Search In this Thesis
   Search In this Thesis  
العنوان
Enhancement of the Data Security during Network Transmission
المؤلف
AbdelReheem,Omar Salah ElDin Mohamed
هيئة الاعداد
باحث / Omar Salah ElDin Mohamed AbdelReheem
مشرف / Ahmed Elsawy
مشرف / Mohamed Taha
مناقش / Mazen mohamed selim
مناقش / Mohamed mohamed elazab tahoun
الموضوع
Cryptography. Data Security. Internet of Things.
تاريخ النشر
2024.
عدد الصفحات
67p :
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
Computer Science Applications
تاريخ الإجازة
25/9/2024
مكان الإجازة
جامعة بنها - كلية الحاسبات والمعلومات - علوم الحاسب
الفهرس
Only 14 pages are availabe for public view

from 87

from 87

Abstract

The connected digital environment world generates massive amounts of data that must be protected from unauthorized disclosure. Due to the tremendous technological transformation, more technologies and Internet of Things (IoT) devices are employed in today’s digital world. The majority of these technologies are linked through a network. They produce enormous amounts of information at incredible speeds, leading to zillions of digital data moving via network connections. Maintaining comprehensive and high-level security for any exchangeable data is vital. Networked data needs security and privacy. Technological advancements and the creative techniques attackers use can exacerbate data security breaches. Security protocols and cryptographic algorithms are the two components of information security, the last being information security’s basis and fundamental technology. Multiple cryptographic techniques are currently available to maintain the security of messages and data. Regardless of its simplicity, private key cryptography is unproductive for authorization. As it often covers all of the components of information security, Asymmetric cryptography is much more secure than private key encryption, but it takes much longer. The cryptographic conception will improve and assure security while also protecting network resources that are exchanged. The purpose of this study is to demonstrate the few encryption techniques that are used on an insecure network to encrypt data. This study proposes two new hybrid encryption techniques to encrypt the data.
The first suggested approach, MRSADH, encrypts and decrypts the data using Rivest, Shamir, and Adleman (RSA) and Diffie Hellman (DH) and produces the encoded data using the XOR function to be sent to the recipient in the shortest time and with high-security complexity compared to other methods in terms of
Abstract
xii
performance and avalanche effect. The proposed first study examines the two most widely used cryptographic algorithms, RSA and Diffie-Hellman, and how they impact security and speed when integrated into a unified hybrid (MRSADH) computation with necessary adjustments. The study also presents a method that uses Asymmetric and Symmetric key encryption to improve data security while reducing the number of mathematical equations, which tends to result in a quicker execution time. Also, this research presents the second new hybrid encryption strategy for encrypting data. MRDAES encrypts data using Rivest, Shamir, Adleman (RSA), Diffie-Hellman (DH), and the Advanced Encryption System. The data will be encoded in two stages: the first by producing the encoded data using the XOR function, and the second by using AES to encode data and obtain the final result to be shared with intended recipients with high-security complexity compared to other methods in terms of performance and avalanche effect. The proposed study examines the three most widely used cryptographic symmetric and asymmetric algorithms, RSA, Diffie-Hellman, and AES, and how they operate and impact security and complexity when integrated into a unified hybrid (MRDAES) computation with the proper adjustments. The study also presents an approach for increasing data security while minimizing the number of mathematical equations and obtaining high-security complexity while slightly increasing execution time with a large random prime.