References
- Burnett, S., and Paine, S. : RSA Security's Official Guide to Cryptography.McGraw-Hill (2001)
- Disina, A. H., Jamel, S. , Aamir, M., Pindar, Z. A., Deris M. M., and Mohamad, K. M.: A key scheduling algorithm based on dynamic quasigroup string transformation and All-Or-Nothing key derivation function. Journal of Telecommunication, Electronic and Computer Engineering, vol. 9 (3-5), pp. 1-6 (2017)
- Jamel, S., Deris, M. M., Yanto, I. T. R., and Herawan, T.: The hybrid cubes encryption algorithm (HiSea). Communications in Computer and Information Science, Springer-Verlag Berlin Heidelberg, vol. 154, pp. 191-200 (2011)
- Stallings, W.: The RC4 stream encryption algorithm. In Cryptography and network security, 2005.
- Sasi, S. B., Sivanandam, N., and Emeritus, : A survey on cryptography using optimization algorithms in WSNs. Indian Journal of Science and Technology, vol. 8(3), pp. 216-221 (2015) https://doi.org/10.17485/ijst/2015/v8i3/59585
- Jamel, S.: The hybrid cubes encryption algorithm (HiSea). Ph.D Thesis, Univ. Tun Hussein Onn Malaysia (UTHM), Johor, Malaysia, pp. 1-138 (2012)
- Ahmad, S., Alam, K. M. R., Rahman, H., and Tamura, S.: A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets. In Proceedings of the IEEE International Conference on Networking Systems and Security (2015)
- Fujisaki, E. and Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. Journal of Cryptology, vol. 26 (1), pp. 80-101 (2013) https://doi.org/10.1007/s00145-011-9114-1
- Salama, D., Minaam, A., Abdual-kader, H. M, and Hadhoud, M. M.: Evaluating the effects of symmetric cryptography algorithms on power consumption for different data types. International Journal of Network Security, vol. 11(2), pp. 78-87 (2010)
- Goldwasser, S. and Bellare, M. Lecture Notes on Cryptography, Cambridge, Massachusetts (2008)
- Kaushik, A., Barnela M., and Kumar, A.: Keyless user defined optimal security encryption. International Journal of Computer and Electrical Engineering, vol. 4 (2), pp. 2-6 (2012)
- Stallings, W.: Cryptography and network security: principles and practices. Prentice Hall, (2005)
- Mandal, K., Parakash, C., and Tiwari, A.: Performance evaluation of cryptographic algorithms: DES and AES. In Proceeding of the IEEE Students' Conference on Electrical, Electronics and Computer Science: Innovation for Humanity (SCEECS), (2012)
- Ebrahim, M., Khan, S., and bin Khalid U.: Symmetric algorithm survey: A comparative analysis. International Journal of Computer Applications, vol. 61(20), pp. 12-19, (2013)
- Kumar, N., and P. Chaudhary, P.: Performance evaluation of encryption/decryption mechanisms to enhance data security. Indian Journal of Science and Technology, vol. 9(20), pp.1-10 (2016)
- Disina, A. H., Pindar, Z. A., and Jamel, S.: Enhanced Caeser cipher to exclude repetition and withstand frequency cryptanalysis. Journal of Network and Information Security, (2015)
- Palagushin, V., and Khomonenko, A. D.: Evaluation of cryptographic primitives security based on proximity to the latin square. In Proceeding of the IEEE 18th conference of fruct association, pp. 266-271(2016)
- Jamel, S. H. and Deris, M. M.: Diffusive primitives in the design of modern cryptographic algorithms. In proceedings of the International Conference on Computer and Communication Engineering (ICCCE08): Global Links for Human Development, pp. 707-710 (2008)
- Nadeem, A. and Javed, M. Y.: A performance comparison of data encryption algorithms. International Conference on Information and Communication Technologies, pp. 84-89, 2005
- S. Manku, S., and Vasanth, K.: Blowfish encryption algorithm for information security. ARPN Journal of Engineering and Applied Sciences, vol. 10(10), pp. 4717-4719 (2015)
- Daemen, J., Rijmen, V., and Leuven, K. U.: AES Proposal: Rijndael. (NIST), National Institute of Standards, (1999)
- Escala, A., Herold, G., and Rafols, C.: An algebraic framework for Diffie-Hellman assumptions. Journal of Cryptology (2015)
- Jorstad N., and Landgrave.: Cryptographic algorithm metrics. In 20th National Information Systems Security (1997)
- Mushtaq, M. F., Akram, U., Khan, I., Khan, S. N., Shahzad, A., and Ullah, A.: Cloud computing environment and security challenges: A review. International Journal of Advanced Computer Science and Applications, vol. 8(10), pp. 183-195 (2017)
- Hercigonja, Z., Gimnazija, D., and Varazdin, C.: Comparative analysis of cryptographic algorithms and advanced cryptographic algorithms. International Journal of Digital Technology & Economy, vol. 1(2), pp. 1-8 (2016)
- Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th ed. Prentice Hall Press (2010)
- William, E. B., Barker, C.: Recommendation for the triple data encryption algorithm (TDEA) block cipher. NIST Special Publication 800-67 (2012)
- Maqsood, F., Ali, M. M., Ahmed, M., and Shah, M. A.: Cryptography: A comparative analysis for modern techniques. International Journal of Advanced Computer Science and Applications, vol. 8(6), pp. 442-448 (2017)
- Alshahrani, A. M., and Walker, S.: Implement a novel symmetric block cipher algorithm. International Journal on Cryptography and Information Security, vol. 4 (4), pp. 1-11 (2014) https://doi.org/10.5121/ijcis.2014.4401
- Smid M. E., and Branstad D. K.: Data Encryption Standard: past and future. In Proceedings of the IEEE, vol. 76 (5), pp. 550-559 (1988) https://doi.org/10.1109/5.4441
- N. I. of S. and T. NIST: Data Encryption Standard (DES). Federal Information Processing Standards Publication (FIPS PUB 46-3), vol. 25(10), pp. 1-22 (1999)
- Dworkin, M.: Recommendation for block cipher modes of operation, NIST Spec. Publ. 800-38B, (2005)
- Patil, P., Narayankar, P., Narayan, D. G., and Meena, S. M.: A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. In Procedia Computer Science, vol. 78, pp.617-624 (2016) https://doi.org/10.1016/j.procs.2016.02.108
- Silva, N. B. F., Pigatto, D. F., Martins, P. S., and Branco, K. R. L. J. C.: Case studies of performance evaluation of cryptographic algorithms for an embedded system and a general-purpose computer. Journal of Network and Computer Applications, vol. 60, pp. 130-143 (2016) https://doi.org/10.1016/j.jnca.2015.10.007
- N. I. of Standards-(NIST), Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197 (2001)
- Nechvatal, J., Barker, E., Bassham, L., Burr, W., Dworkin, M., Foti, J., and Roback, E.: Report on the development of the advanced encryption standard (AES). National Institute of Standards and Technology, pp. 1-116 (2000)
- Nie, T., and Zhang, T.: A study of DES and Blowfish encryption algorithm. In Proceedings of 10th IEEE Region Annual International Conference TENCON, pp. 1-4 (2009)
- Schneier, B.: Description of a new variable-length key, 64- bit block cipher (Blowfish). In Proceedings of the Fast Software Encryption: Cambridge Security Workshop Cambridge, U. K., pp. 191-204 (1994)
- Schneier, B.: Description of a new variable-length key, 64-bit block cipher (Blowfish). In Proc. Fast Softw. Encryption Cambridge Security. Work. Cambridge, U. K., pp. 191-204 (1994)
- Mushtaq, M. F., Jamel, S. , Mohamad, K. M. , .Khalid, S. A. A., and Deris, M. M.: Key generation technique based on triangular coordinate extraction for hybrid cubes. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), vol. (3-4), pp. 195-200 (2017)
- Disina, A. H., Jamel, S., Pindar, Z. A., and Deris M. M.: All-or-nothing key derivation function based on quasigroup string. In proceeding of IEEE International Conference on Information Science and Security (ICISS), pp. 6-10 (2016)
- Shannon, C. E.: Communication theory of secrecy systems. Bell System Technical Journal, vol. 28 (4), pp. 656-715 (1949) https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
- Mel, H. X., and Baker. D. M.: Cryptography decrypted. Addison-Wesley (2001)