• العربية
    • English
  • English 
    • العربية
    • English
  • Login
Home
Publisher PoliciesTerms of InterestHelp Videos
Submit Thesis
IntroductionIUGSpace Policies
JavaScript is disabled for your browser. Some features of this site may not work without it.
View Item 
  •   Home
  • Faculty of Information Technology
  • PhD and MSc Theses- Faculty of Information Technology
  • View Item
  •   Home
  • Faculty of Information Technology
  • PhD and MSc Theses- Faculty of Information Technology
  • View Item

Please use this identifier to cite or link to this item:

http://hdl.handle.net/20.500.12358/20102
TitleSecure key Agreement for LAN Based on Multi-level Encryption Over GSM
Title in Arabicالية توافق على مفتاح التشفير للشبكات المحلية ( lan ) على شبكات الهواتف الخلوية ( gsm ) باستخدام التشفير متعدد المراحل
Abstract

Encryption key transferring over a communication network is unsafe method, in the way it breaches the safety criteria once the key is discovered, this breaching conflicts with CIA triangle, specifically with confidentiality concept, where the data is already known by unauthorized party. Available encryption techniques might be one of the solutions which are offered to overcome the confidentiality concept of CIA triangle. However, the key transfer should be safe, and deny unauthorized parties to get the transferred key, except the parties that are authorized in the secured communication process. Securing the key data implemented with VPN, third part or key agreement before establish connection. Our research is based on transferring the key over a network which will not be used for the communication process. The main idea is to generate two secret keys, the first is used as a secret key to encrypt the second key in multi-level encryption process, the encrypted second key will be sent over GSM network. The second key will be decrypted then used as a secret key for the text transferring over LAN. The first key will be generated using Diffie-Helman algorithm. This key will be used as a secret key for encrypt the second key over multi-level encryption process, which is implemented by passing the first key as secret key and encrypting the second key in a predefined order of algorithms where is the start index related to the connection request time stamp, the resulted key will be sent over GSM. We have selected five encryption algorithms in the same order in the system. The selection of the first algorithm to start the multi-level encryption process is based on the connection time stamp. We have developed a pilot simulation for the solution, and got many improvements for the new solution which is summarized in: 1. reducing the required time of connection, instead of waiting for IO for knocking time and SMS sending receiving time we minimize the knocking for one request and the SMS for one time waiting .2. Financial connection establishment cost by decreasing 50%. Increasing the complexity of guessing the key and the algorithm to decrypt the sniffed data. In addition, controlling the key length by the algorithm settings.

Authors
Saqer, Mustafa Dbu
Supervisors
Alattar, Ashraf
Typeرسالة ماجستير
Date2016
LanguageEnglish
Publisherالجامعة الإسلامية - غزة
Citation
License
Collections
  • PhD and MSc Theses- Faculty of Information Technology [124]
Files in this item
file_1.pdf1.825Mb
Thumbnail

The institutional repository of the Islamic University of Gaza was established as part of the ROMOR project that has been co-funded with support from the European Commission under the ERASMUS + European programme. This publication reflects the views only of the author, and the Commission cannot be held responsible for any use which may be made of the information contained therein.

Contact Us | Send Feedback
 

 

Browse

All of IUGSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsSupervisorsThis CollectionBy Issue DateAuthorsTitlesSubjectsSupervisors

My Account

LoginRegister

Statistics

View Usage Statistics

The institutional repository of the Islamic University of Gaza was established as part of the ROMOR project that has been co-funded with support from the European Commission under the ERASMUS + European programme. This publication reflects the views only of the author, and the Commission cannot be held responsible for any use which may be made of the information contained therein.

Contact Us | Send Feedback