CRPTOGRAPHY AND N/W SECURITY
fintovadakkan Active In SP Posts: 1 Joined: Jan 2010 
14012010, 05:38 PM
please send me details about this topic 


justlikeheaven Active In SP Posts: 247 Joined: Jan 2010 
16012010, 04:50 PM
Cryptography and Network Security
finite fields Finite fields are becoming increasingly important in cryptography. Several modern cryptographic algorithms rely on computations in various finite fields, among them are AES and elliptic curve cryptography. Here, AES uses arithmetic in the finite field GF(28). All encryption algorithms whether symmetric key or publickey encryption involve arithmetic operations on integers. If we decide to work on nbit integers, for efficiency of storage we would like to be able to use all integers on nbits. This in turn means we have to do operations on integers from 0 to 2^(n1) . We need finite fields having p^n elements, with p a prime number. The concepts needed for the basic understanding of AES are: Groups, rings, fields Group(G, Â¢,e): a set G with a binary operation Â¢and an element ebelongs to G satisfying the Associativity, Identity element, and inverse element laws Divisors, modular arithmetic Ring(R,+,Â¢,0): a set R with two binary operations + and Â¢satisfying the commutative, associative and distributive laws. Euclidâ„¢s algorithm Euclid's Algorithmto compute gcd(a,b) â€œEuclid(a,b) (assume b>0) is summarised as: If b=0 then return a Else return Euclid(b,a mod b) Polynomial arithmetic Ordinary polnomial arithmetic include Adding/subtracting two polynomials which is done by adding/subtracting the corresponding coefficients Multiplyingtwo polynomials which is done in the usual way, by multiplying all terms with each other Division(not necessarily exact) of two polynomials can also be defined if the coefficients are in a field. Computational considerations In computer implementations of the above operations, Addition of polynomials becomes bitwise XOR of their nbit representations and Multiplication is shift & XOR: example for GF(2^8) with m(x)=x8+x4+x3+x+1 (AES). CRPTOGRAPHY AND Network SECURITY.pdf (Size: 322.66 KB / Downloads: 101) for more details, visit this thread also: http://topicideas.org/howtoCryptography5386 Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion




Important Note..!
If you are not satisfied with above reply ,..PleaseASK HERE
So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this pageTagged Pages: crptography and n w security, seminar on n w security, introduction crptography, 