Skip navigation
Run Run Shaw Library City University of Hong KongRun Run Shaw Library

Please use this identifier to cite or link to this item: http://dspace.cityu.edu.hk/handle/2031/593
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLee, Chi Lunen_US
dc.date.accessioned2006-01-23T01:18:04Zen_US
dc.date.accessioned2007-05-14T07:55:31Z
dc.date.accessioned2017-09-19T08:49:29Z
dc.date.accessioned2019-02-12T06:43:45Z-
dc.date.available2006-01-23T01:18:04Zen_US
dc.date.available2007-05-14T07:55:31Z
dc.date.available2017-09-19T08:49:29Z
dc.date.available2019-02-12T06:43:45Z-
dc.date.issued2002en_US
dc.identifier.other2002itlcl854en_US
dc.identifier.urihttp://144.214.8.231/handle/2031/593-
dc.description.abstractIn this project, it is going to protect the data transmitting in the network, increase the complexity of breaking the cipher text, and try to protect the copyrights of some online-application by using RSA Cryptography. The project makes use of RSA Algorithm with Session Key technique for encryption and decryption. In this project, a new concept of using Session Key is developed, which split the original Session Key into two keys in order to further increase the complexity of breaking it. The project uses JAVA Language for implement the cryptography and the Client-Server program. JAVA programming language is one of the most providing supports in Cryptography language. Also, in this project, Cryptix 3 cryptographic software library is used for development of this project. Cryptix 3 is a clean room implementation of Sun's Java Cryptography Extensions (JCE) version 1.1. JCE is only available within the U.S. and Canada only. For the Client to Server program, the project makes use of the Socket of Java Language for the connection between client and server. Sockets provide an API that allows using TCP/IP to communicate between two processes running on different machines, and the socket classes are defined in the java.net package. For a connection to be established one of the processes must be waiting for connections using a Server Socket and the other process must create connection by instantiating a client Socket.en_US
dc.format.extent164 bytes
dc.format.mimetypetext/html
dc.language.isoen_US
dc.rightsThis work is protected by copyright. Reproduction or distribution of the work in any format is prohibited without written permission of the copyright owner.en_US
dc.rightsAccess is restricted to CityU users.en_US
dc.titleKey distribution in Public-Key cryptography for network securityen_US
dc.contributor.departmentDepartment of Computer Engineering and Information Technologyen_US
dc.description.supervisorMr. Ng K T. Assessor: Dr. Yeung Alan K Hen_US
Appears in Collections:Computer Engineering & Information Technology - Undergraduate Final Year Projects 

Files in This Item:
File SizeFormat 
fulltext.html164 BHTMLView/Open
Show simple item record


Items in Digital CityU Collections are protected by copyright, with all rights reserved, unless otherwise indicated.

Send feedback to Library Systems
Privacy Policy | Copyright | Disclaimer