DSpace Repository

A security algorithms based on chaffing and winnowing

Show simple item record

dc.contributor.advisor Dr. Aekavute Sujarae (Member) en_US
dc.contributor.advisor Dr. Dentcho N. Batanov (Member) en_US
dc.contributor.advisor Dr. Qi Yulu (Chairperson) en_US
dc.contributor.author Wichit Sombat en_US
dc.date December 2000 en_US
dc.date.accessioned 2015-01-12T10:39:21Z
dc.date.available 2015-01-12T10:39:21Z
dc.identifier.other AIT Thesis no.CS-00-33 en_US
dc.identifier.uri http://www.cs.ait.ac.th/xmlui/handle/123456789/206
dc.description 47 leaves en_US
dc.description.abstract The essence of securing information in the network environment is a major issue. Cryptographic algorithms are developed for such important task. They offer confidentiality, authentication, integrity, and non-repudiation. Recently, a threat from law enforcement specifies that there should be à à à à à ¢ key recoveryà à à à à ¢ for encryption in case serious matters occur: the à à à à à ¢ key recoveryà à à à à ¢ process assists the authorized person to recover the encrypted message. Though the process is useful for the government duty, it violates the human right of privacy. Among varieties of cryptographic algorithms proposed so à à à à à ¢ chaffing and winnowingà à à à à ¢ algorithm offers a way to get around the à à à à à ¢ key recoveryà à à à à ¢ process. The algorithm does not employ encryption. However, the algorithm produces large ciphertext and lacks of confidentiality. It is not applicable to the real network implementation where the size of transmitted data grows over the years. This study applies preprocessing input transformation to the algorithm to increase the security level and minimize the size of the ciphertext. en_US
dc.description.sponsorship Institute for the Promotion of Teaching Science and Technology (IPST) en_US
dc.relation.ispartof Thesis no. CS-00-33 en_US
dc.relation.ispartof Asian Institute of Technology. Thesis no. CS-00-33 en_US
dc.source SAT/CS en_US
dc.subject Data encryption (Computer science) en_US
dc.subject Computer networks -- Security measures en_US
dc.title A security algorithms based on chaffing and winnowing en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account