Non-Fiction Books:

Efficient Key Management for Symmetric Cryptography System

Click to share your rating 0 ratings (0.0/5.0 average) Thanks for your vote!

Format:

Paperback / softback
$123.00
Available from supplier

The item is brand new and in-stock with one of our preferred suppliers. The item will ship from a Mighty Ape warehouse within the timeframe shown.

Usually ships in 3-4 weeks
Free Delivery with Primate
Join Now

Free 14 day free trial, cancel anytime.

Buy Now, Pay Later with:

4 payments of $30.75 with Afterpay Learn more

6 weekly interest-free payments of $20.50 with Laybuy Learn more

Availability

Delivering to:

Estimated arrival:

  • Around 12-24 June using International Courier

Description

Nowadays big organizations have complex administrative structure with scattered offices to face with serious problems related to key management like financial and security problems that based on symmetric encryption system. This project proposes an efficient solution related to symmetric key crypto system so that with solving this problem the organization can have a secure, affordable, efficient, easier and faster symmetric key crypto system. In symmetric key cryptography with the less key size have more secure in comparison to asymmetric cryptography. Therefore using symmetric key cryptography is more secure and Advantageous. The speed of processing symmetric cryptography is higher than asymmetric cryptography. The purpose of this project is to product the software who all of the employees in the organization can have the secret symmetric key cryptography so that they can communicate to each other with the secret key. However, the security of symmetric key cryptography is higher than asymmetric key cryptography. Among of many algorithm available, key derivations algorithm which used in this project is very important for symmetric cryptosystems because one key can be derived to the others. This Method is chosen by key derivation one-way function and implemented by Delphi programming language. Each organization which uses this implemented method the manager of the organization can generate the secret key for all of the employees and its employees has the symmetric secret key and if the employees need to communicate with each other their request should be sent to the manager. This project has been done in three phases and one of the outcomes of this project is a application which generates random key, according to hierarchy of organization.
Release date NZ
July 9th, 2014
Audience
  • General (US: Trade)
Pages
108
Dimensions
152x229x7
ISBN-13
9781499578768
Product ID
37744175

Customer reviews

Nobody has reviewed this product yet. You could be the first!

Write a Review

Marketplace listings

There are no Marketplace listings available for this product currently.
Already own it? Create a free listing and pay just 9% commission when it sells!

Sell Yours Here

Help & options

Filed under...