Performance analysis for hashing over encrypted data techniques

العناوين الأخرى

تحليل الأداء لتقنيات تجزئة البيانات المشفرة

مقدم أطروحة جامعية

al-Rawashidah, Isra Samir

مشرف أطروحة جامعية

Kayid, Ahmad K. A.

أعضاء اللجنة

Murad, Sharifah
al-Jawarinah, Shadi A.

الجامعة

جامعة الشرق الأوسط

الكلية

كلية تكنولوجيا المعلومات

القسم الأكاديمي

قسم نظم المعلومات الحاسوبية

دولة الجامعة

الأردن

الدرجة العلمية

ماجستير

تاريخ الدرجة العلمية

2016

الملخص الإنجليزي

This study is based on information security principles such as confidentiality which can be achieved by encryption.

However, using these principles for encryption only as an example led to numerous obstacles.

The hashing technique has been used to index Database.

The encrypted hash will cause a problem for indexing database.

Thus, combination techniques are applied to solve these issues.

Popular cryptographic algorithms such as Data Encryptions Standard (DES) and Triple DES have been used in this thesis.

This study looks into the latest solution proposed by these cryptographic algorithms, and their parameters to find the best efficiency of security enable hashing over encrypted data.

These parameters are encryption and Hashing Techniques and plaintext size.

This study took two approaches: Encryption Hashing: this has been done through entering plaintext into the hash and calculating execution time and CPU time before the encryption process, then after that, the same process for the encryption algorithm.

The second approach is Hashing over Encrypted Data: This has been done through entering the plaintext into a hash, after that combining the hash results with the plaintext, in such way that we calculate the processing time and CPU time before encryption then passing it into encryption algorithm.

The study compares between these two techniques by using the following parameters: the size of the plaintext, various hashing and encryption cryptographic algorithms.

The target from this to evaluate each parameter effectiveness on performance.

Depending on the previous statement, these parameters have been studied and tested in order to achieve the high level of security and efficiency.

Furthermore, we used random plaintext with different sizes.

Thus, the simulation executed upon these parameters in order to achieve the expected results, the evaluation is done through time consuming and CPU time before and after first and second encryption process that took phase.

In all cases, this thesis finds out that DES and MD5 are the best encryption and hashing techniques with results to performance

التخصصات الرئيسية

تكنولوجيا المعلومات وعلم الحاسوب

عدد الصفحات

112

قائمة المحتويات

Table of contents.

Abstract.

Abstract in Arabic.

Chapter One : Introduction.

Chapter Two : Background and literature review.

Chapter Three : The proposed solution a combination of encryption hashing and hashing over encrypted data.

Chapter Four : Results and analysis.

Chapter Five : Conclusion and future work.

References.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

al-Rawashidah, Isra Samir. (2016). Performance analysis for hashing over encrypted data techniques. (Master's theses Theses and Dissertations Master). Middle East University, Jordan
https://search.emarefa.net/detail/BIM-721239

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

al-Rawashidah, Isra Samir. Performance analysis for hashing over encrypted data techniques. (Master's theses Theses and Dissertations Master). Middle East University. (2016).
https://search.emarefa.net/detail/BIM-721239

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

al-Rawashidah, Isra Samir. (2016). Performance analysis for hashing over encrypted data techniques. (Master's theses Theses and Dissertations Master). Middle East University, Jordan
https://search.emarefa.net/detail/BIM-721239

لغة النص

الإنجليزية

نوع البيانات

رسائل جامعية

رقم السجل

BIM-721239