Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Active In SP

Posts: 1
Joined: Jan 2010
14-01-2010, 05:38 PM

please send me details about this topic
Active In SP

Posts: 247
Joined: Jan 2010
16-01-2010, 04:50 PM

Cryptography and Network Security

finite fields
Finite fields are becoming increasingly important in cryptography. Several modern cryptographic algorithms rely on computations in various finite fields, among them are AES and elliptic curve cryptography. Here, AES uses arithmetic in the finite field GF(28). All encryption algorithms whether symmetric key or public-key encryption involve arithmetic operations on integers. If we decide to work on n-bit integers, for efficiency of storage we would like to be able to use all integers on n-bits. This in turn means we have to do operations on integers from 0 to 2^(n-1) . We need finite fields having p^n elements, with p a prime number. The concepts needed for the basic understanding of AES are:
-Groups, rings, fields
Group(G, ¢,e): a set G with a binary operation ¢and an element ebelongs to G satisfying the Associativity, Identity element, and inverse element laws

-Divisors, modular arithmetic
Ring(R,+,¢,0): a set R with two binary operations + and ¢satisfying the commutative, associative and distributive laws.

-Euclidâ„¢s algorithm
Euclid's Algorithmto compute gcd(a,b) “Euclid(a,b) (assume b>0) is summarised as:
If b=0 then return a
Else return Euclid(b,a mod b)

-Polynomial arithmetic
Ordinary polnomial arithmetic include Adding/subtracting two polynomials which is done by adding/subtracting the corresponding coefficients
-Multiplyingtwo polynomials which is done in the usual way, by multiplying all terms with each other
-Division(not necessarily exact) of two polynomials can also be defined if the coefficients are in a field.

Computational considerations
In computer implementations of the above operations,
Addition of polynomials becomes bitwise XOR of their n-bit representations and Multiplication is shift & XOR: example for GF(2^8) with m(x)=x8+x4+x3+x+1 (AES).

.pdf   CRPTOGRAPHY AND Network SECURITY.pdf (Size: 322.66 KB / Downloads: 101)

for more details, visit this thread also:
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: crptography and n w security, seminar on n w security, introduction crptography,
Popular Searches: e business seminar on crptography, image encrption based on elliptic curve crptography, ppt topics under crptography and information security, file type pdf ieee paper crptography, web security crptography, color visual crptography using error diffusion, color extended visual crptography using error diffusion ppt,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Request for project ideas on Social Security and Social Welfare Data Mining Guest 1 66 11-03-2016, 02:28 PM
Last Post: mkaasees
  Wireless Sensor Network Security model using Zero Knowledge Protocol Guest 1 993 28-02-2014, 01:40 AM
Last Post: mspadmini19
  Improving security and efficiency in attribute based data sharing Guest 3 1,673 10-01-2014, 12:49 PM
Last Post: seminar project topic
  project and implimentation on hacking and security Guest 1 386 02-09-2013, 09:40 AM
Last Post: study tips
  designing and implementation of pyroeelectric infrared sensor based security system Guest 0 307 29-08-2013, 12:41 PM
Last Post: Guest
  it security honey pot Guest 0 252 23-08-2013, 04:11 PM
Last Post: Guest
  ensuring data storage security in cloud computing madhuri.nallam1708 18 10,138 31-07-2013, 02:17 PM
Last Post: study tips
Last Post: study tips
Smile wireless network security Guest 1 417 08-07-2013, 09:32 AM
Last Post: study tips
Wink line man security system sauravkne 2 703 04-07-2013, 02:34 PM
Last Post: study tips