Implementation of enciphering transformations using one key or two keys into cryptographic systems

Dissertant

al-Shamayleh, Basil Taha

Thesis advisor

Alseyab, Saod A.

University

Mutah University

Faculty

Faculty of Engineering

Department

Electrical Engineering Department

University Country

Jordan

Degree

Master

Degree Date

2007

English Abstract

Cryptography is the set of techniques used to ensure the secrecy of messages when hostile personnel have the technical capability to intercept and correctly interpret an unprotected message called the plaintext.

After transformation to secret form a massage is called the ciphertext or a cryptogram.

The process of transforming the plaintext into ciphertext is called encryption. Cryptanalysis is the unauthorized extraction of information from the ciphertext .

In cryptographic systems, a set of parameters that determines a specific cryptographic transformation or its inverse is called a key. Cryptographic systems are designed so that their security depends upon the inability of the cryptanalyst to determine the key even if he knows the structure of the cryptosystem. This research is intended to investigate and to implement the enciphering transformations (algorithms) known by the name cipher.

There are many types of ciphers such as a block cipher, a stream cipher, or a combination of these ciphers. The project study the types of ciphers that use the same key for both enciphering and deciphering, and those use two distinct keys for enciphering and deciphering, therefore, subject such as public key cryptography, private key cryptography, Rivest-Shamir-Adleman algorithm and Diffee-Hellman algorithm will form a major part of the investigation, implementation and comparison work in this research. The performance of the cryptographic communication system is to be verified by determining the bit error rate before and after ciphering, and error correcting codes might be needed to avoid degradation in performance.

Main Subjects

Information Technology and Computer Science

Topics

No. of Pages

110

Table of Contents

Table of contents.

Abstract.

Chapter one : General overview.

Chapter two : Cryptography algorithms.

Chapter three : Decrypting and cryptanalysis.

Chapter four : Application of cryptographic hybrid systems "E–mail".

Chapter five : Conclusion and future work.

References.

American Psychological Association (APA)

al-Shamayleh, Basil Taha. (2007). Implementation of enciphering transformations using one key or two keys into cryptographic systems. (Master's theses Theses and Dissertations Master). Mutah University, Jordan
https://search.emarefa.net/detail/BIM-303696

Modern Language Association (MLA)

al-Shamayleh, Basil Taha. Implementation of enciphering transformations using one key or two keys into cryptographic systems. (Master's theses Theses and Dissertations Master). Mutah University. (2007).
https://search.emarefa.net/detail/BIM-303696

American Medical Association (AMA)

al-Shamayleh, Basil Taha. (2007). Implementation of enciphering transformations using one key or two keys into cryptographic systems. (Master's theses Theses and Dissertations Master). Mutah University, Jordan
https://search.emarefa.net/detail/BIM-303696

Language

English

Data Type

Arab Theses

Record ID

BIM-303696