Evaluation of Cryptographic Packages
Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
The widespread use of computer technology for information handling resulted in the need for higher data protection.The usage of high profile cryptographic protocols and algorithms do not always necessarily guarantee high security. They are needed to be used according to the needs of the organization depending upon certain characteristics and available resources.The communication system in a cryptographic environment may become vulnerable to attacks if the cryptographic packages don’t meet their intended goals.
This master’s thesis is targeted towards the goal of evaluating contemporary cryptographic algorithms and protocols collectively named as cryptographic packages as per security needs of the organization with the available resources.
The results have shown that there certainly is a need for careful evaluations of cryptographic packages given with available resources otherwise it could turn into creating more severe problems such as network bottlenecks, information and identity loss, non trustable environment and computational infeasibilities resulting in huge response times. In contrast, choosing the right package with right security parameters can lead to a secure and best performance communication environment.
Place, publisher, year, edition, pages
2009. , 39 p.
Cryptography, Security, Encryption, Confidentiality, Integrity, Hash
IdentifiersURN: urn:nbn:se:liu:diva-17441ISRN: LITH-ISY-EX--09/4159- - SEOAI: oai:DiVA.org:liu-17441DiVA: diva2:209420
Subject / course
Master of Science
2009-03-06, Algorithmen, ISY Division, Linköpings universitet, 581 83 LINKÖPING, LINKÖPING, Sweden, 10:15 (English)
Fåk, Viiveke, Dr
Fåk, Viiveke, Dr