Practical implementation and analysis of hyper-encryption

Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2009.

Bibliographic Details
Main Author: Juang, Jason K
Other Authors: Michael O. Rabin.
Format: Thesis
Language:eng
Published: Massachusetts Institute of Technology 2010
Subjects:
Online Access:http://hdl.handle.net/1721.1/52767
_version_ 1811083006415208448
author Juang, Jason K
author2 Michael O. Rabin.
author_facet Michael O. Rabin.
Juang, Jason K
author_sort Juang, Jason K
collection MIT
description Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2009.
first_indexed 2024-09-23T12:17:38Z
format Thesis
id mit-1721.1/52767
institution Massachusetts Institute of Technology
language eng
last_indexed 2024-09-23T12:17:38Z
publishDate 2010
publisher Massachusetts Institute of Technology
record_format dspace
spelling mit-1721.1/527672019-04-12T13:44:07Z Practical implementation and analysis of hyper-encryption Juang, Jason K Michael O. Rabin. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. Electrical Engineering and Computer Science. Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2009. This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections. Includes bibliographical references (p. 89-90). The security of modern cryptographic schemes relies on limits on computational power and assumptions about the difficulty of certain mathematical problems, such as integer factorization. This thesis describes hyper-encryption in the limited access model, a system that provides perfect secrecy and authentication against an adversary who possesses unbounded computational power, but who is limited in the ability to eavesdrop on more than a fraction of computers in a large network, such as the Internet. This thesis also presents an implementation of hyper-encryption in the limited access model, discusses areas where the theoretical system differs from the practical implementation, and analyzes their impact on the security of the system. by Jason K. Juang. M.Eng. 2010-03-24T20:35:36Z 2010-03-24T20:35:36Z 2009 2009 Thesis http://hdl.handle.net/1721.1/52767 503456131 eng M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. http://dspace.mit.edu/handle/1721.1/7582 90 p. application/pdf Massachusetts Institute of Technology
spellingShingle Electrical Engineering and Computer Science.
Juang, Jason K
Practical implementation and analysis of hyper-encryption
title Practical implementation and analysis of hyper-encryption
title_full Practical implementation and analysis of hyper-encryption
title_fullStr Practical implementation and analysis of hyper-encryption
title_full_unstemmed Practical implementation and analysis of hyper-encryption
title_short Practical implementation and analysis of hyper-encryption
title_sort practical implementation and analysis of hyper encryption
topic Electrical Engineering and Computer Science.
url http://hdl.handle.net/1721.1/52767
work_keys_str_mv AT juangjasonk practicalimplementationandanalysisofhyperencryption