Encryption processing over communication network

Abstract Wireless LAN has turned out to be more predominant these days. It has been expanding in numerous places, such as enterprises, institutions or even restaurant and cafes. Wireless LAN provides mobility and convenience to people, but at the same time it is exposed to many security threats due...

Full description

Saved in:
Bibliographic Details
Main Author: Zhang, Anqi
Other Authors: Chau Lap Pui
Format: Final Year Project
Language:English
Published: 2016
Subjects:
Online Access:http://hdl.handle.net/10356/69339
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-69339
record_format dspace
spelling sg-ntu-dr.10356-693392023-07-07T16:20:18Z Encryption processing over communication network Zhang, Anqi Chau Lap Pui School of Electrical and Electronic Engineering DRNTU::Engineering Abstract Wireless LAN has turned out to be more predominant these days. It has been expanding in numerous places, such as enterprises, institutions or even restaurant and cafes. Wireless LAN provides mobility and convenience to people, but at the same time it is exposed to many security threats due to its wireless infrastructure. The objective of this final year project is to study and evaluate the existing security threats against wireless LAN. The basic security standards were studied and tested. VPN technology and cryptography were also studied due to nowadays network architecture. A communicator program named crypto file transport were developed to ensure secure transfer of files through the wireless infrastructure on top of existing security standards. Diffie-Hellman algorithm and Advanced Encryption Standard(AES) were used to develop the communicator program. The program was developed using Java programming language. It was created using Java Development Kit 1.8 and IntelliJ IDEA IDE. Overview of the project and the existing security standards were discussed in chapter 1. The concept and types of VPN technologies were elaborated in chapter 2. Chapter 3 covers the concept and working mechanism of different encryption algorithms. The implementation of the communicator program was discussed in chapter 4 and the results of the program were shown in the last chapter. Bachelor of Engineering 2016-12-14T06:17:11Z 2016-12-14T06:17:11Z 2016 Final Year Project (FYP) http://hdl.handle.net/10356/69339 en Nanyang Technological University 57 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering
spellingShingle DRNTU::Engineering
Zhang, Anqi
Encryption processing over communication network
description Abstract Wireless LAN has turned out to be more predominant these days. It has been expanding in numerous places, such as enterprises, institutions or even restaurant and cafes. Wireless LAN provides mobility and convenience to people, but at the same time it is exposed to many security threats due to its wireless infrastructure. The objective of this final year project is to study and evaluate the existing security threats against wireless LAN. The basic security standards were studied and tested. VPN technology and cryptography were also studied due to nowadays network architecture. A communicator program named crypto file transport were developed to ensure secure transfer of files through the wireless infrastructure on top of existing security standards. Diffie-Hellman algorithm and Advanced Encryption Standard(AES) were used to develop the communicator program. The program was developed using Java programming language. It was created using Java Development Kit 1.8 and IntelliJ IDEA IDE. Overview of the project and the existing security standards were discussed in chapter 1. The concept and types of VPN technologies were elaborated in chapter 2. Chapter 3 covers the concept and working mechanism of different encryption algorithms. The implementation of the communicator program was discussed in chapter 4 and the results of the program were shown in the last chapter.
author2 Chau Lap Pui
author_facet Chau Lap Pui
Zhang, Anqi
format Final Year Project
author Zhang, Anqi
author_sort Zhang, Anqi
title Encryption processing over communication network
title_short Encryption processing over communication network
title_full Encryption processing over communication network
title_fullStr Encryption processing over communication network
title_full_unstemmed Encryption processing over communication network
title_sort encryption processing over communication network
publishDate 2016
url http://hdl.handle.net/10356/69339
_version_ 1772828505555337216