BORANG PENYERAHAN ALGORITMA Algorithm Submission Form SENARAI ALGORITMA KRIPTOGRAFI TERPERCAYA NEGARA (MySEAL)

Similar documents
Projek MySEAL: Kriteria Penyerahan dan Penilaian. Versi 2.0 [2018]

MySEAL Project: Submission and Evaluation Criteria. Version 2.0 [2018]

MySEAL Project: Submission and Evaluation Criteria. Version 1.0 [2016]

DEVELOPMENT OF VENDING MACHINE WITH PREPAID PAYMENT METHOD AMAR SAFUAN BIN ALYUSI

BORANG PENGESAHAN STATUS TESIS


DOKUMEN TIDAK TERKAWAL

CIRCULAR 2017/02. Dear Valued Members, Warmest greetings from Sara Worldwide Vacations Berhad!

GARIS PANDUAN PERMOHONAN IMBUHAN PENERBITAN JURNAL / PROSIDING / SITASI BERINDEKS SCOPUS

Cryptographic Concepts

OPERASI PERKHIDMATAN SOKONGAN. PEJABAT BURSAR Kod Dokumen: UPM/OPR/BEN-BYR/P004 PROSEDUR PEMBAYARAN PINJAMAN / PEMBIAYAAN KENDERAAN DAN KOMPUTER

UNIVERSITI MALAYSIA PAHANG BORANG PENGESAHAN STATUS TESIS

Correlated Keystreams in Moustique

COMP4109 : Applied Cryptography

Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing

Panduan Guru Maker UNO/ Arduino

BORANG PENCALONAN HADIAH UNIVERSITI NOMINATION FORM FOR UNIVERSITY AWARD

BORANG PENGESAHAN STATUS TESIS

2. Does MyEG accept registrations for PATI from all countries? MyEG accepts PATI registrations from all source countries except Myanmar.

DOKUMEN TIDAK TERKAWAL

CSC/ECE 774 Advanced Network Security

Overview of Cryptography

Disclosure Statement and Licensing Declaration This declaration does not represent an implied license grant. Fraunhofer Gesellschaft e.v.

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

PANDUAN PENDAFTARAN VENDOR PNB

Computer Security: Principles and Practice

DESIGN ANALYSIS OF EXTERIOR CAR BODY PART BASTIAN WIBAR BIN MOMANG

KELULUSAN CADANGAN PINDAAN/TAMBAHAN DOKUMEN (CPD)

Computer Security CS 526

VIDEO DISTORTION MEASUREMENT USING PSNR IN WAVELET DOMAIN MOK YUNG LENG

CSCE 715: Network Systems Security

CSC 774 Network Security

REGISTRATION GUIDE MCIS CUSTOMER PORTAL. Page 1

Key Management. Digital signatures: classical and public key Classic and Public Key exchange. Handwritten Signature

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

Summary on Crypto Primitives and Protocols

BORANG PENGESAHAN STATUS TESIS* TERHAD (Mengandungi maklumat TERHAD yang telah ditentukan oleh organisasi/badan di mana penyelidikan dijalankan)

ICT SPM 2011 SUGGESTION ANSWER. Section A

T Cryptography and Data Security

PREDICTION OF SURFACE ROUGHNESS IN TURNING OPERATION OF LOW CARBON STEEL AISI 1018 FAKHRUR RAZI BIN BAHRIN UNIVERSITI MALAYSIA PAHANG

INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions.

Security Policy. 10 th March 2005

NIST s Lightweight Crypto Standardization Process

Cryptography Functions

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Test Conditions. Closed book, closed notes, no calculator, no laptop just brains 75 minutes. Steven M. Bellovin October 19,

The Johns Hopkins Technology Ventures Inventor Portal How to Submit an Invention Disclosure Table of Contents

NOTIS PEMBAHARUAN PENDAFTARAN 2017 JURUTERA PROFESIONAL DENGAN PERAKUAN AMALAN JURUTERA PROFESIONAL & PEMERIKSA BERTAULIAH

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

CSC 474/574 Information Systems Security

a) Please provide for transfer of sponsorship, if not completed BACS Operations will issue a Service User Number.

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

TOKAI TECHNOLOGY SDN BHD MS ZAREMAH BINTI ARSAD BUSINESS DEVELOPMENT MANAGER

ZIGBEE-BASED SMART HOME SYSTEM NURUL ILMI BINTI OMAR

Disclosure Statement and Licensing Declaration This declaration does not represent an implied license grant

Session key establishment protocols

Session key establishment protocols

HOST Authentication Overview ECE 525

symmetric cryptography s642 computer security adam everspaugh

Implementation Tradeoffs for Symmetric Cryptography

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

1. Name: 3. BEM Registration No.: Tel. No. :... Mobile Phone No. : :... Fax No. :...

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc.

TopSec Product Family Voice encryption at the highest security level

Lecture 1 Applied Cryptography (Part 1)

Syrvey on block ciphers

Comp527 status items. Crypto Protocols, part 2 Crypto primitives. Bart Preneel July Install the smart card software. Today

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

Block Ciphers. Secure Software Systems

Cryptography MIS

Advanced WG and MOWG Stream Cipher with Secured Initial vector

An Improved Cryptanalysis of Lightweight Stream Cipher Grain-v1

RNGs for Resource-Constrained Devices

Course Business. Midterm is on March 1. Final Exam is Monday, May 1 (7 PM) Allowed to bring one index card (double sided) Location: Right here

Cryptography V: Digital Signatures

Web-based Invention Disclosure Procedure

Visitor Management System

Payment Card Industry (PCI) PIN Transaction Security (PTS) Hardware Security Module (HSM) Evaluation Vendor Questionnaire Version 2.

Symmetric-Key Cryptographic Technique Evaluation Policy

NUR ZURAIN BT ZUBAIDI B

UNIT - IV Cryptographic Hash Function 31.1

The Rectangle Attack

Cryptography Math/CprE/InfAs 533

ECE 646 Fall 2009 Final Exam December 15, Multiple-choice test

Winter 2011 Josh Benaloh Brian LaMacchia

TUITION CENTRE MANAGEMENT SYSTEM (TCMS) ZARIFAH BINTI MOHD PAHMI UNIVERSITI TEKNIKAL MALAYSIA MELAKA

Report on Evaluation of Symmetric-Key Cryptographic Techniques

Cryptography Trends: A US-Based Perspective. Burt Kaliski, RSA Laboratories IPA/TAO Cryptography Symposium October 20, 2000

Message authentication codes

Standardisation efforst in lightweight cryptography

Technological foundation

Public-key Cryptography: Theory and Practice

ISO/IEC INTERNATIONAL STANDARD

PGP: An Algorithmic Overview

This chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest

BORANG PENGESAHAN STATUS TESIS

DIGITALSIGN - CERTIFICADORA DIGITAL, SA.

CSE 127: Computer Security Cryptography. Kirill Levchenko

Remote User Authentication Scheme in Multi-server Environment using Smart Card

Ecma International Policy on Submission, Inclusion and Licensing of Software

Transcription:

BORANG PENYERAHAN ALGORITMA Algorithm Submission Form SENARAI ALGORITMA KRIPTOGRAFI TERPERCAYA NEGARA (MySEAL) MAKLUMAT SERAHAN Submission Information Individu Individual Organisasi Organisation A. MAKLUMAT PENYERAH Submitter Information MAKLUMAT PENYERAH Submitter Information NAMA PENYERAH UTAMA Principal Submitter s Name NO TELEFON PEJABAT Office Tel No NO TELEFON MUDAH ALIH Mobile No NO FAKSIMILI Fax No ALAMAT E-MEL E-mail Address ALAMAT SURAT MENYURAT Postal Address

NAMA PENYERAH TAMBAHAN (jika berkenaan) Name of Auxiliary Submitter(s) (if any) NAMA PEREKA CIPTA / PEMBANGUN ALGORITMA Name of Algorithm Inventor(s) / Developer(s) NAMA PEMILIK ALGORITMA (jika berlainan daripada penyerah utama) Name of Algorithm s Owner (if different from the submitter) TANDATANGAN PENYERAH Signature of Submitter MAKLUMAT ORGANISASI (untuk serahan organisasi sahaja) Organisation Information (for organisation submission only) ORGANISASI Organisation ALAMAT Address

B. MAKLUMAT ALGORITMA Algorithm Information NAMA ALGORITMA Name of algorithm a) Symmetric Block Cipher Block Cipher Lightweight Block Cipher b) Symmetric Stream Cipher Synchronous stream cipher Self- Synchronous stream cipher c) Asymmetric PRIMITIF ALGORITMA KRIPTOGRAFI Cryptographic Algorithm Primitive Encryption Key agreement Digital signature d) Cryptographic Hash Function Cryptographic hash function Lightweight hash function e) Cryptographic Key Generation f) Cryptographic Pseudo Random Number Generator Primitive 40 bit 80 bit 128 bit CADANGAN TAHAP KESELAMATAN Proposed Security Level CADANGAN PLATFORM Proposed Environment 192 bit 256 bit Other(s). Please specify _ Perkakasan Hardware Perisian Software

C. MAKLUMAT TAMBAHAN Additional Information Bluetooth Global System for Mobile communications (GSM) Radio-Frequency Identification (RFID) Smart cards Mobile devices PENGGUNAAN Implementation Sensor network Microcontroller Microprocessor Field-programmable gate array (FPGA) Other(s). Please specify _

D. PENYATAAN PENYERAH Statement by the Submitter 1. Submission statement I/We do hereby understand that my/our submitted algorithm may not be selected for inclusion in MySEAL. I/We also understand and agree that after the close of the submission period, my/our submission may not be withdrawn. I/We further understand that I/we will not receive financial compensation from MySEAL project for my/our submission. 2. Statement that there are no hidden weaknesses in the algorithm design I/We certify that, to the best of my knowledge, I/we have fully disclosed there are no hidden weaknesses in my/our algorithm. I/We hereby enclosed information on the known weaknesses of my/our algorithm [ (file/attachment name)] 3. Intellectual Property Statement for the Submission of [name of algorithm] to the MySEAL Project [Submitter] currently has patents pending / has not filed for patents on the [name of algorithm]. The [name of algorithm] is provided royalty-free for commercial and non-commercial use in non-embedded applications. Licenses for use of the [name of algorithm] in embedded applications may be obtained from [name]. Aside from legal restrictions applying to encryption algorithms (if any), these licenses will be issued on a nondiscriminatory basis. We will undertake to update the MySEAL project when necessary. Diserahkan oleh (Tandatangan & Cop): Submitted by (Signature & Stamp): Diterima oleh (Tandatangan & Cop): Received by (Signature & Stamp): Tarikh: Date: Tarikh: Date:

SENARAI SEMAK Checklist Bil No 1 Profil Syarikat Perkara / Dokumen diperlukan Document(s) needed Disertakan oleh Penyerah ( ) Supplied by Submitter ( ) Disemak oleh Penerima ( ) Checked by Receiver ( ) Catatan Notes Company Profile 2 Laporan analisis Analysis Report a) Symmetric Block Cipher Ujian statistik NIST NIST statistical tests Linear cryptanalysis Differential cryptanalysis b) Symmetric Stream Cipher Ujian statistik NIST NIST statistical tests Algebraic attack Correlation attack Distinguishing attack Guess-and-Determine attack

Bil No Perkara / Dokumen diperlukan Document(s) needed c) Asymmetric Cryptographic Algorithm Disertakan oleh Penyerah ( ) Supplied by Submitter ( ) Disemak oleh Penerima ( ) Checked by Receiver ( ) Catatan Notes Hard Mathematical Problems and assumptions Security Model and its proof d) Cryptographic Hash Function Pre-image resistance Second pre-image resistance Collision resistance e) Cryptographic Key Generation Probabilistic Prime Generators Deterministic Prime Generators Distinguishing Carmichael numbers from prime numbers Generation of pseudo primes samples from the generator Ujian statistik NIST NIST statistical tests

Bil No Perkara / Dokumen diperlukan Document(s) needed f) Cryptographic Pseudo Random Number Disertakan oleh Penyerah ( ) Supplied by Submitter ( ) Disemak oleh Penerima ( ) Checked by Receiver ( ) Catatan Notes Generator Primitive PRNG based on asymmetric methodologies PRNG based on symmetric methodologies PRNG not based on asymmetric or symmetric methodologies Ujian statistik NIST NIST statistical tests 3 Laporan prestasi algoritma mengikut keupayaan perkakasan dan/atau perisian Implementation and performance reports on hardware and/or software 4 Laporan reka bentuk Justification on design principles 5 Vektor ujian Test vectors 6 Penyata / perjanjian / pendedahan Harta Intelek Intellectual Property statements / agreements / disclosures