An immune system-inspired byte permutation function to improve confusion performance of round transformation in symmetric encryption scheme.
In data encryption, the security of the algorithm is measured based on Shannon’s confusion and diffusion properties. This paper will proposed the Levinthal’s paradox and protein structure essential computation elements on the basis of diversity property of immune systems that satisfy with confusion...
| Main Authors: | Ariffin, Suriyani, Mahmod, Ramlan, Jaafar, Azmi, Rezal, Muhammad, Ariffin, Kamel |
|---|---|
| Other Authors: | Yeo, Sang Soo |
| Format: | Book Section |
| Published: |
Springer
2012
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/26094/ |
Similar Items
URASP: an ultralightweight RFID authentication scheme using permutation operation
by: Mohd Shariq, et al.
Published: (2021)
by: Mohd Shariq, et al.
Published: (2021)
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012)
by: Ariffin, Suriyani
Published: (2012)
Identity-based encryption schemes - a review
by: Tea, Boon Chian, et al.
Published: (2019)
by: Tea, Boon Chian, et al.
Published: (2019)
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
by: Abu, Ahmad Zaidee
Published: (2008)
by: Abu, Ahmad Zaidee
Published: (2008)
Comparative analysis of three asymmetric encryption schemes based upon the intractability of square roots modulo N = p²q
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
Chaotic asymmetric encryption process for data security.
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
Data wiping tool: ByteEditor Technique
by: Ahmad Riduan, Nuraqilah Haidah, et al.
Published: (2021)
by: Ahmad Riduan, Nuraqilah Haidah, et al.
Published: (2021)
Rounding theorem the possibility of applying cryptosystem on the decimal numbers.
by: Alfaris, Rand, et al.
Published: (2008)
by: Alfaris, Rand, et al.
Published: (2008)
A proposed CCA-secure encryption on an ElGamal variant
by: Asbullah, Muhammad Asyraf, et al.
Published: (2012)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2012)
Improved Algebraic Cryptanalysis of the Reduced-Round Advanced Encryption Standard
by: Rezaeipour, Davood
Published: (2011)
by: Rezaeipour, Davood
Published: (2011)
Noise induced synchronization of time-delayed semiconductor lasers and authentication based asymmetric encryption.
by: Banerjee, Santo, et al.
Published: (2013)
by: Banerjee, Santo, et al.
Published: (2013)
A new CCA-secure encryption based on the Gap Hashed Diffie-Hellman problem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2013)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2013)
S-Permutability, Semipermutability, c-Normality And
c-Permutability Of Subgroups In Finite Groups
by: Al-Sharo, Doa'a Mustafa
Published: (2014)
by: Al-Sharo, Doa'a Mustafa
Published: (2014)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Permutation groups in automata diagrams
by: Gan, Yee Siang, et al.
Published: (2013)
by: Gan, Yee Siang, et al.
Published: (2013)
Analysis of avalanche effect on advance encryption standard by using dynamic S-Box depends on rounds keys
by: Nejad, Farshid Hossein, et al.
Published: (2014)
by: Nejad, Farshid Hossein, et al.
Published: (2014)
On the security defects of an image encryption scheme
by: C., Li, et al.
Published: (2009)
by: C., Li, et al.
Published: (2009)
A new efficient Rabin-like signature scheme
by: Mahad, Zahari, et al.
Published: (2016)
by: Mahad, Zahari, et al.
Published: (2016)
Immune Inspired Framework for MANETs’ Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Motif detection inspired by immune memory
by: Wilson, William, et al.
Published: (2011)
by: Wilson, William, et al.
Published: (2011)
Biological Inspiration for Artificial Immune Systems
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
Motif detection inspired by immune memory
by: Wilson, William, et al.
Published: (2007)
by: Wilson, William, et al.
Published: (2007)
Price Trackers Inspired by Immune Memory
by: Wilson, William, et al.
Published: (2006)
by: Wilson, William, et al.
Published: (2006)
An Immune Inspired Approach to Anomaly Detection
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
by: Salam, M., et al.
Published: (2015)
by: Salam, M., et al.
Published: (2015)
Sticker systems over permutation groups
by: Mohd Sebry, Nurul Afidah, et al.
Published: (2013)
by: Mohd Sebry, Nurul Afidah, et al.
Published: (2013)
Nipple confusion-is it real?
by: Jamani, Nurjasmine Aida
Published: (2019)
by: Jamani, Nurjasmine Aida
Published: (2019)
Improved Watermarking Algorithm Based on Discrete Wavelet Transform and Fibonacci Permutation
by: Salem Hussin, Saleh Hussin
Published: (2005)
by: Salem Hussin, Saleh Hussin
Published: (2005)
An identification scheme based on bivariate function hard problem
by: Tea, Boon Chian, et al.
Published: (2014)
by: Tea, Boon Chian, et al.
Published: (2014)
Rabin-p encryption scheme analysis on MQTT
by: Che Izam, Wan Abdullah, et al.
Published: (2023)
by: Che Izam, Wan Abdullah, et al.
Published: (2023)
Digital Gold or Worthless Bytes? An Exploration of Bitcoin Price Fluctuations and Assessment of Event Driven Volatility
by: Manning Smith, James
Published: (2015)
by: Manning Smith, James
Published: (2015)
Boys’ love, byte-sized: a qualitative exploration of queer-themed microfiction in Chinese cyberspace
by: Shaw, Gareth
Published: (2017)
by: Shaw, Gareth
Published: (2017)
Commuting graphs, C(G, X) in symmetric groups Sym(n) and its connectivity
by: Nawawi @ Mohamed Nawawi, Athirah, et al.
Published: (2019)
by: Nawawi @ Mohamed Nawawi, Athirah, et al.
Published: (2019)
Immune-Inspired Framework for securing Hybrid MANET
by: Yasir Abdelgadir , Mohamed, et al.
by: Yasir Abdelgadir , Mohamed, et al.
Oil Price Trackers Inspired by Immune Memory
by: Wilson, William, et al.
Published: (2006)
by: Wilson, William, et al.
Published: (2006)
Multi-robot cooperation inspired by immune systems
by: Razali, Sazalinsyah, et al.
Published: (2009)
by: Razali, Sazalinsyah, et al.
Published: (2009)
Bottleneck-based heuristic for permutation flowshop scheduling
by: Isa, Noor Amira
Published: (2017)
by: Isa, Noor Amira
Published: (2017)
The Mellin Transform of Generalized Functions and Some Applications
by: Kamel Ariffin, Muhammad Rezal
Published: (2002)
by: Kamel Ariffin, Muhammad Rezal
Published: (2002)
Constructing the prime orbit theorem for the beta transformation
by: Kamel Ariffin, Muhammad Rezal
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal
Published: (2009)
Similar Items
-
URASP: an ultralightweight RFID authentication scheme using permutation operation
by: Mohd Shariq, et al.
Published: (2021) -
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012) -
Identity-based encryption schemes - a review
by: Tea, Boon Chian, et al.
Published: (2019) -
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
by: Abu, Ahmad Zaidee
Published: (2008) -
Comparative analysis of three asymmetric encryption schemes based upon the intractability of square roots modulo N = p²q
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)