Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Post: #1


In this world of increasing electronic connectivity of viruses, hackers, eaves-dropping and electronic fraud, electronic security is necessary always for transmitting secure electronic-data across insecure networks such as the internet. So, in order to ensure this electronic security, cryptography evolved leading to the development of various cryptosystems.
The main objective of this project is to develop three such cryptosystems- Advanced Encryption Standard (AES), Rivest Shamir Adleman (RSA) Cryptosystem and Elliptic Curve cryptosystem (ECC). All these three cryptosystems are implemented in a sender-receiver environment simulating how the cryptography is used for real-world applications. Also, another aim is to design an API to implement encryption /decryption algorithms for all these three cryptosystems.
AES algorithm is implemented for all three key sizes ie., 128 bit, 192 bit, 256 bits. RSA is implemented for a key size of 1024 bits. ECC is implemented using elliptic curves over GF(P) in contrary to most ECC implementations which uses GF(2^n).
The idea behind the implementation of all these three cryptosystems is to provide a stream-based environment where encryption and decryption is essentially done by crypto-streams that can be plugged in right away where needed. Various properties of elliptic curves (GF (p)) like point addition, point subtraction, point doubling and point multiplication are also presented. As of now the ECC package does not support constructions of arbitrary elliptic curves and corresponding generators. This means that it is based on predefined curves, namely 112, 160 or 256 bit curves taken from Standards of Efficient Cryptography (SEC) are described.

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: aes education services group, aes 128 code implementation on spartan 3e, aes implementation in java, aes implementation in javaarketing, aes advantages and disadvantages, aes algorithm implementation for image in java, aes using vhdl ppt,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs Projects9 6 2,578 10-01-2015 11:13 PM
Last Post: Guest
  Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-B Projects9 3 2,189 15-04-2013 11:14 AM
Last Post: computer topic
  IMPLEMENTATION OF IMAGE STEGANOGRAPHY USING LSB TECHINQUE seminar presentation 6 4,858 04-02-2013 04:49 PM
Last Post: seminar details
  Cooperative Caching in Wireless P2P Networks: Design, Implementation, and Evaluation seminar class 2 2,489 02-02-2013 02:08 PM
Last Post: seminar details
Wink Implementation of a simple device mediation application of a Network Management Syste computer science crazy 2 1,465 06-12-2012 01:57 PM
Last Post: seminar details
Smile Implementation Of Digital Watermarking nit_cal 1 1,318 25-10-2012 12:56 PM
Last Post: seminar details
  Design and Implementation of an Open Autonomous Mobile Robot System full report seminar topics 1 1,869 19-10-2012 01:58 PM
Last Post: seminar details
  Implementation of Des Algorithm nit_cal 1 5,312 16-02-2012 12:34 PM
Last Post: seminar paper
  Virtual Private Network (RSA) project topics 1 1,340 30-11-2011 09:59 PM
Last Post: VickyBujju
  Implementation of UPQC for Voltage Sag Mitigation seminar class 4 1,832 28-10-2011 09:35 AM
Last Post: seminar addict