الصفحات

Alexandria Engineeing Libraries

بحث هذه المدونة الإلكترونية

شرح طريقة تحميل الامتحانات من المدونة

الأربعاء، 5 نوفمبر 2014

New Algorithms in Public Key Cryptography with Applications in E-Commerce and Mobile Communication

Title: New Algorithms in Public Key Cryptography with Applications in E-Commerce and Mobile Communication  
Author        : Eman Fawzy Moussa Abou El-Kheir
Collection   : Ph.D. Electric 
    Abstract:
Cryptography has a long and fascinating history. Cryptography was used as a tool to protect national secrets and strategies. The proliferation of computers and communications systems in the 1960s brought with it a demand from the private sector for means to protect information in digital form and to provide security services. Confidentiality and authentication are of the most important of all information security objectives. Confidentiality is the assurance that information about identifiable persons, the release of which would constitute an invasion of privacy for any individual, will not be disclosed without consent except as allowed by law.
 Confidentiality is achieved by the encryption by which the message is converted to some unreadable format. Authentication is a term which is used in a very broad sense.
By itself it has little meaning other than to convey the idea that some means has been provided to guarantee that entities are who they claim to be, or that information has not been manipulated by unauthorized parties. A cryptographic primitive which is fundamental in authentication, authorization, and non-repudiation is the digital signature. The purpose of a digital signature is to provide a means for an entity to bind its identity to a piece of information. The process of signing entails transforming the message and some secret information held by the entity into a tag called a signature. Signcryption is a cryptographic primitive which simultaneously provides both confidentiality and authenticity in a single logical step.
A cryptographic algorithm for encryption and integrity cannot perform their function unless secure keys have been established and the users know which parties share such keys. It is essential that protocols for providing authenticated key establishment are fit for their purpose. In this thesis, new public key cryptographic algorithms based on the elliptic curve cryptography are proposed to achieve both confidentiality and authentication properties.


ليست هناك تعليقات:

إرسال تعليق