dc.contributor.advisor | Νικοπολιτίδης, Πέτρος | |
dc.contributor.author | Nicolaou, Nicolas | |
dc.contributor.other | Νικολάου, Νικόλας | |
dc.coverage.spatial | Κύπρος | el_GR |
dc.date.accessioned | 2017-09-08 | |
dc.date.accessioned | 2017-09-08T10:40:04Z | |
dc.date.available | 2017-09-08T10:40:04Z | |
dc.date.copyright | 2017-05 | |
dc.date.issued | 2017-09-08 | |
dc.identifier.other | ΠΕΣ/2017/00271 | el_GR |
dc.identifier.uri | http://hdl.handle.net/11128/3088 | |
dc.description | Περιέχει βιβλιογραφικές παραπομπές. | el_GR |
dc.description.abstract | Network Security is a fast growing sector of computer networks. The rapid development of technology and especially in the field of networks requires research and study in several areas. The information data that pass through computer networks must be fast and secure to have a reliable system. Security is not only about protecting computer data, it is also important the availability and integrity of the network. While data is passing through a communication channel is more vulnerable to malicious attacks. To protect the data must have a strong encryption algorithm.
Encryption in modern times accomplished with the use of algorithms. To encrypt or decrypt a data algorithms have to use a secret key combination with a mathematical equation. The purpose of the key is to rearrange the relevant information into an unreadable data. The private key is the most important element in algorithms and must always remain secret.
An integrated online Information System requires a fast respond to exchange information between users. A direct access to an Information System is one of the essential elements of an organization's security (Confidentiality, Integrity, and Availability). A reliable Information System must have the right hardware for a fast respond and a strong algorithm to keep the data protected.
The purpose of this dissertation is to examine the various synchronous cryptographic algorithms and to evaluate their performance concerning their implementation in a particular software. The software compares the speed of the algorithms in different type scenarios and analyzes how fast can encrypt and decrypt the data. | el_GR |
dc.format.extent | vi, 77 σ. 30 εκ. | el_GR |
dc.language | gr | el_GR |
dc.language.iso | en | el_GR |
dc.rights | info:eu-repo/semantics/closedAccess | el_GR |
dc.subject | Network security | el_GR |
dc.subject | Ασφάλεια δικτύων | el_GR |
dc.title | Implementation and performance evaluation of cryptographic algorithms | el_GR |
dc.type | Μεταπτυχιακή Διατριβή | el_GR |
dc.description.translatedabstract | ------- | el_GR |
dc.format.type | pdf | el_GR |