ABSTRACT
The age of information is also the age of digital information assets, where the professional programmer has to deal with cryptography. This work presents the theory, source code, and implementation for variable key size RSA encryption/decryption, digital signing, multi precision library, Diffie-Hellman key exchange, entropy collection, pseudo random number generator, and more. The work presents how to implement your own secure protocol using the IOCP technology, by presenting a secure chat client/server solution implementation.
TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE/DELIMITATIONS
1.5 LIMITATIONS/CONSTRAINTS
1.6 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING
3.2 DISCUSSIONS
CHAPTER FOUR
4.0 FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1 FUTURES
4.2 IMPLICATIONS
4.3 CHALLENGES
CHAPTER FIVE
5.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1 RECOMMENDATION
5.2 SUMMARY
5.3 CONCLUSION
5.4 REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 08). Optimal Cryptographic Techniques.. ProjectStoc.com. Retrieved 08, 2014, from https://projectstoc.com/read/2817/optimal-cryptographic-techniques-5408
"Optimal Cryptographic Techniques." ProjectStoc.com. 08 2014. 2014. 08 2014 <https://projectstoc.com/read/2817/optimal-cryptographic-techniques-5408>.
"Optimal Cryptographic Techniques.." ProjectStoc.com. ProjectStoc.com, 08 2014. Web. 08 2014. <https://projectstoc.com/read/2817/optimal-cryptographic-techniques-5408>.
"Optimal Cryptographic Techniques.." ProjectStoc.com. 08, 2014. Accessed 08, 2014. https://projectstoc.com/read/2817/optimal-cryptographic-techniques-5408.
- Related Works
- Design And Implementation Of Computerized Hospital Space Management Information System
- Design And Implementation Of A Computerized Educational Administrative Information System (a Case Study Of Post-primary School Management Board (ppsmb)
- Design And Implementation Of Computerized Mathematics Teacher (a Case Study Of Algebra)
- Design And Implementation Of A Computer Based Warehousing Information System (a Case Study Of Nigeria Ports Authority) (npa) Lagos
- Electronic Payment System Security
- Design And Implementation Of A Computerized Bill Of Quantity System For Quantity Surveyors (a Case Study Of Okolo, Okolo & Co. Enugu)
- Design And Implementation Of A Computerized Sales Forecasting System (case Of Study Of Nbl 9th Mile Corner Enugu)
- Design And Implementation Of A Computerized Erp For Small Business (a Case Study Of Emenite Plc Enugu)
- Design And Implementation Of A Computerized Budgeting System (a Case Study Of I.m.t., Enugu)
- Distributed Database Architecture For Global Roaming In Next-generation Mobile Network