OPTIMAL CRYPTOGRAPHIC TECHNIQUES


  • Department: Computer Science
  • Project ID: CPU1625
  • Access Fee: ₦5,000
  • Pages: 40 Pages
  • Reference: YES
  • Format: Microsoft Word
  • Views: 1,175
Get this Project Materials
ABSTRACT
The age of information is also the age of digital information assets, where the professional programmer has to deal with cryptography. This work presents the theory, source code, and implementation for variable key size RSA encryption/decryption, digital signing, multi precision library, Diffie-Hellman key exchange, entropy collection, pseudo random number generator, and more. The work presents how to implement your own secure protocol using the IOCP technology, by presenting a secure chat client/server solution implementation.

TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT

CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE/DELIMITATIONS
1.5 LIMITATIONS/CONSTRAINTS
1.6 DEFINITION OF TERMS

CHAPTER TWO
2.0 LITERATURE REVIEW

CHAPTER THREE
3.0 METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING 
3.2 DISCUSSIONS

CHAPTER FOUR
4.0 FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM 
4.1 FUTURES 
4.2 IMPLICATIONS
4.3 CHALLENGES

CHAPTER FIVE
5.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1 RECOMMENDATION
5.2 SUMMARY
5.3 CONCLUSION
5.4 REFERENCES

  • Department: Computer Science
  • Project ID: CPU1625
  • Access Fee: ₦5,000
  • Pages: 40 Pages
  • Reference: YES
  • Format: Microsoft Word
  • Views: 1,175
Get this Project Materials
whatsappWhatsApp Us