Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ali Alhamdan is active.

Publication


Featured researches published by Ali Alhamdan.


international conference on signal processing and communication systems | 2012

Slide attacks on the Sfinks stream cipher

Ali Alhamdan; Harry Bartlett; Ed Dawson; Leonie Simpson; Kenneth Koon-Ho Wong

Sfinks is a shift register based stream cipher designed for hardware implementation and submitted to the eSTREAM project. In this paper, we analyse the initialisation process of Sfinks. We demonstrate a slid property of the loaded state of the Sfinks cipher, where multiple key-IV pairs may produce phase shifted keystream sequences. The state update functions of both the initialisation process and keystream generation and also the pattern of the padding affect generation of the slid pairs.


International Conference on Sequences and Their Applications | 2014

Weaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream Cipher

Harry Bartlett; Ali Alhamdan; Leonie Simpson; Ed Dawson; Kenneth Koon-Ho Wong

The Common Scrambling Algorithm Stream Cipher (CSA-SC) is a shift register based stream cipher designed to encrypt digital video broadcast. CSA-SC produces a pseudo-random binary sequence that is used to mask the contents of the transmission. In this paper, we analyse the initialisation process of the CSA-SC keystream generator and demonstrate weaknesses which lead to state convergence, slid pairs and shifted keystreams. As a result, the cipher may be vulnerable to distinguishing attacks, time-memory-data trade-off attacks or slide attacks.


Institute for Future Environments; Science & Engineering Faculty | 2015

Flaws in the Initialisation Process of Stream Ciphers

Ali Alhamdan; Harry Bartlett; Ed Dawson; Leonie Simpson; Kenneth Koon-Ho Wong

The initialisation process is a key component in modern stream cipher design. A well-designed initialisation process should not reveal any information about the secret key, or possess properties that may help to facilitate attacks. This paper analyses the initialisation processes of shift register based stream ciphers and identifies four flaws which lead to compression, state convergence, the existence of slid pairs and possible weak Key-IV combinations. These flaws are illustrated using the A5/1 stream cipher as a case study. We also provide some design recommendations for the intialisation process in stream ciphers, to overcome these and other flaws.


information security conference | 2013

Slid pairs in the initialisation of the A5/1 stream cipher

Ali Alhamdan; Harry Bartlett; Ed Dawson; Leonie Simpson; Kenneth Koon-Ho Wong


information security conference | 2012

State convergence in the initialisation of the Sfinks stream cipher

Ali Alhamdan; Harry Bartlett; Leonie Simpson; Ed Dawson; Kenneth Koon-Ho Wong


information security conference | 2014

Weak key-IV pairs in the A5/1 stream cipher

Ali Alhamdan; Harry Bartlett; Ed Dawson; Leonie Simpson; Kenneth Koon-Ho Wong


School of Chemistry, Physics & Mechanical Engineering; School of Electrical Engineering & Computer Science; Institute for Future Environments; Science & Engineering Faculty | 2014

Secure stream cipher initialisation processes

Ali Alhamdan


Institute for Future Environments; Science & Engineering Faculty | 2013

State convergence in bit-based stream ciphers

Sui-Guan Teo; Harry Bartlett; Ali Alhamdan; Leonie Simpson; Kenneth Koon-Ho Wong; Ed Dawson


Institute for Future Environments; Science & Engineering Faculty | 2014

Weaknesses in the initialisation process of the Common Scrambling Algorithm Stream Cipher

Harry Bartlett; Ali Alhamdan; Leonie Simpson; Ed Dawson; Kenneth Koon-Ho Wong


IACR Cryptology ePrint Archive | 2013

State convergence in bit-based stream ciphers.

Sui-Guan Teo; Harry Bartlett; Ali Alhamdan; Leonie Simpson; Kenneth Koon-Ho Wong; Ed Dawson

Collaboration


Dive into the Ali Alhamdan's collaboration.

Top Co-Authors

Avatar

Ed Dawson

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Harry Bartlett

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Kenneth Koon-Ho Wong

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Leonie Simpson

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Sui-Guan Teo

Queensland University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge