Encryption processing over communication network
Abstract Wireless LAN has turned out to be more predominant these days. It has been expanding in numerous places, such as enterprises, institutions or even restaurant and cafes. Wireless LAN provides mobility and convenience to people, but at the same time it is exposed to many security threats due...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2016
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/69339 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-69339 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-693392023-07-07T16:20:18Z Encryption processing over communication network Zhang, Anqi Chau Lap Pui School of Electrical and Electronic Engineering DRNTU::Engineering Abstract Wireless LAN has turned out to be more predominant these days. It has been expanding in numerous places, such as enterprises, institutions or even restaurant and cafes. Wireless LAN provides mobility and convenience to people, but at the same time it is exposed to many security threats due to its wireless infrastructure. The objective of this final year project is to study and evaluate the existing security threats against wireless LAN. The basic security standards were studied and tested. VPN technology and cryptography were also studied due to nowadays network architecture. A communicator program named crypto file transport were developed to ensure secure transfer of files through the wireless infrastructure on top of existing security standards. Diffie-Hellman algorithm and Advanced Encryption Standard(AES) were used to develop the communicator program. The program was developed using Java programming language. It was created using Java Development Kit 1.8 and IntelliJ IDEA IDE. Overview of the project and the existing security standards were discussed in chapter 1. The concept and types of VPN technologies were elaborated in chapter 2. Chapter 3 covers the concept and working mechanism of different encryption algorithms. The implementation of the communicator program was discussed in chapter 4 and the results of the program were shown in the last chapter. Bachelor of Engineering 2016-12-14T06:17:11Z 2016-12-14T06:17:11Z 2016 Final Year Project (FYP) http://hdl.handle.net/10356/69339 en Nanyang Technological University 57 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering |
spellingShingle |
DRNTU::Engineering Zhang, Anqi Encryption processing over communication network |
description |
Abstract
Wireless LAN has turned out to be more predominant these days. It has been expanding in numerous places, such as enterprises, institutions or even restaurant and cafes. Wireless LAN provides mobility and convenience to people, but at the same time it is exposed to many security threats due to its wireless infrastructure.
The objective of this final year project is to study and evaluate the existing security threats against wireless LAN. The basic security standards were studied and tested. VPN technology and cryptography were also studied due to nowadays network architecture. A communicator program named crypto file transport were developed to ensure secure transfer of files through the wireless infrastructure on top of existing security standards. Diffie-Hellman algorithm and Advanced Encryption Standard(AES) were used to develop the communicator program. The program was developed using Java programming language. It was created using Java Development Kit 1.8 and IntelliJ IDEA IDE.
Overview of the project and the existing security standards were discussed in chapter 1. The concept and types of VPN technologies were elaborated in chapter 2. Chapter 3 covers the concept and working mechanism of different encryption algorithms. The implementation of the communicator program was discussed in chapter 4 and the results of the program were shown in the last chapter. |
author2 |
Chau Lap Pui |
author_facet |
Chau Lap Pui Zhang, Anqi |
format |
Final Year Project |
author |
Zhang, Anqi |
author_sort |
Zhang, Anqi |
title |
Encryption processing over communication network |
title_short |
Encryption processing over communication network |
title_full |
Encryption processing over communication network |
title_fullStr |
Encryption processing over communication network |
title_full_unstemmed |
Encryption processing over communication network |
title_sort |
encryption processing over communication network |
publishDate |
2016 |
url |
http://hdl.handle.net/10356/69339 |
_version_ |
1772828505555337216 |