Please use this identifier to cite or link to this item:
https://elibrary.tucl.edu.np/handle/123456789/4144
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Paneru, Thaneshor Prasad | - |
dc.date.accessioned | 2021-08-16T09:51:01Z | - |
dc.date.available | 2021-08-16T09:51:01Z | - |
dc.date.issued | 2011 | - |
dc.identifier.uri | http://elibrary.tucl.edu.np/handle/123456789/4144 | - |
dc.description.abstract | Secure data transmission is a significant problem in human history. Following the problem, security is one of the flourishing areas in the field of computer science and information technology which deals with prevention and protection of assets, both logical (data) and physical (hardware), from unauthorized access, use, alteration, degradation, destruction and other threats. Many encryption algorithms have come and gone as cryptography, cryptanalysis, and technology have progressed. Today’s communication and computer technologies need cryptography to truly secure data in many applications. The demands on the cryptography needed for some commercial applications will exceed the security offered by the National Bureau of Standards Data Encryption Standard (DES) in the near future due to advances in technology, advances in cryptanalysis, and the increasing rewards for breaking such a heavily used algorithm. To meet part of this need, a new block encryption algorithm is proposed. This algorithm is implemented using C-programming language. One way to further increase security of encrypted data, as well as to achieve storage and/or transmission economy, is by redundancy reduction prior to encryption. A linguistic approach to redundancy reduction, together with an example computer program to implement it, is given for this purpose. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Department of Computer Science and Information Technology | en_US |
dc.subject | data transmission | en_US |
dc.subject | information technology | en_US |
dc.title | Symmetric Encryption Algorithm Using Code Reuse Technique for Authentication Based on Needham Schroeders’ Protocol | en_US |
dc.type | Thesis | en_US |
local.institute.title | Central Department of Computer Science and Information Technology | en_US |
local.academic.level | Masters | en_US |
Appears in Collections: | Computer Science & Information Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Full Thesis.pdf | 708.77 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.