Document 7558751

advertisement
Curriculum Vitae
Information
Name:
Dr.Shakir Mahmood Al-Faraji
Faculty:
Information Technology
Department:
Computer Information System
E-mail:
UOP Email:shussain@uop.edu.jo
Phone:
065715553
Extention:
302
Mobile:
Qualifications
Qualification
University
Country
Year
Ph.D
University of Technology
Iraq
1997
Masters
Oklahome State University
United States of America
1984
Publications
Title:
Threshold Secret Sharing Authentication Scheme in Noisy Mobile Ad Hoc
Networks
Type:
Presented Papers at Conferences
Date:
4/12/2009
This paper presents a description and performance evaluation of a threshold
secret sharing (TSS) authentication scheme for self-securing mobile ad hoc
networks (MANETs) suffering from high packet-loss and node mobility. In
order to evaluate the performance of the TSS scheme in a noisy MANET, a
number of simulations were carried-out. We concluded that presence of noise
inflicts significant reduction in the authentication success ratio (SR) and
consequently degrades the performance of the network, while node mobility
inflicts no or insignificant effects. The outcomes of these simulations are so
important to facilitate efficient network management.
Title:
A Non-Exchanged Password Scheme for Password-Based
Type:
Published Paper
Date:
12/1/2008
The password-based authentication is widely used in client-server systems.
This research presents a non-exchanged password scheme for password-based
authentication. This scheme constructs a Digital Signature (DS) that is derived
from the user password. The digital signature is then exchanged instead of the
password itself for the purpose of authentication. Therefore, we refer to it as a
Password-Based Digital Signature (PBDS) scheme. It consists of three phases,
in the first phase a
password-based Permutation (P) is computed using the Key-Based Random
Permutation (KBRP) method. The second phase utilizes P to derive a Key (K)
using the Password-Based Key Derivation
(PBKD) algorithm. The third phase uses P and K to generate the exchanged
DS. The scheme has a number of features that shows its advantages over other
password authentication approaches.
Title:
DES Enhancement Using Key-Based Randomized Initial Permutation
Type:
Presented Papers at Conferences
Date:
7/14/2008
This paper introduces a new method to enhance the performance of the
Standard Data Encryption Standard (DES), or any permutation dependent
encryption algorithms, by increasing the brute-force attack time complexity by
a factor of 64!. The new algorithm is referred to as Enhanced DES (EDES).
This is done by replacing the predefined initial permutations (IP) and its
inverse (IP-1) that are used in the standard DES design with key-based
permutations. The new permutations are derived using the Key-Based Random
Permutation (KBRP) method. These permutations are derived by using the
same cipher key that is used in the standard DES. Therefore, these
permutations will not be fixed and can be considered as pseudorandom
permutations. The performance of the new EDES algorithm is examined in
term of the features of the generated ciphertext and processing time.
Title:
A Password-Based Key Derivation Algorithm Using the KBRP Method
Type:
Published Paper
Date:
2/7/2008
This study presents a new efficient password-based strong key derivation
algorithm using the key based random permutation the KBRP method. The
algorithm consists of five steps, the first three steps are similar to those formed
the KBRP method. The last two steps are added to derive a key and to ensure
that the derived key has all the characteristics of a strong key. In order to
demonstrate the efficiency of the algorithm, a number of keys are derived using
various passwords of different content and length. The features of the derived
keys show a good agreement with all characteristics of strong keys. In addition,
they are compared with features of keys generated using the WLAN strong key
generator v2.2 by Warewolf La
Title:
An adaptive character wordlength algorithm for data compression
Type:
Published Paper
Date:
5/16/2007
This paper presents a new and efficient data compression algorithm, namely,
the adaptive character wordlength (ACW)
algorithm, which can be used as complementary algorithm to statistical
compression techniques. In such techniques, the characters in the source file
are converted to a binary code, where the most common characters in the file
have the shortest binary codes,
and the least common have the longest; the binary codes are generated based
on the estimated probability of the character within the file. Then, the binary
coded file is compressed using 8 bits character wordlength. In this new
algorithm, an optimum character
wordlength, b, is calculated, where b > 8, so that the compression ratio is
increased by a factor of b/8. In order to validate this algorithm, it is used as a
complement algorithm to Huffman code to compress a source file having 10
characters with different probabilities, and these characters are randomly
distributed within the source file. The results obtained and the factors that
affect the optimum value of b are discussed, and, finally, conclusions are
presented.
Title:
Key Based Random Permutation (KBRP)
Type:
Published Paper
Date:
6/1/2006
This study introduces a method for generating a particular permutation P of a
given size N out of N! permutations from a given key. This method computes a
unique permutation for a specific size since it takes the same key; therefore, the
same permutation can be computed each time the same key and size are
applied. The name of random permutation comes from the fact that the
probability of getting this permutation is 1 out of N! possible permutations.
Beside that, the permutation can not be guessed because of its generating
method that is depending completely on a given key and size.
Title:
The Use of User Response Time for Remote
Type:
Presented Papers at Conferences
Date:
6/1/2006
This paper presents a new password authentication method, which is, in
addition to depending on matching each password element, it also depends on
the time that a user takes (response time) for entering each password element.
The t-distribution test is used to examine the input time of each password
element with the time limits, which are stored in the system database, for that
particular password element. The test is carried out on each password element
and the password is accepted when the test is passed for all the password
elements or be set to accept some failure.
Experiance
1978-1981 Assistant system analyst National Computer center - Iraq
1983-1984 Teaching Assistant Oklahoma State University - USA
1984-1992 Senior system analyst National Computer Center - Iraq
1992-1997 Lecturer Al-Rafidain University College, Iraq
1997-2008 Assistant professor Applied Science University - Jordan
2008-present Assistant professor Petra University
Download