Please use this identifier to cite or link to this item:
http://dspace.cityu.edu.hk/handle/2031/593
Title: | Key distribution in Public-Key cryptography for network security |
Authors: | Lee, Chi Lun |
Department: | Department of Computer Engineering and Information Technology |
Issue Date: | 2002 |
Supervisor: | Mr. Ng K T. Assessor: Dr. Yeung Alan K H |
Abstract: | In this project, it is going to protect the data transmitting in the network, increase the complexity of breaking the cipher text, and try to protect the copyrights of some online-application by using RSA Cryptography. The project makes use of RSA Algorithm with Session Key technique for encryption and decryption. In this project, a new concept of using Session Key is developed, which split the original Session Key into two keys in order to further increase the complexity of breaking it. The project uses JAVA Language for implement the cryptography and the Client-Server program. JAVA programming language is one of the most providing supports in Cryptography language. Also, in this project, Cryptix 3 cryptographic software library is used for development of this project. Cryptix 3 is a clean room implementation of Sun's Java Cryptography Extensions (JCE) version 1.1. JCE is only available within the U.S. and Canada only. For the Client to Server program, the project makes use of the Socket of Java Language for the connection between client and server. Sockets provide an API that allows using TCP/IP to communicate between two processes running on different machines, and the socket classes are defined in the java.net package. For a connection to be established one of the processes must be waiting for connections using a Server Socket and the other process must create connection by instantiating a client Socket. |
Appears in Collections: | Computer Engineering & Information Technology - Undergraduate Final Year Projects |
Files in This Item:
File | Size | Format | |
---|---|---|---|
fulltext.html | 164 B | HTML | View/Open |
Items in Digital CityU Collections are protected by copyright, with all rights reserved, unless otherwise indicated.