Show simple item record

dc.contributor.advisorΝικοπολιτίδης, Πέτρος
dc.contributor.authorNicolaou, Nicolas
dc.contributor.otherΝικολάου, Νικόλας
dc.coverage.spatialΚύπροςel_GR
dc.date.accessioned2017-09-08
dc.date.accessioned2017-09-08T10:40:04Z
dc.date.available2017-09-08T10:40:04Z
dc.date.copyright2017-05
dc.date.issued2017-09-08
dc.identifier.otherΠΕΣ/2017/00271el_GR
dc.identifier.urihttp://hdl.handle.net/11128/3088
dc.descriptionΠεριέχει βιβλιογραφικές παραπομπές.el_GR
dc.description.abstractNetwork Security is a fast growing sector of computer networks. The rapid development of technology and especially in the field of networks requires research and study in several areas. The information data that pass through computer networks must be fast and secure to have a reliable system. Security is not only about protecting computer data, it is also important the availability and integrity of the network. While data is passing through a communication channel is more vulnerable to malicious attacks. To protect the data must have a strong encryption algorithm. Encryption in modern times accomplished with the use of algorithms. To encrypt or decrypt a data algorithms have to use a secret key combination with a mathematical equation. The purpose of the key is to rearrange the relevant information into an unreadable data. The private key is the most important element in algorithms and must always remain secret. An integrated online Information System requires a fast respond to exchange information between users. A direct access to an Information System is one of the essential elements of an organization's security (Confidentiality, Integrity, and Availability). A reliable Information System must have the right hardware for a fast respond and a strong algorithm to keep the data protected. The purpose of this dissertation is to examine the various synchronous cryptographic algorithms and to evaluate their performance concerning their implementation in a particular software. The software compares the speed of the algorithms in different type scenarios and analyzes how fast can encrypt and decrypt the data.el_GR
dc.format.extentvi, 77 σ. 30 εκ.el_GR
dc.languagegrel_GR
dc.language.isoenel_GR
dc.rightsinfo:eu-repo/semantics/closedAccessel_GR
dc.subjectNetwork securityel_GR
dc.subjectΑσφάλεια δικτύωνel_GR
dc.titleImplementation and performance evaluation of cryptographic algorithmsel_GR
dc.typeΜεταπτυχιακή Διατριβήel_GR
dc.description.translatedabstract-------el_GR
dc.format.typepdfel_GR


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record