Practical implementation and analysis of hyper-encryption
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2009.
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis |
Language: | eng |
Published: |
Massachusetts Institute of Technology
2010
|
Subjects: | |
Online Access: | http://hdl.handle.net/1721.1/52767 |
_version_ | 1811083006415208448 |
---|---|
author | Juang, Jason K |
author2 | Michael O. Rabin. |
author_facet | Michael O. Rabin. Juang, Jason K |
author_sort | Juang, Jason K |
collection | MIT |
description | Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2009. |
first_indexed | 2024-09-23T12:17:38Z |
format | Thesis |
id | mit-1721.1/52767 |
institution | Massachusetts Institute of Technology |
language | eng |
last_indexed | 2024-09-23T12:17:38Z |
publishDate | 2010 |
publisher | Massachusetts Institute of Technology |
record_format | dspace |
spelling | mit-1721.1/527672019-04-12T13:44:07Z Practical implementation and analysis of hyper-encryption Juang, Jason K Michael O. Rabin. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. Electrical Engineering and Computer Science. Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2009. This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections. Includes bibliographical references (p. 89-90). The security of modern cryptographic schemes relies on limits on computational power and assumptions about the difficulty of certain mathematical problems, such as integer factorization. This thesis describes hyper-encryption in the limited access model, a system that provides perfect secrecy and authentication against an adversary who possesses unbounded computational power, but who is limited in the ability to eavesdrop on more than a fraction of computers in a large network, such as the Internet. This thesis also presents an implementation of hyper-encryption in the limited access model, discusses areas where the theoretical system differs from the practical implementation, and analyzes their impact on the security of the system. by Jason K. Juang. M.Eng. 2010-03-24T20:35:36Z 2010-03-24T20:35:36Z 2009 2009 Thesis http://hdl.handle.net/1721.1/52767 503456131 eng M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. http://dspace.mit.edu/handle/1721.1/7582 90 p. application/pdf Massachusetts Institute of Technology |
spellingShingle | Electrical Engineering and Computer Science. Juang, Jason K Practical implementation and analysis of hyper-encryption |
title | Practical implementation and analysis of hyper-encryption |
title_full | Practical implementation and analysis of hyper-encryption |
title_fullStr | Practical implementation and analysis of hyper-encryption |
title_full_unstemmed | Practical implementation and analysis of hyper-encryption |
title_short | Practical implementation and analysis of hyper-encryption |
title_sort | practical implementation and analysis of hyper encryption |
topic | Electrical Engineering and Computer Science. |
url | http://hdl.handle.net/1721.1/52767 |
work_keys_str_mv | AT juangjasonk practicalimplementationandanalysisofhyperencryption |