![](/images/graphics-bg.png)
Implementation of enciphering transformations using one key or two keys into cryptographic systems
Dissertant
Thesis advisor
University
Mutah University
Faculty
Faculty of Engineering
Department
Electrical Engineering Department
University Country
Jordan
Degree
Master
Degree Date
2007
English Abstract
Cryptography is the set of techniques used to ensure the secrecy of messages when hostile personnel have the technical capability to intercept and correctly interpret an unprotected message called the plaintext.
After transformation to secret form a massage is called the ciphertext or a cryptogram.
The process of transforming the plaintext into ciphertext is called encryption. Cryptanalysis is the unauthorized extraction of information from the ciphertext .
In cryptographic systems, a set of parameters that determines a specific cryptographic transformation or its inverse is called a key. Cryptographic systems are designed so that their security depends upon the inability of the cryptanalyst to determine the key even if he knows the structure of the cryptosystem. This research is intended to investigate and to implement the enciphering transformations (algorithms) known by the name cipher.
There are many types of ciphers such as a block cipher, a stream cipher, or a combination of these ciphers. The project study the types of ciphers that use the same key for both enciphering and deciphering, and those use two distinct keys for enciphering and deciphering, therefore, subject such as public key cryptography, private key cryptography, Rivest-Shamir-Adleman algorithm and Diffee-Hellman algorithm will form a major part of the investigation, implementation and comparison work in this research. The performance of the cryptographic communication system is to be verified by determining the bit error rate before and after ciphering, and error correcting codes might be needed to avoid degradation in performance.
Main Subjects
Information Technology and Computer Science
Topics
No. of Pages
110
Table of Contents
Table of contents.
Abstract.
Chapter one : General overview.
Chapter two : Cryptography algorithms.
Chapter three : Decrypting and cryptanalysis.
Chapter four : Application of cryptographic hybrid systems "E–mail".
Chapter five : Conclusion and future work.
References.
American Psychological Association (APA)
al-Shamayleh, Basil Taha. (2007). Implementation of enciphering transformations using one key or two keys into cryptographic systems. (Master's theses Theses and Dissertations Master). Mutah University, Jordan
https://search.emarefa.net/detail/BIM-303696
Modern Language Association (MLA)
al-Shamayleh, Basil Taha. Implementation of enciphering transformations using one key or two keys into cryptographic systems. (Master's theses Theses and Dissertations Master). Mutah University. (2007).
https://search.emarefa.net/detail/BIM-303696
American Medical Association (AMA)
al-Shamayleh, Basil Taha. (2007). Implementation of enciphering transformations using one key or two keys into cryptographic systems. (Master's theses Theses and Dissertations Master). Mutah University, Jordan
https://search.emarefa.net/detail/BIM-303696
Language
English
Data Type
Arab Theses
Record ID
BIM-303696