Show simple item record

dc.contributor.advisorRajan, B Sundar
dc.contributor.authorSwaroop, D
dc.date.accessioned2014-09-02T05:48:29Z
dc.date.accessioned2018-07-31T04:48:42Z
dc.date.available2014-09-02T05:48:29Z
dc.date.available2018-07-31T04:48:42Z
dc.date.issued2014-09-02
dc.date.submitted2011
dc.identifier.urihttps://etd.iisc.ac.in/handle/2005/2374
dc.identifier.abstracthttp://etd.iisc.ac.in/static/etd/abstracts/3057/G25103-Abs.pdfen_US
dc.description.abstractCryptography is science of secure message transmission. Cryptanalysis is involved with breaking these encrypted messages. Both cryptography and cryptanalysis constitute together to form cryptology. Anonymity means namelessness i.e., the quality or state of being unknown while authenticity translates to the quality or condition of being authentic or genuine. Anonymity and authenticity are two different embodiments of personal secrecy. Modern power has increased in its capacity to designate individuals, due to which they find it inconvenient to continue communicating, remaining anonymous. In this thesis we are going to describe an anonymous system which consists of a number of entities which are anonymous and are communicating with each other without revealing their identity and at the same time maintaining their authenticity such that an anonymous entity(sayE1)will be able to verify that, the message it received from another anonymous entity(sayE2)subsequent to an initial message from E2, are in fact from E2 itself. Later when E2 tries to recommend a similar communication to E1 with another anonymous entity E3 in the system, E1 must be able to verify that recommendation, without E2 losing its authenticity of its communication with E1 to E3. This thesis is divided into four chapters. The first chapter is an introduction to cryptography, symmetric key cryptography and public key cryptography. It also summarizes the contribution of this thesis. The second chapter gives various protocol for the above problem ’Anonymity with Authenticity’ along with its extension. Totally six protocols are proposed for the above problem. In third chapter all these six protocols are realized using four different schemes, where each scheme has its own pros and cons. The fourth and final chapter concludes with a note on what possible factors these four different realization schemes need to be chosen and other possible realization schemes.en_US
dc.language.isoen_USen_US
dc.relation.ispartofseriesG25103en_US
dc.subjectCryptographyen_US
dc.subjectCryptanalysisen_US
dc.subjectAnonymous Systems (Communication)en_US
dc.subjectSymmetric Key Cryptographyen_US
dc.subjectPublic Key Cryptographyen_US
dc.subjectAnonymous Systems (Communication) Protocolsen_US
dc.subject.classificationComputer Scienceen_US
dc.titleAnonymity With Authenticityen_US
dc.typeThesisen_US
dc.degree.nameMSc Enggen_US
dc.degree.levelMastersen_US
dc.degree.disciplineFaculty of Engineeringen_US


Files in this item

This item appears in the following Collection(s)

Show simple item record