dc.contributor.author |
Fanous, Suzan Mohamad |
|
dc.date.accessioned |
2011-12-13T12:07:59Z |
|
dc.date.available |
2011-12-13T12:07:59Z |
|
dc.date.copyright |
2011 |
en_US |
dc.date.issued |
2011-12-13 |
|
dc.date.submitted |
2011-08-10 |
|
dc.identifier.uri |
http://hdl.handle.net/10725/1042 |
|
dc.description |
Includes bibliographical references (leaves 47-48). |
en_US |
dc.description.abstract |
The purpose of this thesis is to give up to date discussion of the principles, techniques
and algorithms of interest in cryptographic practice. We choose to emphasize on the
most practical and applied cryptographic system, El-Gamal scheme.
This thesis discusses modifications we made on El-Gamal scheme, mainly extending
the scheme to work on the second group of units of Zn and the second group of units
of the quotient ring of polynomials over a field with cyclic second group of units.
The arithmetic needed in this new setting is described. Algorithms are given.
Advantages and efficiency of the new method are pointed out. Finally the security of
the new scheme is studied and suggestions for further work are introduced. |
en_US |
dc.language.iso |
en |
en_US |
dc.subject |
Data encryption (Computer science) |
en_US |
dc.subject |
Cryptography |
en_US |
dc.title |
Hardening the ElGamal cryptosystem in the setting of the second group of units. (c2011) |
en_US |
dc.type |
Thesis |
en_US |
dc.term.submitted |
Summer II |
en_US |
dc.author.degree |
MS in Computer Science |
en_US |
dc.author.school |
Arts and Sciences |
en_US |
dc.author.idnumber |
200803843 |
en_US |
dc.author.commembers |
Dr. Abdul Nasser Kassar |
|
dc.author.commembers |
Dr. Azzam Murad |
|
dc.author.woa |
OA |
en_US |
dc.description.physdesc |
1 bound copy: xiv, 93 leaves; ill. (some col.); 31 cm. available at RNL. |
en_US |
dc.author.division |
Computer Science |
en_US |
dc.author.advisor |
Dr. Ramzi Haraty |
|
dc.keywords |
Second group of units of Zn |
en_US |
dc.keywords |
Second group of units of Zn[x]/<h(x)> |
en_US |
dc.keywords |
Generator |
en_US |
dc.keywords |
ElGamal Cryptosystem |
en_US |
dc.keywords |
Baby Step Giant Step attack algorithm |
en_US |
dc.keywords |
Private key |
en_US |
dc.identifier.doi |
https://doi.org/10.26756/th.2011.42 |
en_US |
dc.publisher.institution |
Lebanese American University |
en_US |