Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
On the avalanche properties of misty1, kasumi and kasumi-r
Download
index.pdf
Date
2008
Author
Akleylek, Sedat
Metadata
Show full item record
Item Usage Stats
162
views
83
downloads
Cite This
The Global System for Mobile (GSM) Communication is the most widely used cellular technology. The privacy has been protected using some version of stream ciphers until the 3rd Generation of GSM. KASUMI, a block cipher, has been chosen as a standard algorithm in order to be used in 3rd Generation. In this thesis, s-boxes of KASUMI, MISTY1 (former version of KASUMI) and RIJNDAEL (the Advanced Encryption Standard) are evaluated according to their linear approximation tables, XOR table distributions and satisfaction of the strict avalanche criterion (SAC). Then, the nonlinear part, FI function, of KASUMI and MISTY1 are investigated for SAC. A new FI function is defined by replacing both s-boxes of KASUMI by RIJNDAEL’s s-box. Calling this new version KASUMI-R, it is found to have an FI function significantly better than others. Finally, the randomness characteristics of the overall KASUMI-R for different rounds are compared to those of MISTY1 and KASUMI, in terms of avalanche weight distribution (AWD) and some statistical tests. The overall performance of the three ciphers is found to be same, although there is a significant difference in their FI functions.
Subject Keywords
Block cipher.
URI
http://etd.lib.metu.edu.tr/upload/12609407/index.pdf
https://hdl.handle.net/11511/17622
Collections
Graduate School of Applied Mathematics, Thesis
Suggestions
OpenMETU
Core
Performance evaluation of lightweight cryptographic algorithms for internet of things security
Polat, Selahattin; Baykal, Nazife; Department of Cyber Security (2019)
Widespread deployment of mobile and embedded devices in everyday use has brought up not only new concepts and application areas such as Internet-of-Things (IoT) but also several security and privacy problems. In theory, it is possible to mitigate most of these problems by implementing well-known and standardized security algorithms and techniques on IoT devices. However, in practice, it is rather difficult, if not impossible, to implement standard security algorithms on these devices due to their limited re...
Location update generation and performance analysis in cellular mobile computing systems
Yoncacı, İlker; Demirös, Onur; Erten, Murat; Department of Information Systems (2002)
The Global System for Mobile Communications (GSM) allows user universal and worlwide access to information and the ability to communicate with each other independently of their location and mobility. Tracking mobile users is one of the basic functions of the network system and one of the important issues in the design of a mobile computing system is how to manage the real-time locations of mobile clients. Most of the mobile computing applications are expected to support location- dependent continuous querie...
Design of a context aware security model for preventing relay attacks using NFC enabled mobile devices
Çavdar, Davut; Betin Can, Aysu; Department of Information Systems (2020)
Near Field Communication (NFC) is a promising communication technology used in smart mobile devices. As an effective and flexible communication technology, NFC is frequently used in innovative solutions nowadays such as payment, access control etc. Because of the nature of these transactions, security is an important issue since NFC is used in critical applications such as payment and access control. There are several attacks mentioned in literature against NFC-enabled applications, yet, none of the securit...
On the performance, availability and energy consumption modelling of clustered IoT systems
Ever, Enver; Shah, Purav; Mostarda, Leonardo; Omondi, Fredrick; Gemikonakli, Orhan (Springer Science and Business Media LLC, 2019-12-01)
Wireless sensor networks (WSNs) form a large part of the ecosystem of the Internet of Things (IoT), hence they have numerous application domains with varying performance and availability requirements. Limited resources that include processing capability, queue capacity, and available energy in addition to frequent node and link failures degrade the performance and availability of these networks. In an attempt to efficiently utilise the limited resources and to maintain the reliable network with efficient da...
Measurement-based replanning of GSM cell capacities considering retrials, redials and hand-offs
Onur, Ertan; Ersoy, C; Caglayan, MU (2002-01-01)
During the optimization of a Global System for Mobile Communications (GSM) network, the operations and maintenance center (OMC) measurements are of significant importance. Because of false predictions, the capacity planning of a cell may be done inaccurately. If the capacity of the cell is not adequate to handle all of the busy-hour requests, the requests are not granted a channel and users are blocked. Thus, when the blocking ratio is high, the cellular capacity should be replanned. However, the capacity p...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
S. Akleylek, “On the avalanche properties of misty1, kasumi and kasumi-r,” M.S. - Master of Science, Middle East Technical University, 2008.