Applied Cryptography
1. Introduction:
The Cryptography Research Group primarily focuses on the design and analysis of block ciphers and their components. A significant part of our research involves the development and rigorous testing of various components that ensure the robustness and efficiency of block ciphers. Additionally, the group actively explores innovative approaches in searchable encryption, aiming to enhance data privacy while enabling efficient data retrieval.
2. Research Areas
- Block Ciphers
- Design of an S-box
- Searchable encryption
- Quantum resistant algorithms
- Post quantum Cryptography
3. Group Members
Ser | Name | Designation | Specialization | Contact |
---|---|---|---|---|
1. | Dr. Sadiqa Arshad | Assistant Professor | Blockchain, Cryptography | [email protected] |
2. | Dr. Shahzaib Tahir | Assistant Professor | IoT Security and Privacy | [email protected] |
3. | Dr. Faiz-ul Islam | Assistant Professor | Network Security, Critical Infrastructure Protection | [email protected] |
4. | Wajahat Sultan | Lecturer | Blockchain, Malware analysis, Forensics, Penetration Testing | [email protected] |
5. | Engr. Muhammad Imran Rafique | Lecturer | Blockchain, Forensics, Digital Identity Protection | [email protected] |
4. Publications
- Arshad, S., & Khan, M. (2021). New extension of data encryption standard over 128-bit key for digital images. Neural Computing and Applications, 33, 13845-13858.
- Arshad, S. (2024). Construction of confusion component based on the isogeny of elliptic curves. Multimedia Tools and Applications, 83(16), 47735-47749.
- Arshad, S., & Khan, M. (2024). Construction of nonlinear component based on bent Boolean functions. Computational and Applied Mathematics, 43(1), 46.
- Islam, F. U., & Liu, G. (2017). Designing S-box based on 4D-4wing hyperchaotic system. 3D Research, 8, 1-9.
- Tahir, S., Ruj, S., Rahulamathavan, Y., Rajarajan, M., & Glackin, C. (2017). A new secure and lightweight searchable encryption scheme over encrypted cloud data. IEEE Transactions on Emerging Topics in Computing, 7(4), 530-544.
- Tahir, S., Ruj, S., Sajjad, A., & Rajarajan, M. (2019). Fuzzy keywords enabled ranked searchable encryption scheme for a public cloud environment. Computer Communications, 133, 102-114.
- Tahir, S., & Rajarajan, M. (2018, July). Privacy-preserving searchable encryption framework for permissioned blockchain networks. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)(pp. 1628-1633). IEEE.
- Malik, H., Tahir, S., Tahir, H., Ihtasham, M., & Khan, F. (2023). A homomorphic approach for security and privacy preservation of Smart Airports. Future Generation Computer Systems, 141, 500-513.
5. PhD Students
- Waqas Ahmed
- Asif Khalil
- Waqar Shah
6. Contact Person
- Dr. Sadiqa Arshad ([email protected])
- Dr. Shahzaib Tahir ([email protected])