Implementation of enciphering transformations using one key or two keys into cryptographic systems

مقدم أطروحة جامعية

al-Shamayleh, Basil Taha

مشرف أطروحة جامعية

Alseyab, Saod A.

الجامعة

جامعة مؤتة

الكلية

كلية الهندسة

القسم الأكاديمي

قسم الهندسة الكهربائية

دولة الجامعة

الأردن

الدرجة العلمية

ماجستير

تاريخ الدرجة العلمية

2007

الملخص الإنجليزي

Cryptography is the set of techniques used to ensure the secrecy of messages when hostile personnel have the technical capability to intercept and correctly interpret an unprotected message called the plaintext.

After transformation to secret form a massage is called the ciphertext or a cryptogram.

The process of transforming the plaintext into ciphertext is called encryption. Cryptanalysis is the unauthorized extraction of information from the ciphertext .

In cryptographic systems, a set of parameters that determines a specific cryptographic transformation or its inverse is called a key. Cryptographic systems are designed so that their security depends upon the inability of the cryptanalyst to determine the key even if he knows the structure of the cryptosystem. This research is intended to investigate and to implement the enciphering transformations (algorithms) known by the name cipher.

There are many types of ciphers such as a block cipher, a stream cipher, or a combination of these ciphers. The project study the types of ciphers that use the same key for both enciphering and deciphering, and those use two distinct keys for enciphering and deciphering, therefore, subject such as public key cryptography, private key cryptography, Rivest-Shamir-Adleman algorithm and Diffee-Hellman algorithm will form a major part of the investigation, implementation and comparison work in this research. The performance of the cryptographic communication system is to be verified by determining the bit error rate before and after ciphering, and error correcting codes might be needed to avoid degradation in performance.

التخصصات الرئيسية

تكنولوجيا المعلومات وعلم الحاسوب

الموضوعات

عدد الصفحات

110

قائمة المحتويات

Table of contents.

Abstract.

Chapter one : General overview.

Chapter two : Cryptography algorithms.

Chapter three : Decrypting and cryptanalysis.

Chapter four : Application of cryptographic hybrid systems "E–mail".

Chapter five : Conclusion and future work.

References.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

al-Shamayleh, Basil Taha. (2007). Implementation of enciphering transformations using one key or two keys into cryptographic systems. (Master's theses Theses and Dissertations Master). Mutah University, Jordan
https://search.emarefa.net/detail/BIM-303696

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

al-Shamayleh, Basil Taha. Implementation of enciphering transformations using one key or two keys into cryptographic systems. (Master's theses Theses and Dissertations Master). Mutah University. (2007).
https://search.emarefa.net/detail/BIM-303696

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

al-Shamayleh, Basil Taha. (2007). Implementation of enciphering transformations using one key or two keys into cryptographic systems. (Master's theses Theses and Dissertations Master). Mutah University, Jordan
https://search.emarefa.net/detail/BIM-303696

لغة النص

الإنجليزية

نوع البيانات

رسائل جامعية

رقم السجل

BIM-303696