IMPLEMENTATION OF AES, RSA, ECC
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
mechanical engineering crazy
Active In SP
**

Posts: 226
Joined: Jul 2009
#1
28-08-2009, 02:40 AM


IMPLEMENTATION OF AES, RSA, ECC

Abstract:
In this world of increasing electronic connectivity of viruses, hackers, eaves-dropping and electronic fraud, electronic security is necessary always for transmitting secure electronic-data across insecure networks such as the internet. So, in order to ensure this electronic security, cryptography evolved leading to the development of various cryptosystems.
The main objective of this project and implimentation is to develop three such cryptosystems- Advanced Encryption Standard (AES), Rivest Shamir Adleman (RSA) Cryptosystem and Elliptic Curve cryptosystem (ECC). All these three cryptosystems are implemented in a sender-receiver environment simulating how the cryptography is used for real-world applications. Also, another aim is to design an API to implement encryption /decryption algorithms for all these three cryptosystems.
AES algorithm is implemented for all three key sizes ie., 128 bit, 192 bit, 256 bits. RSA is implemented for a key size of 1024 bits. ECC is implemented using elliptic curves over GF(P) in contrary to most ECC implementations which uses GF(2^n).
The idea behind the implementation of all these three cryptosystems is to provide a stream-based environment where encryption and decryption is essentially done by crypto-streams that can be plugged in right away where needed. Various properties of elliptic curves (GF (p)) like point addition, point subtraction, point doubling and point multiplication are also presented. As of now the ECC package does not support constructions of arbitrary elliptic curves and corresponding generators. This means that it is based on predefined curves, namely 112, 160 or 256 bit curves taken from Standards of Efficient Cryptography (SEC) are described.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
Guest
Thinking To Register

 
#2
16-10-2012, 12:36 AM

Please,
....................................
I need your help

...................................


.Rolleyes
Reply
seminar tips
Super Moderator
******

Posts: 8,857
Joined: Oct 2012
#3
16-10-2012, 10:48 AM

to get information about the topic "IMPLEMENTATION OF AES, RSA, ECC" related topic refer the link bellow
topicideashow-to-implementation-of-aes-rsa-ecc?pid=3882&mode=threaded
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Implementation of ATM Security by Using Fingerprint recognition and GSM seminar tips 1 794 01-04-2016, 04:08 PM
Last Post: mkaasees
  Implementation of UPQC for Voltage Sag Mitigation seminar class 5 2,204 23-02-2015, 02:55 PM
Last Post: madival
  IMPLEMENTATION OF DS-CDMA TRANSMITTER AND RECEIVER IN VHDL seminar surveyer 9 5,257 16-03-2014, 11:05 AM
Last Post: Guest
  Implementation of ATM Security by Using Fingerprint recognition and GSM pdf study tips 0 537 17-08-2013, 04:10 PM
Last Post: study tips
  IMPLEMENTATION OF CDMA TECHNIQUES USING BPSK MODULATION SCHEME REPORT study tips 0 341 02-08-2013, 01:03 PM
Last Post: study tips
  Implementation of Secured password for Web applications using two server model pdf study tips 0 382 12-07-2013, 02:04 PM
Last Post: study tips
  Design and Implementation of a Web-based Internet/Intranet Mail Server pdf study tips 0 730 26-06-2013, 03:15 PM
Last Post: study tips
  IMPLEMENTING RSA ENCRYPTION ALGORITHM TO ENHANCE THE DATA SECURITY OF CLOUD study tips 0 394 24-06-2013, 04:56 PM
Last Post: study tips
  SECURITY ANALYSIS AND IMPLEMENTATION OF 3-LEVEL SECURITY SYSTEM USING IMAGE REPORT study tips 0 357 30-05-2013, 11:06 AM
Last Post: study tips
  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs pdf project girl 2 626 09-05-2013, 09:17 AM
Last Post: study tips