Block Cipher Security Evaluation Based on Fuzzy Logic

被引:0
|
作者
Mohammed, Sirwan A. [1 ]
Sadkhan, Sattar B. [2 ]
机构
[1] Univ Sulaimani, Dept Elect Engn, Sulaymaniyah, Iraq
[2] Univ Babylon, IEEE IRAQ Sect, Hillah, Iraq
关键词
Block Cipher; RC5; algorithm; Blowfish algorithm; DES algorithm; Fuzzy Logic;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The main goal of this paper is to present of security evaluation of block cipher use in wireless network. Information security contributes directly to increase level of trust between users by providing an assurance of confidentiality, integrity, and availability of sensitive information of the network. In this paper, evaluations analysis of RC5, Blowfish and DES block cipher algorithms have been done on the basis of block size, numbers of round, and key size of evaluation modeling based on fuzzy logic tool of MA TLAB 2012a. Three metrics are considered for using crypto algorithms for wireless network security. These three algorithms have a variable block size, number of rounds and a variable key size in their structure. Performances of RC5, Blowfish and DES algorithms have been evaluated on variables range of metrics of key size, number of rounds, and block size in this paper. Presents the results of evaluation for security level of crypto have shown the security level depending on the structure of algorithm.
引用
收藏
页码:169 / 173
页数:5
相关论文
共 50 条
  • [31] Effective RFID Localization Based on Fuzzy Logic For Security
    Zhu, Licai
    Yang, Hao
    Chen, Shi
    Yu, Zhipeng
    [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 323 - 330
  • [32] Security Analysis and Enhanced Design of a Dynamic Block Cipher
    ZHAO Guosheng
    WANG Jian
    [J]. 中国通信., 2016, 13 (01) - 160
  • [33] IoT Security Issues and Light Weight Block Cipher
    Shin, Hyungsik
    Lee, Ho Kyoung
    Cha, Ho-Young
    Heo, Seo Weon
    Kim, Hyungtak
    [J]. 2019 1ST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE IN INFORMATION AND COMMUNICATION (ICAIIC 2019), 2019, : 381 - 384
  • [34] On the security of the 128-bit block cipher DEAL
    Lucks, S
    [J]. FAST SOFTWARE ENCRYPTION, 1999, 1636 : 60 - 70
  • [35] IIoTBC: A Lightweight Block Cipher for Industrial IoT Security
    Kuang, Juanli
    Guo, Ying
    Li, Lang
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2023, 17 (01): : 97 - 119
  • [36] PFX: an essence of authencryption for block-cipher security
    Hwang, Tzonelih
    Gope, Prosanta
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (10) : 1186 - 1197
  • [37] The security of the cipher block chaining message authentication code
    Bellare, M
    Kilian, J
    Rogaway, P
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2000, 61 (03) : 362 - 399
  • [38] Security Analysis and Enhanced Design of a Dynamic Block Cipher
    Zhao Guosheng
    Wang Jian
    [J]. CHINA COMMUNICATIONS, 2016, 13 (01) : 150 - 160
  • [39] Magpie: a High-Security Lightweight Block Cipher
    Li, Lang
    Li, Ken-Li
    He, Wei-Wei
    Zou, Yi
    Liu, Bo-Tao
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2017, 45 (10): : 2521 - 2527
  • [40] Security Analysis and Enhanced Design of a Dynamic Block Cipher
    ZHAO Guosheng
    WANG Jian
    [J]. China Communications, 2016, 13 (01) : 150 - 160