To see the other types of publications on this topic, follow the link: Decryption.

Dissertations / Theses on the topic 'Decryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Decryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Strand, Martin. "Verifiable Shuffled Decryption." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for matematiske fag, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-21427.

Full text
Abstract:
We describe the Verifiable Shuffled Decryption problem, and present five solutions based on adapting several existing verifiable shuffles. All but one may have potential for implementation, the choice of which would depend on the required level of security and computational restrictions given by the available hardware.
APA, Harvard, Vancouver, ISO, and other styles
2

Burman, Annie. "Gendering decryption - decrypting gender : The gender discourse of labour at Bletchley Park 1939-1945." Thesis, Uppsala universitet, Historiska institutionen, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-201046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Takagi, Tsuyoshi. "New public-key cryptosystems with fast decryption." Phd thesis, [S.l. : s.n.], 2001. http://deposit.ddb.de/cgi-bin/dokserv?idn=962729302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Käck, Emil. "TLS Decryption in passive monitoring system with server private key." Thesis, Umeå universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-184490.

Full text
Abstract:
Many network operators need to be able to ensure that customers get the level of service they pay for. To avoid bandwidth and server performance bottlenecks, and easily troubleshoot network problems, the network providers need to be able to see what payload data is sent. Modern networks encrypt data when sending it between nodes that makes passive monitoring more complex. A prevalent encryption mechanism on an IP-based network is TLS that needs to be decrypted.                This article’s purpose is to check if it is possible to decrypt TLS traffic in a passive monitoring system with the ser
APA, Harvard, Vancouver, ISO, and other styles
5

Merz, Doug, and Bruce Maples. "Encrypt/Decrypt COMSEC Unit for Space-based Command and Telemetry Applications." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/605565.

Full text
Abstract:
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada<br>This paper describes the system-level architecture and design concept of a communications security (COMSEC) equipment intended for space-based low data rate (< 1 Mbps) command and telemetry applications. The COMSEC Unit is a stand-alone piece of equipment which provides decryption of uplink command and control information and encryption of downlink telemetry data. The system-level architecture is described followed by an overview of the digital design concepts
APA, Harvard, Vancouver, ISO, and other styles
6

Loban, H. "A VHDL Implemetation of the Advanced Encryption Standard." Thesis, NURE, MC&FPGA, 2019. https://mcfpga.nure.ua/conf/2019-mcfpga/10-35598-mcfpga-2019-014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Greinsmark, Carl. "Ransomware." Thesis, Högskolan Kristianstad, Fakulteten för naturvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-20695.

Full text
Abstract:
This thesis researches different ransomwares, how we can stop them and how their threat vectors work. It is important to notice that when solving one ransomware doesn’t solve the next incoming one. In this thesis we investigate six different ransomwares that spread between 2016-2019. We investigate the encryption methods, the different threat vectors, infection spreading and how to prevent from them by doing a theoretical and practical study. The results show that after infection of a ransomware, it encrypts the data instantaneously on the system. Fortunately, to keep information safe there ar
APA, Harvard, Vancouver, ISO, and other styles
8

Samuel, David. "RFID security in door locks." Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-12186.

Full text
Abstract:
<p>Radio frequency identification, RFID is a technology that is used in many fields including locks. The unlimited access to the reader and the transponder has resulted in severe security weaknesses and made it possible to apply different attacks. To classify door locks as secure they must at least fulfil two main criteria: the first is the use of a challenge-response authentication protocol and the second is to deploy sophisticated and secure algorithms.</p><p>MiFare classic and KeeLoq are two widely applied technologies that are still in use in many security critical applications and are con
APA, Harvard, Vancouver, ISO, and other styles
9

Manteena, Rajender. "A VHDL Implemetation of the Advanced Encryption Standard-Rijndael Algorithm." Scholar Commons, 2004. https://scholarcommons.usf.edu/etd/1149.

Full text
Abstract:
The National Institute of Standards and Technology (NIST) has initiated a process to develop a Federal information Processing Standard (FIPS) for the Advanced Encryption Standard (AES), specifying an Advanced Encryption Algorithm to replace the Data Encryption standard (DES) the Expired in 1998. NIST has solicited candidate algorithms for inclusion in AES, resulting in fifteen official candidate algorithms of which Rijndael was chosen as the Advanced Encryption Standard. The Advanced Encryption Standard can be programmed in software or built with pure hardware. However Field Programmable Gate
APA, Harvard, Vancouver, ISO, and other styles
10

Kundur, Abhinay. "Digital and Analog Signal Encryption and Decryption in Mid RF Range Using Hybrid Acousto-Optic Chaos." University of Dayton / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1336100009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Chaparala, Suman Krishna. "Secure Encryption and Decryption by Aperture Variations of a Photodetector in an Acousto-Optic Bragg Cell." University of Dayton / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1468527741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kandi, Jayavardhan R. "Embedded Cryptography: An Analysis and Evaluation of Performance and Code Optimization Techniques for Encryption and Decryption in Embedded Systems." [Tampa, Fla.] : University of South Florida, 2003. http://purl.fcla.edu/fcla/etd/SFE0000151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Zhao, Weiliang, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Security techniques for electronic commerce applications." THESIS_CSTE_CIT_Zhao_W.xml, 2003. http://handle.uws.edu.au:8081/1959.7/127.

Full text
Abstract:
Electronic commerce and the internet provide greater opportunities for companies and individual person to be involved in commercial activities; the involved parties may not know or trust each other or may even be mutually suspicious of each other. The issue of fairness becomes more critical and must be well addressed. The aim of this thesis is to investigate security solutions with fairness for on-line transactions. A fair trading protocol with credit payment is proposed. The proof of equivalence of discrete logarithm to discrete loglogarithm is employed as the main tool to construct the proto
APA, Harvard, Vancouver, ISO, and other styles
14

Lisoněk, David. "Šifrování SMS pro mobilní komunikaci." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235448.

Full text
Abstract:
This thesis deals with encryption of short text message (SMS) in mobile communication. Introduction is dedicated to overview of the parts of GSM radiotelephone nets and SMS messages transfer . Next chapter is reserved for description of cryptographic methods especially symetric and asymetric encryptografic aproaches. A design of a SMS messages encryption and decryption techniques is in next. For SMS encryption and sign, there is used the asymetric cypher RSA. Encryption use OAEP padding schema. The public key is saved in certificate. The Symbian OS has been choosen as a suitable platform for p
APA, Harvard, Vancouver, ISO, and other styles
15

Špidla, Milan. "Možnosti narušení bezpečnosti bezdrátové přístupové sítě." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218086.

Full text
Abstract:
Master´s thesis „Security risks of wireless access networks“ deals with wireless access networks, which are the most widespread in this time. The main target is realization of attacks wireless access networks protected by various using methods. This thesis shows main securities gaps, which originate from project this networks. These securities gaps are used for realization attacts in practical part. In the next part I took attention of network´s monitoring possibilities.
APA, Harvard, Vancouver, ISO, and other styles
16

Almehmadi, Fares Saleh S. "Secure Chaotic Transmission of Digital and Analog Signals Under Profiled Beam Propagation in Acousto-Optic Bragg Cells with Feedback." University of Dayton / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1426781250.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Ringmann, Björn, and Peter Hildeblom. "Minnet sviker Aldrig : Att utnyttja volatil data i Krypterade system." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-26424.

Full text
Abstract:
When the use of encryption amongst the regular computer user grows morewidespread than ever it makes the life of the IT-forensics experts difficult.Hampering the judicial investigations that otherwise could have lead to convictions. In this report we will treat the subject of crypto analysis with a focus on decrypting files and devices encrypted with the software TrueCrypt. A solution will be presented that can facilitate the future work involving encryption. The application DFEAT that has been developed during the writings of this report is faster than the corresponding software EFDD, and att
APA, Harvard, Vancouver, ISO, and other styles
18

Liljekvist, Erika, and Oscar Hedlund. "Uncovering Signal : Simplifying Forensic Investigations of the Signal Application." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44835.

Full text
Abstract:
The increasing availability of easy-to-use end-to-end encrypted messaging applications has made it possible for more people to conduct their conversations privately. This is something that criminals have taken advantage of and it has proven to make digital forensic investigations more difficult as methods of decrypting the data are needed. In this thesis, data from iOS and Windows devices is extracted and analysed, with focus on the application Signal. Even though other operating systems are compatible with the Signal application, such as Android, it is outside the scope of this thesis. The re
APA, Harvard, Vancouver, ISO, and other styles
19

Lien, E.-Jen, and 連一真. "Modular Large Number Encryption/Decryption Processor Design." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/61653002071694188155.

Full text
Abstract:
碩士<br>國立臺灣大學<br>電機工程學研究所<br>87<br>Combined with the widely used electrical communication, cryptosystem becomes more and more important. If we want to keep each communication in high secret, we must apply cryptosystem. There exist two main types of cryptosystems. One is the public-key cryptosystem; the other is the secret-key cryptosystem. The most famous public-key cryptosystem is RSA cryptosystem. In a RSA cipher system, the bit length of the modulus is very big. Montgomery suggested a new algorithm, which can be implemented into hardware efficiently. So many people modified the or
APA, Harvard, Vancouver, ISO, and other styles
20

Chien, Chih-Feng, and 簡志峰. "A High Throughput Programmable Encryption/Decryption Processor." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/71226350051530015461.

Full text
Abstract:
碩士<br>國立清華大學<br>產業研發碩士積體電路設計專班<br>95<br>The AES (Advanced Encryption Standard) algorithm is a new standard algorithm of symmetric-key cryptography system. In order to replace DES algorithm, the Rijndael’s algorithm was selected as the Advanced Encryption Standard (AES) by the National Institute of Standards and Technology (NIST). Cryptographic applications are often applied to application specific integrated circuit (ASIC) design as it is trusted in sufficient security level. However, fixed hardware implementations become more and more insecure because it is impossible to update or upgrade in
APA, Harvard, Vancouver, ISO, and other styles
21

Hsu, Ho-Kai, and 許賀凱. "An Encryption/Decryption Scheme for Smart Locks." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/sbw28v.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>電機工程系<br>105<br>With the vigorous development of Internet of Things, more and more smart home’s products are popular. Smart lock is a basic product of smart-home, and it could make products be easier to show the convenience via technology. Although the smart lock is an elementary product, it is the most important home’s security. Therefore, how developers build a smart lock is a huge challenge. This paper proposes a mechanism with encryption and decryption for smart lock system which contains the One Password authentication protocol called Secure Remote Password, the fingerp
APA, Harvard, Vancouver, ISO, and other styles
22

Lin, Mei-Ling, and 林美伶. "Elliptic Curve Encryption/Decryption IP for SoC Design." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/rmrf83.

Full text
Abstract:
碩士<br>國立東華大學<br>資訊工程學系<br>94<br>Since network technique develops quickly, it has become important to provide the privacy and safety with transmitting messages. Compared to the presented cryptosystems, Elliptic Curve Cryptosystems (ECC) based on discrete logarithms offers the same security with a far smaller key size. However, the operation of the ECC is more complex than those of other cryptosystems. Thus, it can not achieve a high performance when using software to design and implement the ECC. In this paper, we use the hardware to design and implement an ECC chip based on . And we also prop
APA, Harvard, Vancouver, ISO, and other styles
23

Huang, Yu-Rong, and 黃昱融. "Text file encryption and decryption of laser printer." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/gh7gbt.

Full text
Abstract:
碩士<br>國立中正大學<br>機械工程學系暨研究所<br>104<br>Printer identification based on a printed document can provide forensic information to protect copyright and verify authenticity. Some features generated by modulating EP process such like raggedness of the edge in the text, can be designed and utilized to help develop the extrinsic signature. In this thesis, we will investigate embedding extrinsic signature in text documents using laser intensity as a signal modulation source and develop extrinsic signatures using Kasami seuquence. The experimental results show that for a typical 40 point text document wit
APA, Harvard, Vancouver, ISO, and other styles
24

Chang, Hsiang-Nien, and 張翔年. "Design of Efficient RC6 Encryption and Decryption Systems." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/51646697241689813050.

Full text
Abstract:
碩士<br>國立東華大學<br>電子工程研究所<br>98<br>The RC6 algorithm is an effective encryption method proposed in recent years. It is a type of symmetric-key encryption, which not only provides enough data security but also supports simple 128-bit block cipher encryption. The key feature of the RC6 algorithm is that it uses large amount of data dependencies in its computation. This feature facilitates relatively less computation during the rotate operation stage in the core of the algorithm, while it still meets the data security requirements. Furthermore, the RC6 algorithm flexibly supports 128-bit, 192-bit a
APA, Harvard, Vancouver, ISO, and other styles
25

Chang, Chien-Cheng, and 張建誠. "The Design of a RSA Encryption/Decryption Circuit." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/61393486894775458082.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>電子工程系<br>88<br>The RSA encryption algorithm is widely used in communication and data security system. It takes much time to perform because of the RSA algorithm using more than 512-bit word lengths to guarantee security. Developing a high speed RSA encryption circuit which takes less gate count and can carry out its layout easily, will be a challenge. In this thesis, a 1024-bit RSA encryption circuit that is constructed by two 1024-bit adders is proposed. Based on the consideration of speed and regularity, a 1024-bit hierarchical carry skip adder consisting of 8 bi
APA, Harvard, Vancouver, ISO, and other styles
26

LIN, JING-CHI, and 林敬奇. "XOR Gate Design for Encryption and Decryption Circuit." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/79570156697789872292.

Full text
Abstract:
碩士<br>東海大學<br>電機工程學系<br>102<br>With the rapid growth of portable device software, the communication security becomes more and more important. However, using traditional encryption/decryption scheme without special components results in huge power consumption and computation time. In this thesis, we propose the low power XOR/XNOR logic gates for Sbox/InvSBox circuits, which are greatly used in encryption/decryption schemes. Several typical and modern XOR/XNOR logic gates are implemented by BSIM-CMG technology and simulated by HSPICE. The simulation results show that the low power Sbox can be im
APA, Harvard, Vancouver, ISO, and other styles
27

GAO, ZHI-MING, and 高志名. "Design FPGA Prototype for Video Encryption and Decryption." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/42443168945074536984.

Full text
Abstract:
碩士<br>中華科技大學<br>電子工程研究所碩士班<br>101<br>With the development of video camera technology, the portable video camera such as digital cameras, car camera recorders, smart phones are widely used. Nowadays, with video camera lens continuous progress, electronic products have multi-media video functions such that we can share images more conveniently. ”Every Solution Breeds the New Problems.” With that powerful device, the information security and personal privacy are becoming the huge problems that we should handle. Therefore, the real time image protection is very important.   In this thesis, a video
APA, Harvard, Vancouver, ISO, and other styles
28

Lin, Lian-Yuan, and 林連源. "A Study of Fuzzy-based Encryption and Decryption." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/00577121938949825042.

Full text
Abstract:
碩士<br>國立臺灣師範大學<br>應用電子科技研究所<br>95<br>Many methods of cryptography are available nowadays. They are used in several situations such as financial processing system, electronic commerce and electronic data interchange. Each has its own specific purpose and implementation algorithm. But no one is without any disadvantage even the best policy is carried on. The thesis proposed a method based on Fuzzy Theory to improve the information security by increasing the complexity of decryption for fuzzy-based encryption source data. The simulation results of security quality are better than former cryptogra
APA, Harvard, Vancouver, ISO, and other styles
29

Chuang, Ming-Chuan, and 莊銘權. "Suitable for JPEG 2000 Image Encryption/Decryption Scheme." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/85047454584863342890.

Full text
Abstract:
碩士<br>國防大學中正理工學院<br>電子工程研究所<br>96<br>Image encryption is a very important part for image security. Image compression technologies change with each passing day. They not only improve compression efficiency, but also provide a rich set of features for a variety of applications. Therefore, an efficient image encryption method should be developed according to the characteristics of the compression technique itself. JPEG 2000 is an emerging standard for still image compression. JPEG 2000 provides various functionalities to solve the problems for different image applications and possibly become a mo
APA, Harvard, Vancouver, ISO, and other styles
30

Lin, Guang-Huei, and 林光輝. "Design and Implementation of an Encryption/Decryption Coprocessor." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/09525687797215334610.

Full text
Abstract:
碩士<br>國立臺灣大學<br>電機工程學系<br>86<br>As internet becomes popular today, more and more services will operate on internet, e.g., internet market, electronic bank, and electronic government. These services require high data security in network communication, such that encryption of data transfering between server and client is necessary. Higher data security indicates more complex cryptography computation. Two cryptosystems are using today for internet services, one is the symmetric-key cryprtosy
APA, Harvard, Vancouver, ISO, and other styles
31

Chang, Fu-Hsiang, and 張富翔. "Design and Implementation of a Twofish Encryption/Decryption Chip." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/02068072808655441304.

Full text
Abstract:
碩士<br>國立東華大學<br>資訊工程學系<br>90<br>In 1997, NIST (National Institute of Standards and Technology) announced the Advanced Encryption Standard (AES) program to replace DES. NIST’s call design criteria are block cipher, a longer key length, larger block size, faster speed, and greater flexibility. Twofish was one of those schemes that meet NIST’s design criteria for AES. In a cipher, complicated round functions are harder to analyze and are not always better than simple ones. Hence, one of the guiding principles of Twofish is that the round function should be simple enough. With enough rounds, s
APA, Harvard, Vancouver, ISO, and other styles
32

Wisdom and 陳忠智. "A Study on Chip Design of Symmetric Encryption/Decryption." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/91780663138130828909.

Full text
Abstract:
碩士<br>中華技術學院<br>電子工程研究所碩士班<br>94<br>This thesis is to study the IP (Intellectual Property) implementation of three types of symmetric encryption / decryption algorithms on DES, Triple DES and AES. This thesis show, how to simplify the algorithm of the round redundant circuit, reduce the logic element in the FPGA, and improve the performance efficiently. After the optimization, the performance rate is up to 1,368Mbps and 1,892 Mbps respectively for DES & AES function. These IP design is based on the popular low cost FPGA, it integrated the DES, Triple DES and AES in one single chip. The prototy
APA, Harvard, Vancouver, ISO, and other styles
33

Jwo, Hung-Ming, and 卓宏洺. "Research of RSA Encryption/Decryption Based on Embedded System." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/tcf94z.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>電子工程系<br>94<br>Human life gets more and more dependent on internet as it grows rapidly. By means of internet, we can not only transfer text, audio, and video data, but also buy goods and pay for them. But in a public domain like internet, private personal information can be captured easily and therefore encryption is necessary to prevent captured data readable. Based on a developing platform with Samsung S3C2410 as its CPU, this thesis develops a internet transfer application that encrypts files with RSA before sending out via internet, and decrypts them after receiving at re
APA, Harvard, Vancouver, ISO, and other styles
34

Prangjarote, Panyaporn, and Panyaporn Prangjarote. "Multimedia Content Protection via Joint Fingerprinting and Decryption Framework." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/90094479620115056335.

Full text
Abstract:
博士<br>亞洲大學<br>資訊工程學系<br>102<br>With the advancement of the Internet and development of multimedia technology, multimedia data have been an ease to access and distribute from one place to another. Obviously, the multimedia data can be protected before and after transmission by multimedia encryption, but data security after decryption against illegal users are critical and urgent. Only combination of encryption and fingerprinting, generally known as joint fingerprinting and decryption (JFD), can provide both confidentially and proper usages suitable for multimedia content protection. Inspired by
APA, Harvard, Vancouver, ISO, and other styles
35

Hu, Chia-Ming, and 胡家銘. "The Study of Data Decryption Process of Electronic Documents." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/57613619561601142563.

Full text
Abstract:
碩士<br>醒吾科技大學<br>資訊科技系所<br>101<br>The existing Web-based document system in file transfer process, to achieve the contents cannot be copied and altered from an official document in file transfer system are major difficulties of the management problem. Using public key encryption to ensure the electronic documents system is securitized. Through certification to confirm users to achieve non-repudiation, the file transfer creation of a safe environment is the basic needs of the enterprise. This research uses the office automation systems in a closed network, and achieves the simplicity and ease of
APA, Harvard, Vancouver, ISO, and other styles
36

陳嘉耀. "An Efficient Decryption Method for RSA Cryptosystem And Implementation." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/71835300207564971666.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Pujari, Abhisek, and Chandan Padhi. "Encryption & Decryption of Data in GF (13n) Field." Thesis, 2009. http://ethesis.nitrkl.ac.in/457/1/thesis_9006-09.pdf.

Full text
Abstract:
Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks (like the Internet) so that it cannot be read by anyone except the intended recipient. Cryptographic strength is measured in the time and resources it would require to recover the plaintext. The result of strong cryptography is cipher text that is very difficult to decipher without possession of the appropriate decoding tool. A cryptographic algorithm, or cipher, is a mathematical function used in the encryption and dec
APA, Harvard, Vancouver, ISO, and other styles
38

Bih-Ching, Yeh. "512-bit RSA Public Key Data Encryption/Decryption Chip Design." 1997. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0009-0112200611290358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Tung, Li-Chung, and 董力中. "Design and Implementation of an Asynchronous AES Encryption/Decryption Chip." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/90903697099582779167.

Full text
Abstract:
碩士<br>國立東華大學<br>資訊工程學系<br>90<br>When people transmit information over data network, hackers may attack it. Hence, the security of information is a critical issue. National Bureau of Standards (NBS) announce the Data Encryption Standard (DES) as the encryption scheme in 1977. As technology advances, the computer operates faster and faster. The DES is no longer a safe scheme security. Due to this, Rijndael is selected as the Advanced Encryption Standard (AES) in 2000 by NIST. Rijndael is a symmetric block cipher, and it allows scalable block length and the key length is 128, 192 and 256 bits. It
APA, Harvard, Vancouver, ISO, and other styles
40

Takagi, Tsuyoshi [Verfasser]. "New public-key cryptosystems with fast decryption / von Tsuyoshi Takagi." 2001. http://d-nb.info/962729302/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Chen, Yan-Chiau, and 陳彥樵. "Firmware Encryption and Decryption Using 2.43 GHz Digital Wireless Transceiver." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/vd9p2e.

Full text
Abstract:
碩士<br>國立臺北科技大學<br>電腦與通訊研究所<br>98<br>This thesis partitions mainly into two parts, one is the encryption/decryption of the data packet to be communicated and the other is the wireless transmission interface. The format of the wireless data packet generated by the 2.4 GHz UBEC UZ2400 transceiver module is IEEE 802.15.4-compliant. The data packet comprises the following various fields: preamble, start of frame, frame length, frame control, sequence number, addressing information, payload data, and frame check sequence (FCS). For the data encryption/decryption, the Advanced Encryption Standard (AE
APA, Harvard, Vancouver, ISO, and other styles
42

Zeng, Xi-Zhe, and 曾希哲. "The Design and Analysis of a RSA Encryption/Decryption Chip." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/36112321014998661900.

Full text
Abstract:
碩士<br>國立海洋大學<br>電機工程學系<br>88<br>The role of cryptography is more important to prevent the computer- and communication-based crime in recent years. Many applications of cryptographic methods have been proposed recently from electronic mail, trading, and banking to network security. In this thesis, the implementation of a 512 bits public key cryptosystem of RSA encryption/decryption chip is presented based on the Montgomery algorithm to simplify the complexity of exponential modular operation in RSA algorithm. The architecture of chip includes two components: modular and multiplier that are impl
APA, Harvard, Vancouver, ISO, and other styles
43

Chung, Yuan-Hao, and 鍾元浩. "The Design and Implementation of a SERPENT Encryption/Decryption Chip." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/88507663227267182029.

Full text
Abstract:
碩士<br>國立臺灣海洋大學<br>資訊工程學系<br>93<br>Security and privacy is an important issue in the future. Cryptography is one of the key features of security. Using hardware implementation can provide faster and more secure solution than software implementation. Recently, the Internet is so popular in the world and the required bandwidth is as large as possible. The encryption of the digital data becomes more important. The SERPENT cryptosystem is considered as the securest in the AES candidates. This paper presents the design and implementation of a SERPENT prvite key cryptosystem based on pipeline archi
APA, Harvard, Vancouver, ISO, and other styles
44

Chen, Taoan, and 陳道安. "The Implement of a 1536 bits RSA Encryption/Decryption Chip." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/51664063897658558255.

Full text
Abstract:
碩士<br>國立海洋大學<br>電機工程學系<br>89<br>It is obviously that security issues will play an important role in the majority of future computer and communication systems. Cryptographic algorithms and their software/hardware implementations are the major tools to achieve the system security. In this thesis, a 1536 bits RSA encryption/decryption chip based on the Montgomery algorithm is presented. The main structure of this chip includes an encryption/decryption module and a 64K*32 SRAM. The 32 bits encryption/ decryption module is implemented using Altera EFP10K200SRC240-1. Based on the same str
APA, Harvard, Vancouver, ISO, and other styles
45

ZHENG, YANG-JUN, and 鄭仰均. "Study on Cloud Server Aided Computation for Encryption and Decryption." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/3rjxd5.

Full text
Abstract:
碩士<br>南臺科技大學<br>資訊工程系<br>106<br>With the development of cloud computing in recent years, the large number of cryptographic algorithms that were only carried out on mobile devices in the past has now become available with the assistance of cloud servers. Clients (encryptors or decryptors) can take advantage of the powerful calculating ability of the cloud server to perform the complex computation. Once the clients receive the computing results, they could encrypt or decrypt the texts by combining the results. However, from the perspective of information security, this type of cryptographic algo
APA, Harvard, Vancouver, ISO, and other styles
46

Huang, Ching-Min, and 黃靖閔. "Design and Implementation of 1024-bit Systolic RSA Encryption/Decryption Chip." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/24237273771142804259.

Full text
Abstract:
碩士<br>國立臺灣大學<br>電機工程學研究所<br>88<br>With the increasing popularity of electronic communications, data security is becoming a more and more important issue. There are two main types of cryptosystems. One is private-key cryptosystem, and the other is public-key cryptosystem. The most famous and popular public-key cryptosystem is RSA scheme. RSA scheme is composed of large bit-length modular multiplication and modular exponentiation in principle. Because of the high complexity of modular exponentiation, it is very difficult to factor it and obtain the private-key from the public-key. Mon
APA, Harvard, Vancouver, ISO, and other styles
47

Tsai, Chu-Yuan, and 蔡志垣. "A Data Encryption and Decryption Device Implemented by An Embedded Platform." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/75321813272128436722.

Full text
Abstract:
碩士<br>國立中興大學<br>電機工程學系所<br>95<br>Since the flourishing development of Internet, there are more and more applications on Internet. But when network uses more and more extensive, the privacy of personal materials getting more and more important. Thus, many kinds of security mechanism are used in various kinds of applications in cryptography. Unfortunately, although those mechanisms improvement the safe of material security, the overhead of system increases. This thesis using OCF to change hardware en/decrypt functionality provide by IXP425 into a device file, which will include into kernel suppo
APA, Harvard, Vancouver, ISO, and other styles
48

Huang, Wen-Lung, and 黃文龍. "PARTIAL FORMAT COMPLIANT MPEG VIDEO ENCRYPTION / DECRYPTION BASED ON CHAOS THEORY." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/97121808368864369675.

Full text
Abstract:
碩士<br>大同大學<br>電機工程學系(所)<br>94<br>The security of multimedia data is more and more important for multimedia commerce. The encryption algorithms developed to secure text data may not be suitable to multimedia applications because of large data sizes and real time constraint. Different from military secrets or financial information, multimedia videos the information rate of multimedia videos is very high, but information value is very low. In the literatures, some existing light weight multimedia encryption techniques had been developed to avoid the exposure of multimedia content. To break such e
APA, Harvard, Vancouver, ISO, and other styles
49

Lai, Ue-Ln, and 賴譽仁. "Hardware Architecture Design and Implementation of Elliptic Curve Encryption/Decryption Algorithms." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/60556511931839409769.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>電子工程系<br>90<br>In this thesis, the VLSI architecture design and implementation of two 162-bit elliptic curve encryption/decryption chips are presented. One of them is based-on the IEEE 1363-2000 standard, and the other is based-on the arithmetic operations over extension field. All of the chips perform arithmetic operations over field on projective coordinates with optimal normal-basis representation. To provide the flexibility of interfacing with common microprocessors, the data bus width can be set to 8, 16, or 32 bits. The performance of extension-field-based chip is super
APA, Harvard, Vancouver, ISO, and other styles
50

Lai, SUAN-YUAN, and 賴士元. "The Design and Verification of a RSA Encryption/Decryption Intellectual Porperty." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/41241755407620563913.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>電子工程系<br>93<br>The success of high-performance computers and high-speed networking brings us a high-speed information-exchanging network. People begin to setup electric commercial platform and transfer important information on the Internet. Since the Internet is a public channel, the networking security becomes an important issue now. In order to prevent the information from being stolen or modified by unauthorized ones, we need some high security device to protect our information on networking systems. In this paper, we focus on the architecture design of a 1024-b
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!