Do you want to publish a course? Click here

Investigating an improvement on AES through using EC mathematics in its transformations

تقصي امكانية تطوير المعيار AES من خلال استخدام رياضيات المنحنيات الاهليلجية في تحويلاته

1767   3   12   0.0 ( 0 )
 Publication date 2011
  fields Mathematics
and research's language is العربية
 Created by Shamra Editor




Ask ChatGPT about the research

We testified in the last years immense jumps and many developments in all of the life domains, specially in a field of the informatics and telecommunications. Therefor the digital information and the telecommunications and its kinds, became the nerve of daily life, and the basic support which are built on it most of the sciences. Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types, battery power consumption, different key size and finally encryption/decryption speed. Simulation results are given to demonstrate the effectiveness of each algorithm. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing so. Network algorithms were from most of the topics importance, which it was very important most savants and the researchers, because a need of algorithm, a necessary matter for performance most of the processes, until the very small processes. specially Cryptography Algorithms. Therefor many of researches and studies has been consecrated for invention a new algorithms, which are suited with requirements of this age , as the speed and volume of data, and Information security and development of this subject. Cryptography has a long and fascinating history. The predominant practitioners of the art were those associated with the military, the diplomatic service and government in general. Cryptography was used as a tool to protect national secrets and strategies. Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. The development subject of Cryptography Algorithms (CAs) is considered of the most important topics in the last years, because of the large and fast development in the communications, computers and networks, and the need for information security and data protection methods ( Cryptography methods) Here we need some mathematical background, which assumes only that the reader knows the basic concept of integers (mod n). The F in GF(Q) stands for Field. Examples of fields are complex numbers and integers mod p (p prime). A field has a set of objects which can be combined by either of two operations (addition and multiplication) to produce other objects in the set. There is an additive identity (‘zero’), there is a multiplicative identity i.e. ‘one’. There is an additive inverse (minus the number), and there is a multiplicative inverse for all numbers except the additive identity i.e. except for ‘zero’. Classical ciphers refers to encryption techniques which have become well-known over time, and generally created prior to the second half of the twentieth century (in some cases, many hundreds of years earlier). Many classical techniques are variations of simple substitution and simple transposition. Block ciphers can be either symmetric-key or public-key

References used
KOBLITS. N, 1994- ”A Course in Number Theory and Cryptography”, Springer- Varlag.
Koch, Helmut, 1997, "Algebraic Number Theory, " Springer, Verlag, Germany, 269p, 2nd Ed
D. Cox, J. Little, and D. O’Shea. Using Algebraic Geometry. Springer-Verlag, NewYork, 1998.
Berlkamp, Elwyn. R 1968, "Algebraic Coding Theory, " McGraw-Hill, USA, 474p
rate research

Read More

The security of several recently proposed ciphers relies on the fact:" that the classical methods of cryptanalysis (e.g. linear or differential attacks) are based on probabilistic characteristics, which makes their security grow exponentially with the number of rounds". So they haven’t the suitable immunity against the algebraic attacks which becomes more powerful after XSL algorithm. in this research we will try some method to increase the immunity of AES algorithm against the algebraic attacks then we will study the effect of this adjustment.
This study was conducted in Tartus cattle station, on 14 Holishtain-Frisian calves at the weaning age (12 weeks) in order to evaluate the effect of Methionine addition on the productive parameters. The calves were divided in three groups, the first one was considered as a control, the second was fed on milk with 0.2% methionine, whereas the third one on milk with 0.4% methionine. The results showed that the Methionine addition to the diet of calves during the weaning period, increased the daily growth rate after weaning, so this increase was 14%. Our results also showed that the addition of Methionine improved the feed conversion ratio after weaning.
In this resecarh the improvement of SO3 absorption via oxidation of SO2 ,which is a by product from a chemical plant in Damascus , using Ozone and active carbon – was stadied . The main purpose of this research paperis : . To obtian acceptable co ncentrations of sulphuric acid in various aqueous mediums . . To eelease SO2gas as a by product frome this flow . The lab study assures that the absorption of sulphuroxides differ from medium to other with or not existance of active carbon in aqueous medium and bubbling the gas oxides and distillated water only and also the bubbling of Ozone gas in gasoxides.
This paper presents a new technique to extract the features of a common case of images of the iris called off-angle iris which taken for persons identification system. The main problem when using biological iris measurements to identify the persons is the difficulty of identifying and extracting features of the iris. This problem increasing when dealing with off-angle iris and it leading to decrease system accuracy and increase system rate error.
We present a scaffolded discovery learning approach to introducing concepts in a Natural Language Processing course aimed at computer science students at liberal arts institutions. We describe some of the objectives of this approach, as well as prese nting specific ways that four of our discovery-based assignments combine specific natural language processing concepts with broader analytic skills. We argue this approach helps prepare students for many possible future paths involving both application and innovation of NLP technology by emphasizing experimental data navigation, experiment design, and awareness of the complexities and challenges of analysis.

suggested questions

comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا