Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/9531
Title: Evolution of unified framework for run time optimization and security enhancement in cryptographic algorithms
Researcher: Mani, K
Guide(s): Ganapathy, Gopinath
Keywords: Computer Science
Cryptography
Algorithms
Upload Date: 25-Jun-2013
University: Bharathidasan University
Completed Date: 2012
Abstract: With the rapid usage of data communication, security is becoming a more crucial issue. The fundamental requirements for security include authentication, confidentiality, integrity, and non-repudiation. To provide such security services, most system uses two major classes of cryptographic algorithms namely symmetric-key and public-key algorithms. In symmetric-key algorithms, same key is used for both encryption and decryption. They usually operate at relatively high speed and are suitable for bulk encryption of messages. Public-key algorithms are based on the idea of separating the key used to encrypt a message from the one used to decrypt it. They are relatively slow and therefore unsuitable for encryption of large bulky messages. Most of the number-theory based cryptographic algorithms used for message transmission are deterministic. They always encrypt the plaintext into the same ciphertext. If an eavesdropper knows the plaintext message belongs to a small set, the original message can easily be recovered. However, it is sometimes easy to compute partial information about the plaintext from the ciphertext. For example, in RSA, if c = me mod n is the ciphertext corresponding to a plaintext m, then (c/n) = (me/n) = (m/n)e = (m/n). Since e is odd, an adversary can easily gain one bit of information about m, based on the Jacobi symbol (m/n). It is easy to detect when the same message is sent twice and hence it is not fully secured. For these reasons, probabilistic encryption is introduced. Though the probability encryption produces different ciphertext for the same plaintext, its behavior is partly controlled by random events. The security of these algorithms purely depend on the level of randomness i.e., more randomness means more security. Moreover, to encrypt a character using either deterministic or probability encryption algorithms, numerals corresponding to the plaintext (preferably ASCII) are always considered.
Pagination: xxiii, 192p.
URI: http://hdl.handle.net/10603/9531
Appears in Departments:Department of Commerce and Financial Studies

Files in This Item:
File Description SizeFormat 
01_certificate.pdfAttached File63.1 kBAdobe PDFView/Open
02_declaration.pdf103.55 kBAdobe PDFView/Open
03_abstract.pdf82.1 kBAdobe PDFView/Open
04_acknowledgements.pdf77.9 kBAdobe PDFView/Open
05_list of publications.pdf123.76 kBAdobe PDFView/Open
06_contents.pdf142.8 kBAdobe PDFView/Open
07_list of figures.pdf89.54 kBAdobe PDFView/Open
08_list of tables.pdf79.7 kBAdobe PDFView/Open
09_algorithms.pdf62.6 kBAdobe PDFView/Open
10_list of abbreviations.pdf6.77 kBAdobe PDFView/Open
11_list of symbols.pdf63.16 kBAdobe PDFView/Open
12_chapter 1.pdf204.87 kBAdobe PDFView/Open
13_chapter 2.pdf209.01 kBAdobe PDFView/Open
14_chapter 3.pdf121.37 kBAdobe PDFView/Open
15_chapter 4.pdf157.16 kBAdobe PDFView/Open
16_chapter 5.pdf680.4 kBAdobe PDFView/Open
17_chapter 6.pdf732.06 kBAdobe PDFView/Open
18_chapter 7.pdf456.71 kBAdobe PDFView/Open
19_chapter 8.pdf315.8 kBAdobe PDFView/Open
20_chapter 9.pdf412.62 kBAdobe PDFView/Open
21_chapter 10.pdf735.8 kBAdobe PDFView/Open
22_chapter 11.pdf257.79 kBAdobe PDFView/Open
23_chapter 12.pdf116.06 kBAdobe PDFView/Open
24_chapter 13.pdf252.81 kBAdobe PDFView/Open
25_appendix.pdf1.46 MBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: