INTELLIGENT AGENTS AND THEIR APPLICATIONS
Rania Saeed Farag Mohammed;
Abstract
Since S-AES cryptosystem has been developed 12 years ago, it has
received a lot of attention in the academic research. In this thesis, we
are interesting to S-AES cryptosystem and concentrate mainly on its
analysis to show that it is insecure by applying a new approach. We
also propose a new application of an intelligent agent system. The
thesis consists of five chapters, one appendix and bibliography.
Chapter One: It includes the fundamental concepts and terminology
from cryptography and algebraic structures which are used in the
next chapters.
Chapter Two: In this chapter, we describe the S-AES cryptosystem.
We present its key expansion, encryption/decryption. Also in
this chapter, we discuss the cryptographic attacks on S-AES.
Chapter Three: In this chapter, we give a introduction of the satisfiability
problem. Also in this chapter, we give a way to convert
S-AES encryption to CNF.
Chapter Four: In this chapter, we give an introduction about an
intelligent agent and rule based system. Also in this chapter, we discuss
some applications for the intelligent agent.
Chapter Five: In this chapter, we define an encryption model of
E-CNF, its validity, and the key-equivalent of two encryption models
received a lot of attention in the academic research. In this thesis, we
are interesting to S-AES cryptosystem and concentrate mainly on its
analysis to show that it is insecure by applying a new approach. We
also propose a new application of an intelligent agent system. The
thesis consists of five chapters, one appendix and bibliography.
Chapter One: It includes the fundamental concepts and terminology
from cryptography and algebraic structures which are used in the
next chapters.
Chapter Two: In this chapter, we describe the S-AES cryptosystem.
We present its key expansion, encryption/decryption. Also in
this chapter, we discuss the cryptographic attacks on S-AES.
Chapter Three: In this chapter, we give a introduction of the satisfiability
problem. Also in this chapter, we give a way to convert
S-AES encryption to CNF.
Chapter Four: In this chapter, we give an introduction about an
intelligent agent and rule based system. Also in this chapter, we discuss
some applications for the intelligent agent.
Chapter Five: In this chapter, we define an encryption model of
E-CNF, its validity, and the key-equivalent of two encryption models
Other data
| Title | INTELLIGENT AGENTS AND THEIR APPLICATIONS | Other Titles | الوكلاء الاذكياء وتطبيقاتهم | Authors | Rania Saeed Farag Mohammed | Issue Date | 2015 |
Recommend this item
Similar Items from Core Recommender Database
Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.