ASIA unversity:Item 310904400/81006
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 94286/110023 (86%)
Visitors : 21671560      Online Users : 1091
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/81006


    Title: A Text Cryptosystem with Secret Key Substitution for Mobile Text Chatting
    Authors: 工讀生, 工讀生
    Contributors: 資訊工程學系
    Keywords: mobile text chatting
    block ciphers
    secret key
    session key
    classical substitution
    transposition scheme
    key management
    Date: 2014-07-29
    Issue Date: 2014-09-17 07:25:34 (UTC+0)
    Publisher: Asia University
    Abstract: Mobile Text Chatting (MTC) is the most widely used communications of today because it is cheap, efficient, simple, and is easily available. Its far-reaching capacity enables user to be ‘at-hand’ at all times with friends and family. Just like in a conventional communication where privacy is maintained and given importance, communication via smart portable devices should have a certain degree of security as well. The reason for this is natural since, as humans, we are entitled to our own world at times, apart from this global village we are in which has been the result of the fast and improving technological advances that aims to make our life easier.
    For simple and short message exchanges in mobile devices, a simple encryption will do. In every encryption, it will only be reliable if only if the integrity of the key is protected. In this paper, two encryption algorithms for mobile message sending will be discussed. Both aims to provide a certain degree of encryption to messages exchange via the Internet and/or mobile communication service providers.
    Classical ciphers; substitution, shift and transposition ciphers are the basis of the schemes provided herein. Management of secret key is also emphasized and given examples. Methods to encrypt and decrypt is explained by providing examples, too.
    Appears in Collections:[Department of Computer Science and Information Engineering] Theses & dissertations

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML301View/Open


    All items in ASIAIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback