Search In this Thesis
   Search In this Thesis  
العنوان
Implementation of the Most Suitable
Mode of Block Cipher Techniques /
المؤلف
Mansour, Medhat Hamdy.
هيئة الاعداد
باحث / مدحت حمدي منصور
مشرف / وجدي رفعت أنيس
مشرف / أيمن مصطفي حسن
مشرف / وجيدة ابراهيم شعبان
تاريخ النشر
2020.
عدد الصفحات
202 P. :
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
الهندسة الكهربائية والالكترونية
تاريخ الإجازة
1/1/2020
مكان الإجازة
جامعة عين شمس - كلية الهندسة - قسم الهندسة الالكترونيات والاتصالات الكهربية
الفهرس
Only 14 pages are availabe for public view

from 202

from 202

Abstract

This thesis aims to execute an analytic study of the performance of the most widely used and common cryptographic algorithm called Advanced Encryption Standard “AES” using five famous models called modes of operation which are applied on AES algorithm to exhibit the conduct of AES algorithm in terms of encryption time, throughput and strict avalanche criteria “SAC” which has been proposed using the traditional S-box then a modified type of S-box called an enhanced S-box. Accordingly deduce the most suitable mode for encryption using AES algorithm theoretically and practically. The modes have been implemented and simulated using matlab implementation and field programmable gate array “FPGA” implementation. This thesis is presented and divided into five chapters which are illustrated as follows.
Chapter one: This thesis is started with an introduction about the historical overview of cryptography, information security then illustrates the different perspectives and the essential principles of information security finally the types of cryptographic attacks are presented which could be encountered against cryptographic algorithms.
Chapter two: This chapter illustrates the concept and basics of cryptology science which includes an introduction about the cryptology science and its structure then cryptography is presented with its components, types, advantages and disadvantages also cryptanalysis with its components and types are proposed after that types of symmetric key ciphers under which “AES” algorithm is categorized are presented and finally Kerckhoffs Principle and how to evaluate a secrecy system in addition to two main cryptographic properties confusion and diffusion are listed.
Chapter three: The core of research in this thesis is AES algorithm which is illustrated in details in this chapter including an introduction about AES algorithm, explanation of mathematical operations used and the structure of AES algorithm in both encryption and decryption processes then a simplified example of AES algorithm called mini AES algorithm is presented with its component in both encryption and decryption processes also.
Chapter four: It is also considered with the previous chapter as the core of research in this thesis in which the famous five modes of operation are illustrated in details describing the structure, advantages and disadvantages for each mode of the five modes of operation then a theoretical conclusion is listed and The traditional s-box is presented with its deficiencies and an improved s-box is proposed as a solution.
Chapter five: According to previously studied in the prior chapters, the implementation of the five modes of operation on AES algorithm is executed using both matlab software and FPGA hardware and subsequently the results are listed and at the end a proposal solution has been presented for mini AES algorithm.
Chapter six: The conclusions and the comments on the results produced in previous chapter are listed in this chapter and the explanations about the comments on the results are also presented in addition to the future work is also proposed.