Show simple item record

dc.contributor.authorVaradharajan, Vijayaraghavan
dc.contributor.otherSchool of Engineering, Computing and Mathematicsen_US
dc.date.accessioned2013-10-11T12:14:52Z
dc.date.available2013-10-11T12:14:52Z
dc.date.issued1984
dc.identifierNOT AVAILABLEen_US
dc.identifier.urihttp://hdl.handle.net/10026.1/2187
dc.description.abstract

This thesis investigates conventional and public key cryptographic techniques for secure data communication. Block and stream cipher methods to provide secure communication over an insecure channel are discussed with particular reference to the Data Encryption Standard (DES) algorithm. A microprocessor based data encryption interface unit has been designed and constructed using the DES to provide both communication and file security. Several chaining techniques using the system have also been investigated enabling a study of their error characteristics, speed of operation, level of security and their ability to overcome difficulties due to data redundancy and structure. A statistical analysis of the randomness of the output sequences in each of these techniques has been made. Furthermore, the developed system can be used on the Prestel public network allowing storage and retrieval of completely and partly encrypted frames of information on the Prestel database.

dc.language.isoenen_US
dc.publisherUniversity of Plymouthen_US
dc.titleSome Cryptographic Techniques For Secure Data Communicationen_US
dc.typeThesis
dc.identifier.doihttp://dx.doi.org/10.24382/4174
dc.identifier.doihttp://dx.doi.org/10.24382/4174


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV