Araştırma Makalesi
BibTex RIS Kaynak Göster
Yıl 2020, Cilt: 6 Sayı: 2, 13 - 24, 31.10.2020
https://doi.org/10.19072/ijet.755570

Öz

Kaynakça

  • N. Alhalafi, and P. Veeraraghavan, “Privacy and Security Challenges and Solutions in IOT: A review”, Int. Conf. on Smart Power & Internet Energy Systems, Melbourne, Australia, pp 1-5, 25 April 2019.
  • V. Shree, Z. Antony, and N. Jayapandia,” Enhanced Data Security Architecture in Enterprise Network”, Springer Int. Conf. on Computer Networks, Big data and IoT, India , pp. 857-864, Dec. 2019.
  • M. B. Yassein, et al., “Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithm”, Int. Conf. on Engineering and Technology, Antalya, Turkey, 2017.
  • W.N.A. Ruzai, M.R.K. Ariffin, M.A. Asbullah, Z. Mahad, and A. Nawaw, “On the Improvement Attack Upon Some Variants of RSA Cryptosystem via the Continued Fractions Method”, IEEE Access, Vol. 8, pp.1-10, April, 2020.
  • A. Alabaichi, F. Ahmed, and R. Mahmod, “Security Analysis of Blowfish algorithm”, IEEE Second Int. Conf. on Informatics & Applications (ICIA), Poland, pp. 12-18, 23 Sept. 2013.
  • S. Mukherjee, D. Ganguly, and S. Naskar, “A New Generation Cryptographic Technique”, International Journal of Computer Theory and Engineering, Vol. 1, No. 3, pp. 284-287, August 2009.
  • G. Mustafa, et al., “A Review of Data Security and Cryptographic Techniques in IoT based devices”, The 2nd Int. Conf. on Future Networks & Distributed Systems, Amman, Jordan, June 26–27, 2018.
  • D. L. Kumar, A. R. Reddy, and S. A. K. Jilani, “Implementation of 128-bit AES algorithm in MATLAB”, International Journal of Engineering Trends and Technology, Vol. 33 No. 3, pp. 126-129, March 2016.
  • S. Chandra, et al., “A comparative survey of symmetric and asymmetric key cryptography”, IEEE Int. Conf. on Electronics, Communication and Computational Engineering, India, pp. 83-93, 2014.
  • J. Messy, H. Kh and K. Kuregian, Nomination of SAFER+ as a candidate algorithm for the AES, 1998. http://csrc.nist.gov/archive/aes/round1.
  • B. J. Babu, D. K. M. Tech, and R. V. V. Krishna, “Design of SAFER+ Encryption Algorithm for Bluetooth Transmission”, International Journal of Innovative Technology and Research, Vol. No.3, Issue 1, pp. 1864 – 1867, Dec. 2015.
  • A. Schubert, and W. Anheier, “Efficient VLSİ implementation of modern symmetric block ciphers”, 6th IEEE Int. Conf. on Electronics, Circuits and Systems, Vol. 2, Cyprus, pp. 757-760, Sept. 1999,
  • M. K. Mahmood, F. M. Al-Naima, “Developing a Multi-Layer Strategy for Securing Control Systems of Oil Refineries”, Wireless Sensor Network, Vol. 2, pp. 520-527, July 2010.
  • M.K. Mahmood, L. S. Abdulla, A. H. Mohsin, and H. A. Abdulla, “ MATLAB Implementation of 128-key length SAFER+ Cipher System”, Int. Journal of Engineering Research and Application, Vol. 7, İssue 2, pp. 49-55, Feb. 2017.

Secure and Fast Encryption Routine+: Evaluation by Software Application

Yıl 2020, Cilt: 6 Sayı: 2, 13 - 24, 31.10.2020
https://doi.org/10.19072/ijet.755570

Öz

Nowadays, the Internet era and its components are based on the collection, exchange, and storage of information which represent a sever security concern. Many cipher algorithms have been developed, evaluated, and implemented to increase the protection of data for various applications. The most known strategy of data securing has been the implementation of symmetrical key encryption standards. Secrecy, robustness, reliability, and software/ hardware implementation, are among the most important properties of good cipher standard. In this work, text, data and image encryption/decryption are performed by a MATLAB software implementation of the symmetric key block standard realized using the Secure and Fast Encryption Routine (SAFER+) algorithm with 128 key length option. The results show good performances in encryption/ decryption speed through a set of original procedures to simplify the achievement of nonlinear functions adopted by SAFER+ structure. 

Kaynakça

  • N. Alhalafi, and P. Veeraraghavan, “Privacy and Security Challenges and Solutions in IOT: A review”, Int. Conf. on Smart Power & Internet Energy Systems, Melbourne, Australia, pp 1-5, 25 April 2019.
  • V. Shree, Z. Antony, and N. Jayapandia,” Enhanced Data Security Architecture in Enterprise Network”, Springer Int. Conf. on Computer Networks, Big data and IoT, India , pp. 857-864, Dec. 2019.
  • M. B. Yassein, et al., “Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithm”, Int. Conf. on Engineering and Technology, Antalya, Turkey, 2017.
  • W.N.A. Ruzai, M.R.K. Ariffin, M.A. Asbullah, Z. Mahad, and A. Nawaw, “On the Improvement Attack Upon Some Variants of RSA Cryptosystem via the Continued Fractions Method”, IEEE Access, Vol. 8, pp.1-10, April, 2020.
  • A. Alabaichi, F. Ahmed, and R. Mahmod, “Security Analysis of Blowfish algorithm”, IEEE Second Int. Conf. on Informatics & Applications (ICIA), Poland, pp. 12-18, 23 Sept. 2013.
  • S. Mukherjee, D. Ganguly, and S. Naskar, “A New Generation Cryptographic Technique”, International Journal of Computer Theory and Engineering, Vol. 1, No. 3, pp. 284-287, August 2009.
  • G. Mustafa, et al., “A Review of Data Security and Cryptographic Techniques in IoT based devices”, The 2nd Int. Conf. on Future Networks & Distributed Systems, Amman, Jordan, June 26–27, 2018.
  • D. L. Kumar, A. R. Reddy, and S. A. K. Jilani, “Implementation of 128-bit AES algorithm in MATLAB”, International Journal of Engineering Trends and Technology, Vol. 33 No. 3, pp. 126-129, March 2016.
  • S. Chandra, et al., “A comparative survey of symmetric and asymmetric key cryptography”, IEEE Int. Conf. on Electronics, Communication and Computational Engineering, India, pp. 83-93, 2014.
  • J. Messy, H. Kh and K. Kuregian, Nomination of SAFER+ as a candidate algorithm for the AES, 1998. http://csrc.nist.gov/archive/aes/round1.
  • B. J. Babu, D. K. M. Tech, and R. V. V. Krishna, “Design of SAFER+ Encryption Algorithm for Bluetooth Transmission”, International Journal of Innovative Technology and Research, Vol. No.3, Issue 1, pp. 1864 – 1867, Dec. 2015.
  • A. Schubert, and W. Anheier, “Efficient VLSİ implementation of modern symmetric block ciphers”, 6th IEEE Int. Conf. on Electronics, Circuits and Systems, Vol. 2, Cyprus, pp. 757-760, Sept. 1999,
  • M. K. Mahmood, F. M. Al-Naima, “Developing a Multi-Layer Strategy for Securing Control Systems of Oil Refineries”, Wireless Sensor Network, Vol. 2, pp. 520-527, July 2010.
  • M.K. Mahmood, L. S. Abdulla, A. H. Mohsin, and H. A. Abdulla, “ MATLAB Implementation of 128-key length SAFER+ Cipher System”, Int. Journal of Engineering Research and Application, Vol. 7, İssue 2, pp. 49-55, Feb. 2017.
Toplam 14 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Mühendislik
Bölüm Makaleler
Yazarlar

M. Faruk Şahin

Musarıa Karım Mahmood

Indrıt Myderrizi 0000-0002-2112-7911

Yayımlanma Tarihi 31 Ekim 2020
Kabul Tarihi 24 Ağustos 2020
Yayımlandığı Sayı Yıl 2020 Cilt: 6 Sayı: 2

Kaynak Göster

APA Şahin, M. F., Mahmood, M. K., & Myderrizi, I. (2020). Secure and Fast Encryption Routine+: Evaluation by Software Application. International Journal of Engineering Technologies IJET, 6(2), 13-24. https://doi.org/10.19072/ijet.755570
AMA Şahin MF, Mahmood MK, Myderrizi I. Secure and Fast Encryption Routine+: Evaluation by Software Application. IJET. Ekim 2020;6(2):13-24. doi:10.19072/ijet.755570
Chicago Şahin, M. Faruk, Musarıa Karım Mahmood, ve Indrıt Myderrizi. “Secure and Fast Encryption Routine+: Evaluation by Software Application”. International Journal of Engineering Technologies IJET 6, sy. 2 (Ekim 2020): 13-24. https://doi.org/10.19072/ijet.755570.
EndNote Şahin MF, Mahmood MK, Myderrizi I (01 Ekim 2020) Secure and Fast Encryption Routine+: Evaluation by Software Application. International Journal of Engineering Technologies IJET 6 2 13–24.
IEEE M. F. Şahin, M. K. Mahmood, ve I. Myderrizi, “Secure and Fast Encryption Routine+: Evaluation by Software Application”, IJET, c. 6, sy. 2, ss. 13–24, 2020, doi: 10.19072/ijet.755570.
ISNAD Şahin, M. Faruk vd. “Secure and Fast Encryption Routine+: Evaluation by Software Application”. International Journal of Engineering Technologies IJET 6/2 (Ekim 2020), 13-24. https://doi.org/10.19072/ijet.755570.
JAMA Şahin MF, Mahmood MK, Myderrizi I. Secure and Fast Encryption Routine+: Evaluation by Software Application. IJET. 2020;6:13–24.
MLA Şahin, M. Faruk vd. “Secure and Fast Encryption Routine+: Evaluation by Software Application”. International Journal of Engineering Technologies IJET, c. 6, sy. 2, 2020, ss. 13-24, doi:10.19072/ijet.755570.
Vancouver Şahin MF, Mahmood MK, Myderrizi I. Secure and Fast Encryption Routine+: Evaluation by Software Application. IJET. 2020;6(2):13-24.

ijet@gelisim.edu.tr

 Alıntı-Gayriticari-Türetilemez 4.0 Uluslararası (CC BY-NC-ND 4.0)