Proposed block cipher algorithm with cloud computing based on keys generator

مقدم أطروحة جامعية

Mahdi, Muhammad Salih

مشرف أطروحة جامعية

Farhan, Ala Kazim

الجامعة

الجامعة التكنولوجية

الكلية

-

القسم الأكاديمي

قسم علوم الحاسوب

دولة الجامعة

العراق

الدرجة العلمية

ماجستير

تاريخ الدرجة العلمية

2013

الملخص الإنجليزي

The advantage of symmetric encryption is easy to be used and fast in the application, but when the number of users increases, it leads to difficulty with the distribution of keys and key management, key generation, key storage and the period of use; all that is one of the major challenges faced by systems that use symmetric encryption.

Cloud computing is a technological revolution in the world of networks and computer applications, it provides what users need.

Services offered by cloud computing is a form of Virtualization software technologies used widely in business and services, education, smart phones and e-government in most of the countries of the world, to be an essential system for saving and managing data of an organization.

One advantage of this type of technology, it reduces the hardware, software and the time required for the implementation of applications.

In this thesis, building a private cloud system has the ability to generate keys shared between users' system and reduce the effort involved in the distribution of keys.

Beside the control of the sending and receiving, the cloud system provides the keys to be used in the method of data encryption standard algorithm and a proposed block cipher algorithm based on a set of random key generators and subkey generators.

The system also has the ability to provide a set of services including authentication between the parties, damage the key after a period of use and cancel the account of users who do not use the system after a period.

In addition, it provides a proposed block cipher algorithm to users with high complexity based on length of block is 256 bits and the length of key is 64 bits for one round uses 6 keys with length 64 bits so needed (2 64 * 6 ) 16 trails to find the correct key for brute force attack and using three different permutation functions , three different inverse permutation functions, poly functions , two black boxes functions and genetic functions, to enhances the two principles of standard block cipher, which are diffusion and confusion.

التخصصات الرئيسية

الرياضيات

الموضوعات

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

Mahdi, Muhammad Salih. (2013). Proposed block cipher algorithm with cloud computing based on keys generator. (Master's theses Theses and Dissertations Master). University of Technology, Iraq
https://search.emarefa.net/detail/BIM-418156

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

Mahdi, Muhammad Salih. Proposed block cipher algorithm with cloud computing based on keys generator. (Master's theses Theses and Dissertations Master). University of Technology. (2013).
https://search.emarefa.net/detail/BIM-418156

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

Mahdi, Muhammad Salih. (2013). Proposed block cipher algorithm with cloud computing based on keys generator. (Master's theses Theses and Dissertations Master). University of Technology, Iraq
https://search.emarefa.net/detail/BIM-418156

لغة النص

الإنجليزية

نوع البيانات

رسائل جامعية

رقم السجل

BIM-418156