Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/16740
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLow, Derek Zhi Hua.-
dc.date.accessioned2009-05-28T03:08:28Z-
dc.date.available2009-05-28T03:08:28Z-
dc.date.copyright2009en_US
dc.date.issued2009-
dc.identifier.urihttp://hdl.handle.net/10356/16740-
dc.description.abstractThe essential technology underlying virtually all automated network and computer security applications is known as encryption. Encryption was primarily used for military and espionage use. The need for secure transactions in e-commerce, virtual private networks and secure messaging has moved encryption into the commercial realm. The Advanced Encryption System – AES is now used in almost all network-based applications to ensure security. In this report, we focus on analysis of the AES key schedule and discuss its security properties and weaknesses from a theoretical viewpoint. The report also covers the analysis of the algorithm performance, efficiency and security, with a brief discussion on the potential application in network security.en_US
dc.format.extent97 p.en_US
dc.language.isoenen_US
dc.rightsNanyang Technological University-
dc.subjectDRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systemsen_US
dc.titleAnalysis and implementation of National Security Agency (NSA) suite B : advance encryption standarden_US
dc.typeFinal Year Project (FYP)en_US
dc.contributor.supervisorChan Choong Wahen_US
dc.contributor.schoolSchool of Electrical and Electronic Engineeringen_US
dc.description.degreeBachelor of Engineeringen_US
item.grantfulltextrestricted-
item.fulltextWith Fulltext-
Appears in Collections:EEE Student Reports (FYP/IA/PA/PI)
Files in This Item:
File Description SizeFormat 
EP3012S.pdf
  Restricted Access
1.79 MBAdobe PDFView/Open

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.