Please use this identifier to cite or link to this item: https://repository.sustech.edu/handle/123456789/7405
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMOHAMMED, AYMEN ELSADIG
dc.contributor.authorSupervisor - FaisalMohammed Abdalla Ali
dc.date.accessioned2014-10-21T10:11:53Z
dc.date.available2014-10-21T10:11:53Z
dc.date.issued2004-05-01
dc.identifier.citationMOHAMMED, AYMEN ELSADIG . DES SECURITY ENHANCEMENT USING GENETIC ALGORITHM /AYMEN ELSADIG MOHAMMED ; Faisal Mohammed Abdalla Ali .- khartoum : Sudan University of Science & Technology , College of Computer Science and Information Technology ,2004 .- 70 p . : ill . ; 28 cm .- M .Scen_US
dc.identifier.urihttp://repository.sustech.edu/handle/123456789/7405
dc.descriptionThesisen_US
dc.description.abstractIn symmetric cryptosystems a primary key is used to create a number of subkeys according to specified key scheduling algorithm; certain initial keys are weak keys. The initial value is split into two halves, and each half is shifted independently. If all the bits in each half are either 0 or 1, then the key used for any cycle of the algorithm is the same for all the cycles of the algorithm This can occur if the key is entirely 1s, entirely 0s, or if one half of the key is entirely 1s and the other half is entirely 0s.for this reason the design of a good key schedule is a crucial aspect of cipher design. In This research presents new algorithms that simplify the creation and expansion process of the encryption key of the DES algorithm, which is considered one of the most important elements in the process of encryption, by creating new key generator architectures that allows us to generate pseudorandom 16 different keys to be used in cryptographic, algorithm suitable for hardware or software implementations.These changes, based on genetic algorithm, Simulation study shows that the proposed technique gives a totally different group of pseudorandom subkeys each time we run the generator. Furthermore; comparison analyses between the proposed subkey generation process and the standard technique used in DES. The proposed method is then been evaluated and subjected to many randomness tests in order to measures it is strength. A file has been encrypted using proposed method and the standard technique used in DES, then the randomness of each one is been subjected to test using Statistical Test Suite (STS). The result show that the proposed method gives good result and can be used in future in many cipher for keys generation.en_US
dc.description.sponsorshipSudan University of Science & Technologyen_US
dc.language.isoenen_US
dc.publisherSudan University of Science & Technologyen_US
dc.subjectAkhawarzmaen_US
dc.subjectSystem Alchwiaren_US
dc.subjectsystemen_US
dc.subjectKhurzmat geneticen_US
dc.titleDES SECURITY ENHANCEMENT USING GENETIC ALGORITHMen_US
dc.title.alternativeباستخدام‬ ‫القياسية‬ ‫التشفير‬ ‫خوارزمية‬ ‫أمن‬ ‫تحسين ‬‫الجينية ‫الخوارزميةen_US
dc.typeThesisen_US
Appears in Collections:Masters Dissertations : Computer Science and Information Technology

Files in This Item:
File Description SizeFormat 
ABSTRACT.pdfABSTRACT559.84 kBAdobe PDFView/Open
CHAPTER ONE INTRODUCTION.pdf
  Restricted Access
CHAPTER1.72 MBAdobe PDFView/Open Request a copy
DES SECURITY ENHANCEMENT....pdfTitle408.17 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.