ABSTRACT
The age of information is also the age of digital information assets, where the professional programmer has to deal with cryptography. This work presents the theory, source code, and implementation for variable key size RSA encryption/decryption, digital signing, multi precision library, Diffie-Hellman key exchange, entropy collection, pseudo random number generator, and more. The work presents how to implement your own secure protocol using the IOCP technology, by presenting a secure chat client/server solution implementation.
TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE/DELIMITATIONS
1.5 LIMITATIONS/CONSTRAINTS
1.6 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING
3.2 DISCUSSIONS
CHAPTER FOUR
4.0 FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1 FUTURES
4.2 IMPLICATIONS
4.3 CHALLENGES
CHAPTER FIVE
5.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1 RECOMMENDATION
5.2 SUMMARY
5.3 CONCLUSION
5.4 REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 08). Optimal Cryptographic Techniques.. ProjectStoc.com. Retrieved 08, 2014, from https://projectstoc.com/read/2817/optimal-cryptographic-techniques-5408
"Optimal Cryptographic Techniques." ProjectStoc.com. 08 2014. 2014. 08 2014 <https://projectstoc.com/read/2817/optimal-cryptographic-techniques-5408>.
"Optimal Cryptographic Techniques.." ProjectStoc.com. ProjectStoc.com, 08 2014. Web. 08 2014. <https://projectstoc.com/read/2817/optimal-cryptographic-techniques-5408>.
"Optimal Cryptographic Techniques.." ProjectStoc.com. 08, 2014. Accessed 08, 2014. https://projectstoc.com/read/2817/optimal-cryptographic-techniques-5408.
- Related Works
- Design And Implementation Of Computerized Information Management System In Seismic Data Processing (a Case Study Of Integrated Data Services Limited, Idsl Benin-city)
- Design And Implementation Of Computerized Information System For Small Small Business Enterprise A Case Study Of Enugu Urban.
- Design And Implementation Of Measuring Xml Performance And Access Database (case Study Of Park Lane Hospital, Enugu)
- Design And Implementation Of A Computerized Property Management System (a Case Study Of Enugu North Local Government Area)
- Design Of A Computerized System For Departmental Student Result Processing (a Case Study Of Department Of Computer Science Imt Enugu)
- Authentification Of Digital Images By Encryption And Decryption With Primary Key Implementation Using Ism Algorithm And Steganography
- Design And Implementation Of Computerized Medical Duties Scheduling System (a Case Study Of University Of Nigeria Teaching Hospital)
- Design And Implementation Of Interactive Intranet Portal For Effective Management In Tertiary Institution
- Design And Implementation Of A Computerised Bill Of Material Processing System (a Case Study Of Anammco, Enugu)
- Find And Replace Utility