaleel Salloom | |
264 | 1 | |a Kuala Lumpur : |b Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, |c 2017 | |
300 | |a xviii, 196 leaves : |b illustrations ; |c 30cm. | ||
336 | |2 rdacontent |a text | ||
347 | |2 rdaft |a text file |b PDF | ||
502 | |a Thesis (Ph.D)--International Islamic University Malaysia, 2017. | ||
504 | |a Includes bibliographical references (leaves 189-195). | ||
520 | |a The security of information is an important aspect of communication, which always requires constant improvement to its cryptosystems. Modern designs come with high security and improved performance in real-time applications in response to the increased danger from hacking effort. Since finite automata are formal models of computing devices, cryptosystems based on them can be efficiently implemented at software and hardware levels. Several cryptosystems based on the Mealy and Rabin-Scott models of finite automata and cellular automata have been developed. Mealy model based cryptosystems have serious security vulnerabilities; while cellular automata based cryptosystems have serious technical realization difficulties. Although Dӧmӧsi's cryptosystems based on the Rabin -Scott model combines the simplicity and the security of the above cryptosystems, the backtracking drawbacks in the encryption algorithms affect the performance of the whole cryptosystem. In addition, the resistance against crypt attacks depends on the construction of large size automata and relatively large minimal and maximal block lengths of ciphertext. This results in producing much longer ciphertext than the given plaintext. The purpose of this study is to propose a modified version of Dӧmӧsi's cryptosystems, introducing a novel stream cipher based on nondeterministic finite automata, and construct a new block cipher based on parallel finite automata systems. This study develops and designs formal models of finite automata as keys for encryption and decryption, where it considers modified Dӧmӧsi's cryptosystems, nondeterministic finite automata based cryptosystems, cryptosystems based on parallel and sequential finite automata systems. The performance and security analysis is tested for the introduced cryptosystems. It is found that the time complexity of the modified encryption algorithm in the modified Dӧmӧsi's cryptosystem drastically reduces the exponential time to the linear time with at least the same level of security. Regarding a novel stream cipher based on nondeterministic automata, the analysis illustrates that the nondeterministic automata are irreversible automata and they can be used to reduce the size of ciphertext blocks. Consequently, improving the security level as well as the performance. Moreover, the results show that a new block cipher has high security and throughput compared to the sequential counterpart. The research also shows that the cryptosystems can be implemented as an integrated component into large scale software and hardware. | ||
596 | |a 1 | ||
655 | 7 | |a Theses, IIUM local | |
690 | |a Dissertations, Academic |x Kulliyyah of Information and Communication Technology |z IIUM | ||
710 | 2 | |a International Islamic University Malaysia. |b Kulliyyah of Information and Communication Technology | |
856 | 4 | |u http://studentrepo.iium.edu.my/handle/123456789/5545 |z Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library. | |
900 | |a sbh-aaz-ls-naw | ||
999 | |c 440818 |d 471913 | ||
952 | |0 0 |6 T TK 005102.94 S169S 2017 |7 0 |8 THESES |9 764419 |a IIUM |b IIUM |c MULTIMEDIA |g 0.00 |o t TK 5102.94 S169S 2017 |p 11100380816 |r 2018-10-02 |t 1 |v 0.00 |y THESIS | ||
952 | |0 0 |6 TS CDF TK 5102.94 S169S 2017 |7 0 |8 THESES |9 856258 |a IIUM |b IIUM |c MULTIMEDIA |g 0.00 |o ts cdf TK 5102.94 S169S 2017 |p 11100380806 |r 2018-10-02 |t 1 |v 0.00 |y THESISDIG |