Journal & Conference Proceeding Publications

Get latest Journal & Conference Proceeding Publications related to Cybersecurity Malaysia here

 
Share this page :
CSC 0033
Statistical Analysis on KATAN Block Cipher
Norul Hidayah Lot Ahmad Zawawi; Nik Azura Nik Abdullah; Hazlin Abd Rani
In this research, we present the analysis on Lightweight Block Cipher; KATAN. This block cipher consists of three algorithms with block sizes of 32/48/64-bit and utilizes an 80-bit key. NIST Statistical Test Suite is used to determine the randomness of output sequence produced by all algorithms. Nine data categories are applied to generate the output sequence. From our analysis, we found out that all three algorithms are not random based on the 1% significance level.
Year published : 2011 | 1-6 | IEEE Conference Proceeding
Publication : International Conference on Research and Innovation in Information Systems
CSC 0027
Statistical Analysis on LBlock Block Cipher
Nik Azura Nik Abdullah; Kamaruzzaman Seman; Norita Md Norwawi
In this research paper, we present the statistical analysis on full round lightweight block cipher; LBlock. This block cipher has a fixed block size of 64-bit, utilizes an 80-bit key and executes in 32 rounds. To determine the randomness of ciphertext produced by this algorithm, NIST Statistical Test Suite is used. Inputs (plaintext and key) for this block cipher algorithm are generated using nine different types of data. From the analysis done, it is concluded that the LBlock block cipher is not random based on 1?% significance level only.
Year published : 2014 | 233-245 | Selected Papers
Publication : International Conference on Mathematical Sciences and Statistics 2013 : Selected Papers
CSC 0061
Statistical Analysis on Lightweight Block Cipher, Simon
Isma Norshahila Mohammad Shah, Liyana Chew Nizam Chew, Nor Azeala Mohd Yusof, Nik Azura Nik Abdullah, Norul Hidayah Lot@Ahmad Zawawi & Hazlin Abdul Rani
In this paper, we present a statistical analysis on the members of the lightweight block cipher, SIMON. SIMON family of block ciphers was proposed by the National Security Agency (NSA) in June 2013. It consist variety of blocks and key sizes. Even though it is designed to be flexible on variety of platforms but it is tuned for optimal performance on hardware. In this paper, analysis was performed on SIMON64/96, SIMON96/96 and SIMON128/128 by using NIST Statistical Test Suite. These algorithms were tested using the output sequence generated from nine data categories. From the analysis conducted, it is conclude that the outputs from the sample tested on the algorithms are non-random.
Year published : January 2016
Publication : International Journal of Cryptology Research 5 (2)
CSC 0001
Technical Security Metrics Model in Compliance with ISO/IEC 27001 Standard
Nor Azuwa Muhamad Pahri; Rabiah Ahmad; Shahrin Sahib and Solahuddin Shamsuddin
Technical security metrics provide measurements in ensuring the effectiveness of technical security controls or technology devices/objects that are used in protecting the information systems. However, lack of understanding and method to develop the technical security metrics may lead to unachievable security control objectives and inefficient implementation. This paper proposes a model of technical security metrics to measure the effectiveness of network security management. The measurement is based on the security performance for (1) network security controls such as firewall, Intrusion Detection Prevention System (IDPS), switch, wireless access point and network architecture; and (2) network services such as Hypertext Transfer Protocol Secure (HTTPS) and virtual private network (VPN). The methodology used is Plan-Do-Check-Act process model. The proposed technical security metrics provide guidance for organizations in complying with requirements of ISO/IEC 27001 Information Security Management System (ISMS) standard. The proposed model should also be able to provide a comprehensive measurement and guide to use ISO/IEC 27004 ISMS Measurement standard.
Year published : 2012 | 280-288 | Vol. 1 No. 4
Publication : International Journal of Cyber-Security and Digital Forensics
CSC 0055
Terrorist Use of the Internet
Ooi Seong Hoe & Syahrir Mat Ali
Not Applicable
Year published : 2015
Publication : Cyber Terrorism Policy and Technical Perspective [Chapter 3]
logo
CyberSecurity Malaysia is the national cyber security specialist agency under the purview of the Ministry of Digital (KD)
 
Contact Us

  • CyberSecurity Malaysia,
    Level 7 Tower 1, Menara Cyber Axis, Jalan Impact,
    63000 Cyberjaya, Selangor Darul Ehsan, Malaysia.

  • enquiry@cybersecurity.my

  • +603 - 8800 7999

  • +603 - 8008 7000

TOP
ASK Byte
Chatbot Portal

Hi, I am ASK Byte. Please submit your questions about the portal and I will try to get answers from online knowledge stores.

Hi, Saya Admin Chatbot. Saya sedia chat dengan anda secara terus. Bagaimana saya boleh membantu anda?

Click the button below to interact with the CSM chatbot

Proceed