Asymmetrical Encryption

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 60 Experts worldwide ranked by ideXlab platform

H E Chengwan - One of the best experts on this subject based on the ideXlab platform.

  • solution of windows files security protection based on file system filter driver
    Journal of Computer Applications, 2009
    Co-Authors: H E Chengwan
    Abstract:

    In order to solve the problem that enhancing files security needs high cost, a solution to Windows files security protection with low cost was proposed. It was based on Windows NT driver and file system filter driver to encrypt and decrypt the files. File content was encrypted with fast symmetrical Encryption algorithm, and every file had one Encryption key. File Encryption key was encrypted with safer Asymmetrical Encryption algorithm, and encrypted Encryption key was saved in the Encryption key file. Through storing the private key in the U disk, the system security was enhanced. Additionally, a method of encrypted file share was introduced into this paper. Analysis and application results show that when the memory is lost, administrator password is cracked and files are shared, and the solution can enhance file security with low cost.

Havlíček Jiří - One of the best experts on this subject based on the ideXlab platform.

  • Encoding algorithms of soft cryptography
    Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013
    Co-Authors: Havlíček Jiří
    Abstract:

    This bachelor's thesis deals with so called lightweight crptography which is specified for low-efficiency hardware. The first part of my thesis explains basic terms and principles of cryptography, difference between symmetrical and Asymmetrical Encryption including description of the most widespread examples of both of these cryptography's branches. The thesis continues with the description and parametric comparison of newly developed algorithms focusing on lightweight cryptography. I specially pay attention to current and block ciphers and hash functions. Afterwards the thesis describes limited computing power hardware. This is about device which is limited from the point of view of power supply and size of chips. The description is focused on smart cards, RFD chips and microcontrollers. The practical part deals with testing of current ciphers which are designed for software implementations and with testing of current ciphers designed for lightweight cryptography. Results of the tests provide comprehensive view of differences of output of individual ciphers specified for different implementations

  • Encoding algorithms of soft cryptography
    Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013
    Co-Authors: Havlíček Jiří
    Abstract:

    Tato bakálářská práce se zabývá tzv. lehkou kryptografií určenou pro méně výkonný hardware. V první části práce jsou vysvětleny základní pojmy a princip kryptografie, rozdíl mezi symetrickým a asymetrickým šifrováním s popisem nejrozšířenějších zástupců obou těchto odvětví kryptografie. V práci jsou dále popsány a parametrově porovnány nově vyvinuté algoritmy se zaměřením na lehkou kryptografii. Pozornost je konkrétně věnována proudovým a blokovým šifrám a hashovacím funkcím. Následně se práce zabývá popisem hardwaru s omezeným výpočetním výkonem. Jedná se o zařízení omezené z hlediska napájení a velikosti samotných čipů. Popis je zaměřen na smart karty, RFID čipy a mikrokontroléry. Praktická část je zaměřena na testování proudových šifer navržených pro softwarové implementace a na testování speciálních proudových šifer navržených pro lehkou kryptografii. Výsledky těchto testů poskytují ucelený pohled na výkonnostní rozdíly jednotlivých šifer určených pro rozdílné implementace.This bachelor's thesis deals with so called lightweight crptography which is specified for low-efficiency hardware. The first part of my thesis explains basic terms and principles of cryptography, difference between symmetrical and Asymmetrical Encryption including description of the most widespread examples of both of these cryptography's branches. The thesis continues with the description and parametric comparison of newly developed algorithms focusing on lightweight cryptography. I specially pay attention to current and block ciphers and hash functions. Afterwards the thesis describes limited computing power hardware. This is about device which is limited from the point of view of power supply and size of chips. The description is focused on smart cards, RFD chips and microcontrollers. The practical part deals with testing of current ciphers which are designed for software implementations and with testing of current ciphers designed for lightweight cryptography. Results of the tests provide comprehensive view of differences of output of individual ciphers specified for different implementations.

Azinuddin Baharum - One of the best experts on this subject based on the ideXlab platform.

  • digitally signed electronic certificate for workshop azinuddin baharum
    2017
    Co-Authors: Azinuddin Baharum
    Abstract:

    Entering into the era of advancement in Information Technology, publishing qualification certificate in electronic form going forward. E-Certificate helps eliminate many problems that is associated with physical printed certificate such costs, management, and forgery problem. Even though implementation of such E-Certificate have been implemented around the globe, it has not been implemented for workshops in UiTM. User who owes an E-Certificate is able to retrieve from a web page and can be printed out. In order to handle the integrity issue, each certificate must be digitally signed by a signatory, and equivalent to hand signature. Digital Signature was encrypted by RSA Algorithm, a very powerful Asymmetrical Encryption. The system consist of a central database and organized into web page application which can be accessed by system admin, certificate user, and employer. In order to maintain the integrity of the E-Certificate, employers are allowed to verify the certificate in a specially made webpage to authenticate it. Web page application was programmed by Java Enterprise Edition (J2EE). Signatory however use a special Digital Signature Application which store the secret private key. The application was programmed by JAVA FX. The system was developed stage by stage as it is consist of many small components to form a large system. Therefore tests can be conducted as you develop the system. From tests, it was observed that all functions perfectly, accurately, and swiftly, indicating the advantages of an E-Certificate system.

Baharum Azinuddin - One of the best experts on this subject based on the ideXlab platform.

  • Digitally signed electronic certificate for workshop / Azinuddin Baharum
    2017
    Co-Authors: Baharum Azinuddin
    Abstract:

    Entering into the era of advancement in Information Technology, publishing qualification certificate in electronic form going forward. E-Certificate helps eliminate many problems that is associated with physical printed certificate such costs, management, and forgery problem. Even though implementation of such E-Certificate have been implemented around the globe, it has not been implemented for workshops in UiTM. User who owes an E-Certificate is able to retrieve from a web page and can be printed out. In order to handle the integrity issue, each certificate must be digitally signed by a signatory, and equivalent to hand signature. Digital Signature was encrypted by RSA Algorithm, a very powerful Asymmetrical Encryption. The system consist of a central database and organized into web page application which can be accessed by system admin, certificate user, and employer. In order to maintain the integrity of the E-Certificate, employers are allowed to verify the certificate in a specially made webpage to authenticate it. Web page application was programmed by Java Enterprise Edition (J2EE). Signatory however use a special Digital Signature Application which store the secret private key. The application was programmed by JAVA FX. The system was developed stage by stage as it is consist of many small components to form a large system. Therefore tests can be conducted as you develop the system. From tests, it was observed that all functions perfectly, accurately, and swiftly, indicating the advantages of an E-Certificate system

Chang Xiaopeng - One of the best experts on this subject based on the ideXlab platform.