Analysis and implementation of National Security Agency (NSA) suite B : advance encryption standard

The essential technology underlying virtually all automated network and computer security applications is known as encryption. Encryption was primarily used for military and espionage use. The need for secure transactions in e-commerce, virtual private networks and secure messaging has moved encrypt...

Full description

Saved in:
Bibliographic Details
Main Author: Low, Derek Zhi Hua.
Other Authors: Chan Choong Wah
Format: Final Year Project
Language:English
Published: 2009
Subjects:
Online Access:http://hdl.handle.net/10356/16740
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
Description
Summary:The essential technology underlying virtually all automated network and computer security applications is known as encryption. Encryption was primarily used for military and espionage use. The need for secure transactions in e-commerce, virtual private networks and secure messaging has moved encryption into the commercial realm. The Advanced Encryption System – AES is now used in almost all network-based applications to ensure security. In this report, we focus on analysis of the AES key schedule and discuss its security properties and weaknesses from a theoretical viewpoint. The report also covers the analysis of the algorithm performance, efficiency and security, with a brief discussion on the potential application in network security.