Please use this identifier to cite or link to this item:
https://repository.sustech.edu/handle/123456789/7823Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Ahmed, Galal Abdelhaleim | |
| dc.contributor.author | Supervisor - Osman Mohammed Daffalla | |
| dc.date.accessioned | 2014-11-05T10:06:30Z | |
| dc.date.available | 2014-11-05T10:06:30Z | |
| dc.date.issued | 2006-01-01 | |
| dc.identifier.citation | Ahmed,Galal Abdelhaleim.Modification and implementation of Data Encryption Standard/Galal Abdelhaleim Ahmed;Osman Mohammed Daffalla.-Khartoum:Sudan University of Science and Technology,College of Engineering,2006.-105P. : ill. : 28Cm.-M.Sc. | en_US |
| dc.identifier.uri | http://repository.sustech.edu/handle/123456789/7823 | |
| dc.description | Thesis | en_US |
| dc.description.abstract | This thesis describes some aspects of cryptography i.e. encryption and decryption of a plaintext to a ciphertext using some key that must be kept secret by some means of protection , the thesis is intended to study the concepts of cryptography that can be programmed into an application program using the C programming language. Cryptography can be defined as the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication, these terms has been defined and presented clearly along the thesis. The thesis at the beginning describes some cryptographic fundamentals, some related mathematical concepts to cryptography, the information security and how they are related to the cryptography, the cryptographic goals and systems, how the systems can be complex and the degree of their complexity It examines some encryption and decryption block cipher algorithms their dependencies on the work of Feistel at IBM and his structure of confusion and diffusion and how by these two terms a complex algorithms can be constructed that they cannot be broken unless using a brute force attack, a term that is defined at the thesis that means it needs huge resource of computer power and long time to break a ciphertext. The thesis concentrates mainly on the block cipher algorithms and studies many block ciphers, presents them briefly, then the thesis get into more deep study on four of the block ciphers algorithms, the four are Twofish, Mars, Frog and RC6 ,,and states the results of the comparing these four block cipher algorithms according to some evaluation criteria, such as the speed of the execution of the code that implements the algorithm, i.e. how fast is the code can be executed The thesis comes to the main goal of it by studying in detail the DES (Data Encryption Standard) encryption technique, modifies it by increasing the length of the key and implements it in a C language application program. | en_US |
| dc.description.sponsorship | Sudan University of Science and Technology | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | Sudan University of Science and Technology | en_US |
| dc.subject | Electronics Engineering | en_US |
| dc.subject | Computer Engineering | en_US |
| dc.subject | Data Encryption Standard | en_US |
| dc.title | Modification and implementation of Data Encryption Standard | en_US |
| dc.type | Thesis | en_US |
| Appears in Collections: | Masters Dissertations : Engineering | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Modification and implementation of Data .. .pdf Restricted Access | search | 2.05 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.