FPGA IP Cores Encryption Systems Based On Nonlinear Algorithms
Haitham Abdel-Hady Mohamed;
Abstract
Abstract
The revolution in information and communication technology has become linked to the development of societies in our time, as it is considered the most important means of transferring developing societies to more developed societies. So, The Egyptian government wants to create a digital Egypt and society that uses technology in all aspects of life. As a result, it aims to improve government agencies' digital services as well as the development of information, and communication technology infrastructure. All of this need strong information security to provide privacy and confidentiality of the information in circulation.
Information security is the science that provides data protection from all threats, risks, and security breaches through tools and measures taken for this matter. Encryption holds a special place in information security sciences, it is the backbone to ensure the confidentiality of information because it protects the data from attackers and unauthorized persons. Encryption systems are classified as asymmetric or symmetric based on their key distribution. In asymmetric encryption, the encryption depends on private and public keys. On the other hand, symmetric encryption depends on only symmetric keys for encrypting and decrypting the data.
Researchers have become more interested in generating both private keys, public keys, and symmetric keys. There is a lot of research for the generation of encryption keys.
This thesis provides a study in the realm of symmetric encryption that uses chaotic systems to produce strong and secure subkeys. Generation subkeys for Advanced encryption standard (AES) and Blowfish encryption algorithm.
The revolution in information and communication technology has become linked to the development of societies in our time, as it is considered the most important means of transferring developing societies to more developed societies. So, The Egyptian government wants to create a digital Egypt and society that uses technology in all aspects of life. As a result, it aims to improve government agencies' digital services as well as the development of information, and communication technology infrastructure. All of this need strong information security to provide privacy and confidentiality of the information in circulation.
Information security is the science that provides data protection from all threats, risks, and security breaches through tools and measures taken for this matter. Encryption holds a special place in information security sciences, it is the backbone to ensure the confidentiality of information because it protects the data from attackers and unauthorized persons. Encryption systems are classified as asymmetric or symmetric based on their key distribution. In asymmetric encryption, the encryption depends on private and public keys. On the other hand, symmetric encryption depends on only symmetric keys for encrypting and decrypting the data.
Researchers have become more interested in generating both private keys, public keys, and symmetric keys. There is a lot of research for the generation of encryption keys.
This thesis provides a study in the realm of symmetric encryption that uses chaotic systems to produce strong and secure subkeys. Generation subkeys for Advanced encryption standard (AES) and Blowfish encryption algorithm.
Other data
| Title | FPGA IP Cores Encryption Systems Based On Nonlinear Algorithms | Other Titles | أنظمة التشفير المعتمدة على الخوارزيمات الغير خطية المنفذة على مصفوفة البوابات المنطقية القابلة للبرمجة | Authors | Haitham Abdel-Hady Mohamed | Issue Date | 2022 |
Attached Files
| File | Size | Format | |
|---|---|---|---|
| BB13856.pdf | 884.69 kB | Adobe PDF | View/Open |
Similar Items from Core Recommender Database
Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.