ASIA unversity:Item 310904400/81006
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 94286/110023 (86%)
造访人次 : 21671453      在线人数 : 997
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    ASIA unversity > 資訊學院 > 資訊工程學系 > 博碩士論文 >  Item 310904400/81006


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: http://asiair.asia.edu.tw/ir/handle/310904400/81006


    题名: A Text Cryptosystem with Secret Key Substitution for Mobile Text Chatting
    作者: 工讀生, 工讀生
    贡献者: 資訊工程學系
    关键词: mobile text chatting
    block ciphers
    secret key
    session key
    classical substitution
    transposition scheme
    key management
    日期: 2014-07-29
    上传时间: 2014-09-17 07:25:34 (UTC+0)
    出版者: Asia University
    摘要: Mobile Text Chatting (MTC) is the most widely used communications of today because it is cheap, efficient, simple, and is easily available. Its far-reaching capacity enables user to be ‘at-hand’ at all times with friends and family. Just like in a conventional communication where privacy is maintained and given importance, communication via smart portable devices should have a certain degree of security as well. The reason for this is natural since, as humans, we are entitled to our own world at times, apart from this global village we are in which has been the result of the fast and improving technological advances that aims to make our life easier.
    For simple and short message exchanges in mobile devices, a simple encryption will do. In every encryption, it will only be reliable if only if the integrity of the key is protected. In this paper, two encryption algorithms for mobile message sending will be discussed. Both aims to provide a certain degree of encryption to messages exchange via the Internet and/or mobile communication service providers.
    Classical ciphers; substitution, shift and transposition ciphers are the basis of the schemes provided herein. Management of secret key is also emphasized and given examples. Methods to encrypt and decrypt is explained by providing examples, too.
    显示于类别:[資訊工程學系] 博碩士論文

    文件中的档案:

    档案 描述 大小格式浏览次数
    index.html0KbHTML301检视/开启


    在ASIAIR中所有的数据项都受到原著作权保护.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈