![]() | Only 14 pages are availabe for public view |
Abstract In the age of universal electronic connectivity, electronic eavesdropping, and electronic frauds, security is vital for any success. Designing a secure way to talk, taking in our account that other parties hear but the one who understands is the one you are talking to, developing a secure way to be published all over the world, while nobody can break what two parties decided to protect are the main guidelines for any agent or company who is interested in data security filed. It is very important to address all risks may appear during data transfer between entities in a shared media like Internet as it is not only a matter of encryption or cryptanalysis as there are different types of risks which are discussed in literature under titles like passive and active attacks, understanding these risks will help to find out elements need to be secured during the communication process. All these challenges directed us to share and support these challenges and try to make new algorithms to achieve these security goals while maintaining the main constrains of complexity and ability to break. Cellular Automata, a new modeling technique, represented the corner stone of this thesis while developing a new algorithm for symmetric key cryptosystem for an image and a cryptographic hash function for files and messages. |