Bahareh Shojaie

  • Citations Per Year
Learn More
This study is conducted to determine an alternative, creative method for designing Key Expansion in AES-256 that is called Even-Odd (E-O) method. The proposed algorithm consists of two parts. The first part is Key Expansion and the second part is E-O Select Round Key. The cipher key is 256 bits as an input and the output is fifteen round keys that are 128(More)
The part of the management system of an organization dealing with information security is called Information Security Management System (ISMS). The most adopted ISMS standard is ISO 27001:2005. The 2005 version of the standard has been updated in 2013 to provide more clarity and more freedom in implementation, based on practical experiences. This paper(More)
This paper proposed a new method for Advanced Encryption Standard-Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (AES-CCMP) to eliminate security issues in current method including small effective key length and predictable structure of Nonce which increases the probability of Time-Memory Trade-Off (TMTO) attack. Proposed(More)
This study is conducted to study and compare two types of Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) in order to provide an alternative technique using robust cryptographic methods. Alternative EAP-TLS uses Elliptic Curve Digital Signature Algorithm (ECDSA) and Secure Hash Algorithm (SHA-256) to provide robust security and high(More)
This study is conducted to establish an alternative, creative technique for key structure of AES-Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (AES-CCMP) encryption method in IEEE 802.11i. The proposed method modifies AES-CCMP key length from 128 bits to 256 bits through recommending three distinctive solutions including(More)
The ISO 27001 is the most adopted international information security management standard, by several countries and industries. This paper looks closely to the impacts of cultural characteristics on different phases of developing ISO 27001, based on three levels (country, organisational, and personal), which is especially helpful for Small and Medium(More)
  • 1