Font Size: a A A

Hybrid Encryption Technique Applied To The Information Security

Posted on:2013-08-27Degree:MasterType:Thesis
Country:ChinaCandidate:Yakoubou Dieudonn D NFull Text:PDF
GTID:2298330452463065Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
Basically, the security of information was used by military andgovernments to guard against invaders. However, the importance of this securityin the commercial sector has been increasing in recent years. Cryptography is astandard way used to secure the information but its fundamental problems arehow to communicate the information with high security over unsecured networkswithout being intercepted or revealed to the adversary and how to know thisinformation have not been changed by an adversary during the transmiss ionprocess. In the security system of information, the Symmetric Encryption is theoldest method and widely used in cryptography for securing a large data. In thismethod, the operators use the same key for encrypting and decrypting theinformation but the other problem is how to share the key over unreliablenetworks.Asymmetric Encryption is one of cryptography tools used to resolve thekeys distribution problem experienced by Symmetric Encryption. On other ways,the asymmetric encryption suffers of some disadvantages such as runningmarkedly slower than symmetric encryption when the encrypted informationbecomes very large. In this thesis, the focus is on Hybrid Encryption Techniquethat is a combination of advantages of both Symmetric and AsymmetricEncryption. This technique provides the security services such as confidentiality,authentication and integrity to the information. This method allows to guaranteethe security of secret key shared by users. The algorithms involved in thismethod for achieving our objective are: AES-128, RSA, and hash function MD5.
Keywords/Search Tags:Cryptography, Information Security, AES-128algorithm, RSAAlgorithm, Hash Function MD5
PDF Full Text Request
Related items