CRPTOGRAPHY AND N/W SECURITY
#1

please send me details about this topic
Reply
#2

Cryptography and Network Security

finite fields
Finite fields are becoming increasingly important in cryptography. Several modern cryptographic algorithms rely on computations in various finite fields, among them are AES and elliptic curve cryptography. Here, AES uses arithmetic in the finite field GF(28). All encryption algorithms whether symmetric key or public-key encryption involve arithmetic operations on integers. If we decide to work on n-bit integers, for efficiency of storage we would like to be able to use all integers on n-bits. This in turn means we have to do operations on integers from 0 to 2^(n-1) . We need finite fields having p^n elements, with p a prime number. The concepts needed for the basic understanding of AES are:
-Groups, rings, fields
Group(G, ¢,e): a set G with a binary operation ¢and an element ebelongs to G satisfying the Associativity, Identity element, and inverse element laws

-Divisors, modular arithmetic
Ring(R,+,¢,0): a set R with two binary operations + and ¢satisfying the commutative, associative and distributive laws.

-Euclidâ„¢s algorithm
Euclid's Algorithmto compute gcd(a,b) “Euclid(a,b) (assume b>0) is summarised as:
If b=0 then return a
Else return Euclid(b,a mod b)

-Polynomial arithmetic
Ordinary polnomial arithmetic include Adding/subtracting two polynomials which is done by adding/subtracting the corresponding coefficients
-Multiplyingtwo polynomials which is done in the usual way, by multiplying all terms with each other
-Division(not necessarily exact) of two polynomials can also be defined if the coefficients are in a field.

Computational considerations
In computer implementations of the above operations,
Addition of polynomials becomes bitwise XOR of their n-bit representations and Multiplication is shift & XOR: example for GF(2^8) with m(x)=x8+x4+x3+x+1 (AES).


[attachment=1150]

for more details, visit this thread also:
http://studentbank.in/report-Cryptography--5386
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: document of embedded extended visual crptography schemes, euclid in raphael, download ieee crptography research paper 2014, security for dns using crptography php project code, crptography and n w security, polynomials, disadvantages of image crptography,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  file transfer and lan chat for wireless and wired network ugo1 2 10,535 20-02-2016, 03:07 PM
Last Post: seminar report asees
  Touch screen and zigbee based wireless assistant for dumb and illiterate in airline. tausif_malakand 4 10,131 03-06-2015, 03:12 PM
Last Post: seminar report asees
  Using your mobile miss call as password (security) iwantit 4 3,782 03-11-2014, 09:50 PM
Last Post: Guest
  Bank locker security system with SMS mobile alert jijojjose91 3 3,272 08-08-2014, 09:31 PM
Last Post: seminar report asees
  ensuring data storage security in cloud computing madhuri.nallam1708 13 7,916 21-01-2013, 03:24 PM
Last Post: seminar details
  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computin [email protected] 4 2,758 24-10-2012, 01:47 PM
Last Post: seminar details
  Dynamic Routing with Security Considerations govindveera 3 1,472 02-10-2012, 01:05 PM
Last Post: seminar details
  52. SECURITY SYSTEM toushif khan 1 667 14-03-2012, 01:14 PM
Last Post: seminar paper
  microprocessor based security system saru k 1 1,023 12-03-2012, 12:51 PM
Last Post: seminar paper
  Automated state boader security check post,using wireless devices semiru 1 1,232 08-03-2012, 12:21 PM
Last Post: seminar paper

Forum Jump: