Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/16740
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Low, Derek Zhi Hua. | - |
dc.date.accessioned | 2009-05-28T03:08:28Z | - |
dc.date.available | 2009-05-28T03:08:28Z | - |
dc.date.copyright | 2009 | en_US |
dc.date.issued | 2009 | - |
dc.identifier.uri | http://hdl.handle.net/10356/16740 | - |
dc.description.abstract | The essential technology underlying virtually all automated network and computer security applications is known as encryption. Encryption was primarily used for military and espionage use. The need for secure transactions in e-commerce, virtual private networks and secure messaging has moved encryption into the commercial realm. The Advanced Encryption System – AES is now used in almost all network-based applications to ensure security. In this report, we focus on analysis of the AES key schedule and discuss its security properties and weaknesses from a theoretical viewpoint. The report also covers the analysis of the algorithm performance, efficiency and security, with a brief discussion on the potential application in network security. | en_US |
dc.format.extent | 97 p. | en_US |
dc.language.iso | en | en_US |
dc.rights | Nanyang Technological University | - |
dc.subject | DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems | en_US |
dc.title | Analysis and implementation of National Security Agency (NSA) suite B : advance encryption standard | en_US |
dc.type | Final Year Project (FYP) | en_US |
dc.contributor.supervisor | Chan Choong Wah | en_US |
dc.contributor.school | School of Electrical and Electronic Engineering | en_US |
dc.description.degree | Bachelor of Engineering | en_US |
item.grantfulltext | restricted | - |
item.fulltext | With Fulltext | - |
Appears in Collections: | EEE Student Reports (FYP/IA/PA/PI) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
EP3012S.pdf Restricted Access | 1.79 MB | Adobe PDF | View/Open |
Google ScholarTM
Check
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.