Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
21Activity
0 of .
Results for:
No results containing your search query
P. 1
RSA and IDEA Security Algorithms

RSA and IDEA Security Algorithms

Ratings:

4.33

(3)
|Views: 3,432|Likes:
Published by zahra.shuaibi
study and implementation of the RSA and IDEA encryption algorithms,a graduation Project submitted to the Computer Science department in birzeit university in partial fulfillment of the Requirements for the degree of B.Sc. in computer Science
study and implementation of the RSA and IDEA encryption algorithms,a graduation Project submitted to the Computer Science department in birzeit university in partial fulfillment of the Requirements for the degree of B.Sc. in computer Science

More info:

Categories:Types, School Work
Published by: zahra.shuaibi on Jul 06, 2008
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

07/13/2013

pdf

text

original

 
 
F
aculty Of 
I
nformation
T
echnology 
C
omputer
S
cience
D
epartment
A study and implementation of theRSA and IDEAEncryption Algorithms
 
Prepared By
:
Zahra Shuaibi Lina Mustafa1040589 1040766
Supervised By
:
Miss. Muna Al-Khayyat
Directed By
:
 
Mr. Nael Qaraeen
 

BIRZEITJune – 2008
 
 
 2
Table of Contents
 
Item
page
List of Figures
 
4
List of tables
 
5
Dedications
 
6
ا
 
7
Abstract
 
8
1.
 
Chapter 1 Introduction
9
2.
 
Chapter 2 Information Security and Cryptography
10
2.1 Brief History
10
2.2 Information Security and Cryptography Definitions
10
2.3 Cryptography Types2.3.1 Symmetric (Secret key)2.3.1.1 Block ciphers2.3.1.2 Stream ciphers2.3.2
 
Asymmetric ( Public- key )
1111121313
2.4 Key Management2.4.1
 
Introduction2.4.2
 
 Numbers generation2.4.3
 
Key generation and storage2.4.3.1 Password-based encryption (PBE)
1414141516
2.5 Cryptographic goals and benefits
17
2.6 Attacks and security
 
18
2.7 Mathematics
19
3.
 
Chapter 3 RSA and IDEA algorithms
21
3.1 RSA3.1.1 Introduction
2121
 
 3
3.1.2 RSA Algorithm3.1.3 RSA Mathematics3.1.4 RSA Usage3.1.5 RSA Security3.1.6 RSA Possible Attacks
2122232424
3.2 IDEA3.2.1 Introduction3.2.2 IDEA Algorithm3.2.2.1 IDEA Key Schedule3.2.2.2 IDEA encryption / Decryption3.2.3 IDEA Security3.2.4 IDEA Possible Attack 
27272727303233
4. Chapter 4 Code Implementation and Attacks
 
35
4.1 RSA Algorithm Implementation
 
35
4.2 RSA Attacks:
36
4.3 IDEA Algorithm Implementation:
 
38
4.4 IDEA Attacks:
 
41
5.Chapter 5 Comparative Analysis
49
5.1 RSA vs. IDEA
49
5.2. Analytical Analysis
49
6.Chapter 6 Conclusions
55
6.1 Conclusions
 
55
6.2 Future Work 
 
55
Appendices
 
56
A. Bibliography
 
56
B. Code
 
58

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->