Seitkulov, Yerzhan
Unknown Affiliation

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : International Journal of Electrical and Computer Engineering

About one lightweight encryption algorithm ensuring the security of data transmission and communication between internet of things devices Atanov, Sabyrzhan; Seitkulov, Yerzhan; Moldamurat, Khuralay; Yergaliyeva, Banu; Kyzyrkanov, Abzal; Seitbattalov, Zhexen
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 6: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i6.pp6846-6860

Abstract

In this paper, a new encryption algorithm Twine-Mersenne was developed based on the Twine algorithm with the addition of a random number generator for the dynamic generation of S-boxes. Dynamic generation of random numbers based on the Mersenne Twister helps to increase the cryptographic strength of the proposed algorithm. The algorithm we propose solves the issues of optimizing the costs of computing and energy resources of internet of things (IoT) devices, using a combination of lightweight cryptographic principles and fuzzy logic, and also provides reliable security and intelligent authentication of the mobile application user. The paper also considers the practical implementation of the proposed algorithm based on Arduino ESP32, a device with limited computing resources. In addition to this, fuzzy logic has found its practical application in the field of intelligent user authentication in developed mobile applications based on Arduino Studio for mobile cellular applications. As a result, the proposed lightweight encryption algorithm has proven itself to be an effective tool in ensuring the security of data transmission and communication between IoT devices.
Enhancing cryptographic protection, authentication, and authorization in cellular networks: a comprehensive research study Moldamurat, Khuralay; Seitkulov, Yerzhan; Atanov, Sabyrzhan; Bakyt, Makhabbat; Yergaliyeva, Banu
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 1: February 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i1.pp479-487

Abstract

This research article provides an extensive analysis of novel methods of cryptographic protection as well as advancements in authentication and authorization techniques within cellular networks. The aim is to explore recent literature and identify effective authentication and authorization methods, including high-speed data encryption. The significance of this study lies in the growing need for enhanced data security in scientific research. Therefore, the focus is on identifying suitable authentication and authorization schemes, including blockchain-based approaches for distributed mobile cloud computing. The research methodology includes observation, comparison, and abstraction, allowing for a comprehensive examination of advanced encryption schemes and algorithms. Topics covered in this article include multi-factor authentication, continuous authentication, identity-based cryptography for vehicle-to-vehicle (V2V) communication, secure blockchain-based authentication for fog computing, internet of things (IoT) device mutual authentication, authentication for wireless sensor networks based on blockchain, new secure authentication schemes for standard wireless telecommunications networks, and the security aspects of 4G and 5G cellular networks. Additionally, in the paper a differentiated authentication mechanism for heterogeneous 6G networks blockchain-based is discussed. The findings presented in this article hold practical value for organizations involved in scientific research and information security, particularly in encryption and protection of sensitive data.