DOC PREVIEW
MASON ECE 646 - The Ultimate Public-Key Encrypter

This preview shows page 1-2-3 out of 10 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

The Ultimate Public-Key EncrypterProject GoalsThe Search For The Ultimate:Timing DiagramsInputs and OutputsEncryption and Decryption in RSASignature generation and VerificationDemonstrationProblems FacedLesson Learned9/3/2005 1The Ultimate PublicThe Ultimate Public--Key EncrypterKey EncrypterKaran Sondhi & Varun Aggarwal9/3/2005 2Project GoalsProject Goals Finding and analyzing as many as possible public domain implementations of standard public key cryptosystems:– RSA– DSA– Elliptic Curve DSA. Choosing the fastest and the most flexible implementations of each cryptosystem.  Collecting the full information about authors and licenses of each of the chosen source codes.9/3/2005 3The Search For The Ultimate:The Search For The Ultimate: Implementations Found:– RSA • Rsaref: written by RSA Laboratories (www.rsa.com).• Rsaeuro: European version, also written by RSA Laboratories (www.rsaeuro.com). • Rsacpp: C++ version of RSA written by George Barwood.– DSA• Yet to be found ☺– ECDSA• Elliptic curve public key encryption package 2.1: written by Mike Rosing of cryptech.mcs.net9/3/2005 4Timing DiagramsTiming Diagrams00.20.40.60.811.21.41.61.8Time (in seconds)RSArefRSA C++00.050.10.150.20.250.30.350.40.45Time (In Seconds)DSA v1DSA v29/3/2005 5Inputs and OutputsInputs and OutputsDecryptionInput Cipher text Keys Signature Initialization VectorOutput Decrypted TextEncryption:Input ASCII text Key SizeOutput Cipher text Public & Private Keys Initialization Vector Signature9/3/2005 6Encryption and Decryption in RSAEncryption and Decryption in RSATime Taken Vs Key Length00.20.40.60.811.2508 620 720 920 1024EncryptionDecryption9/3/2005 7Signature generation and VerificationSignature generation and VerificationTime taken Vs key Length00.10.20.30.40.50.60.70.80.91508 620 720 820 920 1024GenerationVerification9/3/2005 8DemonstrationDemonstration Now Please wait while we prepare the demonstration of our project.………….9/3/2005 9Problems FacedProblems Faced Software Problems, Windows NT and Visual C++. Finding working implementations. Understanding Borland C++ Graphical User Interface Creation Process. Managing Time.9/3/2005 10Lesson LearnedLesson Learned We learned to plan ahead of time. We learned a lot about graphical user interface. A graduate course won’t get you much sleep


View Full Document

MASON ECE 646 - The Ultimate Public-Key Encrypter

Documents in this Course
Load more
Download The Ultimate Public-Key Encrypter
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view The Ultimate Public-Key Encrypter and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view The Ultimate Public-Key Encrypter 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?