dc.contributor.author |
Blerina Celiku; Department of Natyral Sciences, Fan.S.Noli University |
|
dc.contributor.author |
Dhori Beta; Department of Natyral Sciences, Fan.S.Noli University |
|
dc.contributor.author |
Erma Pema; Department of Natyral Sciences, Fan.S.Noli University |
|
dc.date |
2013-06-17 09:22:27 |
|
dc.date.accessioned |
2013-07-15T11:51:56Z |
|
dc.date.accessioned |
2015-11-23T16:00:21Z |
|
dc.date.available |
2013-07-15T11:51:56Z |
|
dc.date.available |
2015-11-23T16:00:21Z |
|
dc.date.issued |
2013-07-15 |
|
dc.identifier |
http://ecs.epoka.edu.al/index.php/iscim/iscim2011/paper/view/695 |
|
dc.identifier.uri |
http://dspace.epoka.edu.al/handle/1/710 |
|
dc.description.abstract |
It is impossible to imagine ourselves not involved in this tremendously increasingtechnology nowadays. In the field of networking, the area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of thecomputer network and resources that are network-accessible. Network security is acomplicated subject, historically only discussed by well-trained and experienced experts. However, as more and more we become "wired", all of us need tounderstand the basics of security in a networked world. In this research paper wetreat shortly the network concepts such as authentication and anti-virus softs and management of security which is different for all kinds of networks. So a small home or a workplace would only require basic security while large businesses will require high maintenance and advanced software and hardware to prevent malicious attacks from hacking and spamming. The term network security and information security are often used interchangeably. Information security uses cryptography to transform usable information into a form that renders it unusable by anyone other than an authorized user; this process is called encryption. Some history of cryptography is included, as well as an introduction that begins with Caesar Cipherand other used simple cryptosystems such as Shift, Substitution, Affine, Vigenere,Hill, Permutation, and Autokey Ciphers and the classification of modern cryptographic algorithms. In next session will be discussed S-Boxes as the most important part of SPN (Substitution-Permutation Network) that is a mixed transformation of bits in a number of rounds. What is more important is the non linearity of the s-box within a cryptosystem. That means that the function between the input bits and output bits must be non-linear. This gives the strengthness of analgorithm against attacks. The question is; how can this be achieved? There are several criterias that an s-box must satisfy to be non-linear. These will be described in an example then we go on with a software that examines the properties of the sbox.As a result will be defined if the s-box is appropriate to be used or not. What usreally matters is that what must be secret has to be a secret! |
|
dc.format |
application/pdf |
|
dc.language |
en |
|
dc.publisher |
International Symposium on Computing in Informatics and Mathematics |
|
dc.source |
International Symposium on Computing in Informatics and Mathematics; 1st International Symposium on Computing in Informatics and Mathematics |
|
dc.subject |
Information security; Network; Cryptography; Cipher; S-Box |
|
dc.title |
Cryptography, SPN algorithm and a simulation on S-Boxes |
|
dc.type |
Peer-reviewed Paper |
|