An Encryption Algorithm

Article Preview

Abstract:

Nowadays the information security is one of the fundamental and important issues in information management. Utilizing a collection of policies, solution, tools, hardware and software is for the purpose of obtaining an environment in which the information is not threatened while being produced, refined, transferred and distributed. Obtaining such an environment entails doing some things which are called security requirement. Therefore, for meeting those requirements in this project a symmetrical encryption algorithm has been designed and performed.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1754-1759

Citation:

Online since:

January 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] R. IL. Rivest, Chaffing and Winnowing, Confidentiality Without Encryption" , , The Technical Newletter of RSA laboratories , Cryptobytes, Summer (1998).

Google Scholar

[2] J. Burke, J. McDonald, T. Austin, Architectural Support for fast Symmetric-Key Cryptography, ", " International Conference on Archetectural Support For Programmig Languages and Operation Systems (ASPLOS_IX), November (2000).

DOI: 10.1145/378993.379238

Google Scholar

[3] R. Atkinson, Security Architecture for the internet protocol, , IEFT Draft Architecture ipsec-and-see 00, (1998).

Google Scholar

[4] E. Biham , Lars R. knudsen , DES , Triple-DES and AES, The technical Newsletter of RSA laboratories , Cryptobytes, Summer (1998).

Google Scholar

[5] J.L. Messey, Architecture for Public-key Infrastructure, The Open Group, (1998).

Google Scholar

[6] B. Schneider, et all, Twofish : A128-bit Block Cipher, , 1998 http: /www. nist. gov/aes.

Google Scholar

[7] Henk CA,V. Tilborg, An Introduction to Cryptology, , Kluwer Academic Publisher, (1993).

Google Scholar

[8] L. Wu, Ch. Wearer, T. Austin, CryptoManiac : A Fast Flexible Architecture foe Secure Communication, , 28 th annual International Symposium On Computer Architecture (ISCA-2001), June (2001).

DOI: 10.1145/379240.379256

Google Scholar

[9] Agre, Phillip E. & Rotenberg, Marc (editors): Technology and Privacy: The New Landscape, MIT Press, 1998 ISBN: 0262511010.

Google Scholar

[10] Electronic Privacy Information Center, Cryptography & Liberty 1999: An International Survey of Encryption Policy, EPIC, 1999, ISBN: 1893044033.

Google Scholar

[11] Garfinkel, Simson, PGP: Pretty Good Privacy, O'Reilly & Associates, 1994, ISBN 1-56592-098-8.

Google Scholar

[12] Kahn, David, The Code Breakers, The Story of Se cret Writing, The MacMillan Publishing Company (1968), ISBN: 0-02-560460-0.

Google Scholar

[13] Lawson, Jerry, The Complete Internet Handbook for Lawyers, American Bar Association, 1999, ISBN: 1570736405.

Google Scholar

[14] Schneier, Bruce, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, (1993).

Google Scholar

[15] Privacy on the Line by Whitfield Diffie and Susan Landau, MIT Press, (1998).

Google Scholar

[16] PGP: Pretty Good Privacy by Simson Garfinkel, O'Reilly, (1995).

Google Scholar

[17] Building in Big Brother: The Cryptographic Policy Debate, by Lance J. Hoffman, Springer Verlag, (1995).

Google Scholar

[18] The Codebreakers by David Kahn, MacMillan, (1972).

Google Scholar

[19] A Course in Number Theory and Cryptography, 2nd edition, by Neil Koblitz, Springer Verlag, (1994).

Google Scholar

[20] Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd edition, by Bruce Schneier, Wiley, (1996).

Google Scholar

[21] The Electronic Privacy Papers: Documents on the Battle for Electronic Privacy by Bruce Schneier and David Banisar, Wiley, (1997).

Google Scholar

[22] Cryptography: The Science of Secret Writing by Laurence Dwight Smith, Dover reprint of 1941 edition.

Google Scholar

[23] Codes and Cryptography by Dominic Welsh, Oxford University Press, 1987, (the other text for this course).

Google Scholar

[24] The Official PGP User's Guide by Phillip R. Zimmerman, MIT Press, 1995.

Google Scholar

[25] Scientific American, August 1979, The Mathematics of Public Key Cryptography, , by Martin E. Hellman (of Diffie-Hellman). Still one of the best descriptions ever.

Google Scholar

[26] Scientific American, August 1977, Mathematical Games" column by Martin Gardner. This is the column that brought the FBI to Martin Gardner, s door.

Google Scholar