Wireless Data (Audio/Video) Encryption
Mohamed Ahmed Seifeldin Mohamed;
Abstract
Recently, digital data communications are the most indispensable partofourlife. Everything around us today is done using either the Internet ortheintranetnetworks. The transferred data through these networks may havedifferentlevelsofsecrecyorprivacythatcouldbecompromised.Consequently,thisentailsakindofprotectivemeasurestobetakentoensurethedata’ssecurityagainstanythreat.Informationsecurityistheinvolvedfieldofstudythatisresponsibleforlearn-inghowtodefendthetransferreddatafromanunauthorizedaccess.Asascience,itcategorizesthedatasecurityrequirementstodifferentservices.Thisthesiscon-cernswiththedataconfidentialityservice,whichisneededforretainingthetrans-ferred data unrevealed to any unauthorized user. Cryptography is the employed
security mechanism to accomplish the task of data confidentiality.
Data Encryption Standard (DES) was an encryption algorithm thatwasusedto conceal the transferred data content to ensure its privacy. It wasintroducedin1977 and was the most prevalent algorithm at that time. AlthoughDESshoweda great immunity to different types of the analytical attacks, it was veryweaktowithstand the brute-force attack. Accordingly, DES was withdrawn in1999andwas acknowledged as an insecure algorithm.
security mechanism to accomplish the task of data confidentiality.
Data Encryption Standard (DES) was an encryption algorithm thatwasusedto conceal the transferred data content to ensure its privacy. It wasintroducedin1977 and was the most prevalent algorithm at that time. AlthoughDESshoweda great immunity to different types of the analytical attacks, it was veryweaktowithstand the brute-force attack. Accordingly, DES was withdrawn in1999andwas acknowledged as an insecure algorithm.
Other data
| Title | Wireless Data (Audio/Video) Encryption | Other Titles | تشفیرالبیانات (صوت / فیدیو) للاتصالاتاللاسلكية | Authors | Mohamed Ahmed Seifeldin Mohamed | Issue Date | 2016 |
Attached Files
| File | Size | Format | |
|---|---|---|---|
| G14168.pdf | 190.17 kB | Adobe PDF | View/Open |
Similar Items from Core Recommender Database
Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.