IMPLEMENTATION OF AES, RSA, ECC
#1

IMPLEMENTATION OF AES, RSA, ECC

Abstract:
In this world of increasing electronic connectivity of viruses, hackers, eaves-dropping and electronic fraud, electronic security is necessary always for transmitting secure electronic-data across insecure networks such as the internet. So, in order to ensure this electronic security, cryptography evolved leading to the development of various cryptosystems.
The main objective of this project is to develop three such cryptosystems- Advanced Encryption Standard (AES), Rivest Shamir Adleman (RSA) Cryptosystem and Elliptic Curve cryptosystem (ECC). All these three cryptosystems are implemented in a sender-receiver environment simulating how the cryptography is used for real-world applications. Also, another aim is to design an API to implement encryption /decryption algorithms for all these three cryptosystems.
AES algorithm is implemented for all three key sizes ie., 128 bit, 192 bit, 256 bits. RSA is implemented for a key size of 1024 bits. ECC is implemented using elliptic curves over GF(P) in contrary to most ECC implementations which uses GF(2^n).
The idea behind the implementation of all these three cryptosystems is to provide a stream-based environment where encryption and decryption is essentially done by crypto-streams that can be plugged in right away where needed. Various properties of elliptic curves (GF (p)) like point addition, point subtraction, point doubling and point multiplication are also presented. As of now the ECC package does not support constructions of arbitrary elliptic curves and corresponding generators. This means that it is based on predefined curves, namely 112, 160 or 256 bit curves taken from Standards of Efficient Cryptography (SEC) are described.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: aes video matlab, aes algorithm for image in java implementation, aes 256 matlab source code, aes advantages and disadvantages, rsa gcan, vhdl code ofr ecc cryptography on fpga, rsa france,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs Projects9 6 3,589 10-01-2015, 11:13 PM
Last Post: Guest
  Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-B Projects9 3 3,043 15-04-2013, 11:14 AM
Last Post: computer topic
  IMPLEMENTATION OF IMAGE STEGANOGRAPHY USING LSB TECHINQUE seminar presentation 6 5,835 04-02-2013, 04:49 PM
Last Post: seminar details
  Cooperative Caching in Wireless P2P Networks: Design, Implementation, and Evaluation seminar class 2 3,333 02-02-2013, 02:08 PM
Last Post: seminar details
Wink Implementation of a simple device mediation application of a Network Management Syste computer science crazy 2 2,186 06-12-2012, 01:57 PM
Last Post: seminar details
Smile Implementation Of Digital Watermarking nit_cal 1 1,802 25-10-2012, 12:56 PM
Last Post: seminar details
  Design and Implementation of an Open Autonomous Mobile Robot System full report seminar topics 1 2,458 19-10-2012, 01:58 PM
Last Post: seminar details
  Implementation of Des Algorithm nit_cal 1 5,973 16-02-2012, 12:34 PM
Last Post: seminar paper
  Virtual Private Network (RSA) project topics 1 1,787 30-11-2011, 09:59 PM
Last Post: VickyBujju
  Implementation of UPQC for Voltage Sag Mitigation seminar class 4 2,526 28-10-2011, 09:35 AM
Last Post: seminar addict

Forum Jump: