Development of Al-Mu’awwidhah computing for personal data protection against abnormal attacks
Personal data is constantly being compromised not just by the normal identity thefts but also abnormal attacks. The Islamic concept of Al-Mu’awwidhah inspired the discovery of non-parametric cryptographs for personal data protection against abnormal (paranormal and asymmetric) cyber-attacks. A conti...
Main Authors: | , , , , , |
---|---|
Format: | Proceeding Paper |
Language: | English English |
Published: |
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/30843/1/Table_of_Content.pdf http://irep.iium.edu.my/30843/2/88.pdf |
_version_ | 1825647373957726208 |
---|---|
author | Shamsudin, Ahmad Faizul Ibrahim, Jamaludin Sembok, Tengku Mohd Noordin, Mohamad Fauzan Hashim, Jamil Wan Yusof, Wan Sabri |
author_facet | Shamsudin, Ahmad Faizul Ibrahim, Jamaludin Sembok, Tengku Mohd Noordin, Mohamad Fauzan Hashim, Jamil Wan Yusof, Wan Sabri |
author_sort | Shamsudin, Ahmad Faizul |
collection | IIUM |
description | Personal data is constantly being compromised not just by the normal identity thefts but also abnormal attacks. The Islamic concept of Al-Mu’awwidhah inspired the discovery of non-parametric cryptographs for personal data protection against abnormal (paranormal and asymmetric) cyber-attacks. A continuous search on new paradigm of non- parametric cryptographs led to the discovery of ethno-mathematics for substitution block-cipher boxes. The objects based on extracted Al-Qur’an and Al-Hadith symbols by use of ethno-mathematical functions. The extracted objects were insufficient to build the 256 bit block-ciphers. The development of expanding objects from Aramaic, Hebrew, Chinese, Hindu and other symbols are found to fill the gap but only up to216bit out of the 256 bit block-cipher. Initial tests for algebraic attacks indicate Al-Mu’awwidhah Block Cipher resistance to be better than the random parameteic Khazad and Annubis Block Ciphers. |
first_indexed | 2024-03-05T23:16:39Z |
format | Proceeding Paper |
id | oai:generic.eprints.org:30843 |
institution | International Islamic University Malaysia |
language | English English |
last_indexed | 2024-03-05T23:16:39Z |
publishDate | 2013 |
record_format | dspace |
spelling | oai:generic.eprints.org:308432018-05-24T07:45:55Z http://irep.iium.edu.my/30843/ Development of Al-Mu’awwidhah computing for personal data protection against abnormal attacks Shamsudin, Ahmad Faizul Ibrahim, Jamaludin Sembok, Tengku Mohd Noordin, Mohamad Fauzan Hashim, Jamil Wan Yusof, Wan Sabri QA75 Electronic computers. Computer science QA76 Computer software Personal data is constantly being compromised not just by the normal identity thefts but also abnormal attacks. The Islamic concept of Al-Mu’awwidhah inspired the discovery of non-parametric cryptographs for personal data protection against abnormal (paranormal and asymmetric) cyber-attacks. A continuous search on new paradigm of non- parametric cryptographs led to the discovery of ethno-mathematics for substitution block-cipher boxes. The objects based on extracted Al-Qur’an and Al-Hadith symbols by use of ethno-mathematical functions. The extracted objects were insufficient to build the 256 bit block-ciphers. The development of expanding objects from Aramaic, Hebrew, Chinese, Hindu and other symbols are found to fill the gap but only up to216bit out of the 256 bit block-cipher. Initial tests for algebraic attacks indicate Al-Mu’awwidhah Block Cipher resistance to be better than the random parameteic Khazad and Annubis Block Ciphers. 2013 Proceeding Paper PeerReviewed application/pdf en http://irep.iium.edu.my/30843/1/Table_of_Content.pdf application/pdf en http://irep.iium.edu.my/30843/2/88.pdf Shamsudin, Ahmad Faizul and Ibrahim, Jamaludin and Sembok, Tengku Mohd and Noordin, Mohamad Fauzan and Hashim, Jamil and Wan Yusof, Wan Sabri (2013) Development of Al-Mu’awwidhah computing for personal data protection against abnormal attacks. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M), 25-27 Mar 2013, Rabat, Moroco. http://ict4m.org/ |
spellingShingle | QA75 Electronic computers. Computer science QA76 Computer software Shamsudin, Ahmad Faizul Ibrahim, Jamaludin Sembok, Tengku Mohd Noordin, Mohamad Fauzan Hashim, Jamil Wan Yusof, Wan Sabri Development of Al-Mu’awwidhah computing for personal data protection against abnormal attacks |
title | Development of Al-Mu’awwidhah computing for personal data
protection against abnormal attacks |
title_full | Development of Al-Mu’awwidhah computing for personal data
protection against abnormal attacks |
title_fullStr | Development of Al-Mu’awwidhah computing for personal data
protection against abnormal attacks |
title_full_unstemmed | Development of Al-Mu’awwidhah computing for personal data
protection against abnormal attacks |
title_short | Development of Al-Mu’awwidhah computing for personal data
protection against abnormal attacks |
title_sort | development of al mu awwidhah computing for personal data protection against abnormal attacks |
topic | QA75 Electronic computers. Computer science QA76 Computer software |
url | http://irep.iium.edu.my/30843/1/Table_of_Content.pdf http://irep.iium.edu.my/30843/2/88.pdf |
work_keys_str_mv | AT shamsudinahmadfaizul developmentofalmuawwidhahcomputingforpersonaldataprotectionagainstabnormalattacks AT ibrahimjamaludin developmentofalmuawwidhahcomputingforpersonaldataprotectionagainstabnormalattacks AT semboktengkumohd developmentofalmuawwidhahcomputingforpersonaldataprotectionagainstabnormalattacks AT noordinmohamadfauzan developmentofalmuawwidhahcomputingforpersonaldataprotectionagainstabnormalattacks AT hashimjamil developmentofalmuawwidhahcomputingforpersonaldataprotectionagainstabnormalattacks AT wanyusofwansabri developmentofalmuawwidhahcomputingforpersonaldataprotectionagainstabnormalattacks |