.

Hardening the ElGamal cryptosystem in the setting of the second group of units. (c2011)

LAUR Repository

Show simple item record

dc.contributor.author Fanous, Suzan Mohamad
dc.date.accessioned 2011-12-13T12:07:59Z
dc.date.available 2011-12-13T12:07:59Z
dc.date.copyright 2011 en_US
dc.date.issued 2011-12-13
dc.date.submitted 2011-08-10
dc.identifier.uri http://hdl.handle.net/10725/1042
dc.description Includes bibliographical references (leaves 47-48). en_US
dc.description.abstract The purpose of this thesis is to give up to date discussion of the principles, techniques and algorithms of interest in cryptographic practice. We choose to emphasize on the most practical and applied cryptographic system, El-Gamal scheme. This thesis discusses modifications we made on El-Gamal scheme, mainly extending the scheme to work on the second group of units of Zn and the second group of units of the quotient ring of polynomials over a field with cyclic second group of units. The arithmetic needed in this new setting is described. Algorithms are given. Advantages and efficiency of the new method are pointed out. Finally the security of the new scheme is studied and suggestions for further work are introduced. en_US
dc.language.iso en en_US
dc.subject Data encryption (Computer science) en_US
dc.subject Cryptography en_US
dc.title Hardening the ElGamal cryptosystem in the setting of the second group of units. (c2011) en_US
dc.type Thesis en_US
dc.term.submitted Summer II en_US
dc.author.degree MS in Computer Science en_US
dc.author.school Arts and Sciences en_US
dc.author.idnumber 200803843 en_US
dc.author.commembers Dr. Abdul Nasser Kassar
dc.author.commembers Dr. Azzam Murad
dc.author.woa OA en_US
dc.description.physdesc 1 bound copy: xiv, 93 leaves; ill. (some col.); 31 cm. available at RNL. en_US
dc.author.division Computer Science en_US
dc.author.advisor Dr. Ramzi Haraty
dc.keywords Second group of units of Zn en_US
dc.keywords Second group of units of Zn[x]/<h(x)> en_US
dc.keywords Generator en_US
dc.keywords ElGamal Cryptosystem en_US
dc.keywords Baby Step Giant Step attack algorithm en_US
dc.keywords Private key en_US
dc.identifier.doi https://doi.org/10.26756/th.2011.42 en_US
dc.publisher.institution Lebanese American University en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search LAUR


Advanced Search

Browse

My Account