University of Bristol Logo

  • Help & Terms of Use

Cryptography and Information Security

United Kingdom

Student theses

Search results

A multi-domain approach for security compliance, insider threat modelling and risk management.

Supervisor: Tryfonas, T. (Supervisor)

Student thesis : Doctoral Thesis › Doctor of Philosophy (PhD)

Analysis of Implementations and Side-Channel Security of Frodo on Embedded Devices

Supervisor: Oswald, M. E. (Supervisor) & Stam, M. (Supervisor)

A Study of Inference-Based Attacks with Neural Network Classifiers

Supervisor: Page, D. (Supervisor) & Oswald, E. (Supervisor)

A systems approach to asset management for the Clifton Suspension Bridge Trust

Supervisor: Tryfonas, T. (Supervisor) & Taylor, C. (Supervisor)

Student thesis : Doctoral Thesis › Engineering Doctorate (EngD)

Breaking boundaries for adoption of accessible high fidelity haptic feedback technologies

Supervisor: Roudaut, A. (Supervisor) & Warinschi, B. (Supervisor)

Cryptographic Access Control: Security Models, Relations and Construction

Supervisor: Warinschi, B. (Supervisor)

Engineering a platform for local peer-to-peer electricity trading

Supervisor: Chitchyan, R. (Supervisor), Delalonde, C. (External person) (Supervisor), Byrne, A. (External person) (Supervisor), Ferguson, D. (External person) (Supervisor) & Warinschi, B. (Supervisor)

Enhancing Current Software Safety Assurance Practice to Increase System Mission Effectiveness

Supervisor: May, J. (Supervisor), Tryfonas, T. (Supervisor) & Hadley, M. J. (External person) (Supervisor)

Game theory applied to cybersecurity threat mitigation - Analysis of Threshold FlipThem

Supervisor: Leslie, D. (Supervisor) & Smart, N. (Supervisor)

Handling organisational complexity with a framework of accessible founding principles

Supervisor: Oikonomou, G. (Supervisor) & Tryfonas, T. (Supervisor)

Hydrological Applications of Multi-source Soil Moisture Products

Supervisor: Han, D. (Supervisor) & Tryfonas, T. (Supervisor)

Modelling and Simulation Applications on Cyber-Physical Systems’ Security and Resilience

Supervisor: Tryfonas, T. (Supervisor) & Oikonomou, G. (Supervisor)

On the Theory and Design of Post-Quantum Authenticated Key-Exchange, Encryption and Signatures

Supervisor: Smart, N. P. (Supervisor) & Warinschi, B. (Supervisor)

Side Channel Attacks on IoT Applications

Supervisor: Oswald, M. E. (Supervisor) & Tryfonas, T. (Supervisor)

Software Defined Networking for the Industrial Internet of Things

Supervisor: Nejabati, R. (Supervisor) & Oikonomou, G. (Supervisor)

Towards Dynamic, SDN-assisted Interface Bonding for Heterogeneous 802.11 Devices

Supervisor: Doufexi, A. (Supervisor) & Oikonomou, G. (Supervisor)

California State University, San Bernardino

Home > Office of Graduate Studies > Electronic Theses, Projects, and Dissertations > 729

Electronic Theses, Projects, and Dissertations


Samuel Lopez , California State University - San Bernardino Follow

Date of Award

Document type, degree name.

Master of Arts in Mathematics


First Reader/Committee Chair

McMurran, Shawnee

We live in an age where we willingly provide our social security number, credit card information, home address and countless other sensitive information over the Internet. Whether you are buying a phone case from Amazon, sending in an on-line job application, or logging into your on-line bank account, you trust that the sensitive data you enter is secure. As our technology and computing power become more sophisticated, so do the tools used by potential hackers to our information. In this paper, the underlying mathematics within ciphers will be looked at to understand the security of modern ciphers.

An extremely important algorithm in today's practice is the Advanced Encryption Standard (AES), which is used by our very own National Security Agency (NSA) for data up to TOP SECRET. Another frequently used cipher is the RSA cryptosystem. Its security is based on the concept of prime factorization, and the fact that it is a hard problem to prime factorize huge numbers, numbers on the scale of 2^{2048} or larger. Cryptanalysis, the study of breaking ciphers, will also be studied in this paper. Understanding effective attacks leads to understanding the construction of these very secure ciphers.

Recommended Citation

Lopez, Samuel, "MODERN CRYPTOGRAPHY" (2018). Electronic Theses, Projects, and Dissertations . 729.

Since June 07, 2018

Included in

Information Security Commons , Number Theory Commons

Advanced Search

Author Corner

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright Acrobat Reader

thesis on cryptography

2020 All Rights Reserved By © Matlab Simulation

Form Submitted, top quality cryptography thesis, related pages, research areas.

Digital Image processing

Medical Image processing

Biomedical Signal processing

Biometric Detection

Information Security

Neural Networks

Network Security

Wireless Networks

Wireless Communication

Matlab Simulink

power Electronics

Renewable Energy

Mobile Communication

Satellite Communication

Optical Communication

Video processing

Artificial Intelligence

Advanced Robotics

Related Tools





Cryptography is a security-based system that offers secured services such as integrity, user authentication, privacy as well as warehouses of confidential data over the communication channels. It is otherwise known as communication methodologies which are derived from the statistical approaches to make the message resilient to decipher .“This is the article which is fully contented with the concepts that are necessary for the best cryptography thesis ”

 In addition, they do have featured rule-based computation algorithms . These are widely used to generate cryptographic keys and to make digital operations trustworthy.

As you know that, data packets are being transmitted over the massive network. Hence there is a chance to face an attack or may lose confidential data inputted in it. Thus it is important to deploy a technology called “Cryptography”. 

Cryptography is the security-based technique used to encrypt the network data packets as well as generate two major keys named symmetric and asymmetric . These keys are used at the endpoints of both sender and receiver. Data packets encryption is possible by the asymmetric keys. Our technical crew has lighted up this article with an overview of cryptography for your better understanding

Overview of Cryptography

This is the overview of cryptography. In point of fact, cryptography concepts are having a huge amount of ideas and aspects that are used to secure the network from the unstable network. At this time, we felt that giving an explanation about the major functions of cryptography will make you understand better. Shall we get into the next section? Come on guys lets we brainstorm together to craft innovative cryptography thesis topics .

Top Quality Cryptography Thesis Research Guidance

Major Functions of Cryptography

The aforementioned are the major functioning areas of cryptography systems . Actually, cyber-attacks are getting boom day by day. The attackers in the network are trying to identify the loopholes and vulnerable areas in which they can intrude on the organization or network. This has aroused when we are started to use the internet connections. 

Besides, we cannot communicate without the aid of the internet. Hence, developers and engineers in the world are trying their best to eradicate the attacks. For this, we have suggested some of the emerging cryptographic algorithms for the ease of your understanding.

Emerging Cryptographic Algorithms                        

These are the diverse algorithms involved in development of cryptography thesis ideas . As a matter of fact, our knowledge hulks are well versed in the areas of cryptography. By doing so many researches and experiments in cryptography-related aspects we do prefer clear-cut algorithms to overcome all the possible issues that arise in the determined areas of research. 

Actually, we are being trusted by various students from all over the world in the event of guiding those throughout the proposed works get done. Now we can the section regarding cryptographic attacks.

What are Cryptographic Attacks?  

The main objective of the attacker is to get the secrecy of the data transmitted through the network by means of encryption. In recent days, we are facing so many social engineering and other harmful attacks and they are breaking the efficiency of the cryptosystems . But it needs some level of capacity or knowledge in the areas of arithmetical computations. 

In this regard, let us discuss the different types of attacks that are being presented in the cryptographic techniques. Are you interested to know about them? Yes, we know that you are keenly paying your attention here. Come on let us move on to the ensuing passage to make your understanding better in the attack areas too.

What are the Different Types of Attacks in Cryptography?

The above-mentioned are the innumerable attacks that are held in every organization and faced by each and every individual on the internet. As this article is focused on giving content on the subject of cryptography thesis here we would like to make your base as strong. That means we are going to explain one of the cryptographic attacks for the ease of your understanding. Yes, the next section is all about the side-channel attacks.

In the upcoming sections, we’ve clearly mentioned to you the overview of the side-channel attacks. Are you guys interested to know about them? We know that you are already tuned with the article’s flow! Come on lets we have the quick insights!!!

Side-Channel Attacks in Cryptography

Generally, the secured communication channel is intended to transfer the data which is resilient to altering purposes. On the other hand, robust data interference is possible in confidential communication channels. Thus the information can be read by some unauthorized individuals. A telecommunication channel is encrypted at both ends of parties. It is the inclusion of, 

This is how the side-channel attacks are taking advantage of the confidential data that is transmitted through the various channels of communication. Here, you might get confusion or dilemma about what will be the things that come under the side channels. Did our researchers guess right? Our technicians in the industry furthermore want to denote the exact side channels list for the ease of your understanding.

What are Side Channels?

The listed above are the channels which could leak the highly confidential data during the data transmission. In fact, this is becoming possible by the developer’s inefficient considerations while designing the cryptographic protocols and systems. For instance, giving if-else comments in the programming would give access to the attackers. As well as highly benefits the attackers by means of stealing the data assets . 

In addition to this section, we would also like to high spot the different classes of side-channel attacks for your cherished contemplations. In fact, this is one of the important areas of this article hence we are advising you to pay your attention here. Come on, guys! Let us move on to the immediate section.

Different Classes of Side-Channel Attacks

The listed above are the different classes of side-channel attacks. Apart from this attack, if you want to explore more in the other cryptographic attacks you could approach our researchers at any time. Usually, these attacks can be tackled by the implementation of cryptography schemes. Yes, this is the right time to discuss the attack prevention schemes in cryptography and steganography projects. Are you interested in stepping forward? Come on, dear students!!! Let grab them.

Attack Prevention Schemes in Cryptography 

The foregoing section has conveyed to you the different prevention schemes in cryptography. If you still need any assistance in these areas you are always hailed to have our opinions. As this article is focused on delivering the concepts in order to frame the best cryptography thesis here we primarily wanted to highlight how to write exact thesis chapters for your better understanding.

How to Write Cryptography Thesis Chapters?

The above listed are the common things that should be considered though writing a thesis. In addition to this, it is also important and essential to note the things to be presented in the thesis introduction areas. Yes, the next section is all about how a thesis introduction is to be written.

This is how the thesis is written and things need to be considered. Besides, our technical would like to make you better in the areas of the latest cryptography titles also. Yes, my dear students, we are going to envelop the next section with the various topics of cryptography thesis for your added knowledge. Come let us also learn them.

Top 15+ Interesting Cryptography Thesis Tiles for PhD and MS Scholars

Latest Thesis Titles in Cryptography

These are some of the developed thesis ideas of our technicians. Apart from this, we have conducted around 250+ cryptography thesis efficaciously with fruitful results. If you are surfing for assistance in writing a thesis then here is a suggestion, let’s make appointments with our researchers to get the newfangled ideas.

Let’s light up your dreams and apply your thought processes by means of technical researches!!!!

A life is full of expensive thing ‘TRUST’ Our Promises

100% confidential.

We don’t disclose our client’s data to any third party and it is kept as secret to all.

Fresh Ideas

All the time, you receive only the novel ideas that not release from anywhere.

Work Guarantee

We guarantee for your satisfaction and it is not further need of correction and complaints.

Plagiarism Free

We follow our own writing. It means that without copying from any source, we write it.

We are not intent to sale our product to more than one person. It is totally new for each.

Business Ethics

Surely, we follow our set of ethics to send the high quality products for everyone.

On-Time Delivery

We always deliver your work at the time of delivery. So that feels our timely guidance.

Affordable Price

We are not serving with high cost. You get an excellent work in at reasonable price.

We meet each individual customer’s demands by our years of skills. This is the secret of success.

Great Memories Our Achievements

We received great winning awards for our research awesomeness and it is the mark of our success stories. It shows our key strength and improvements in all research directions.

thesis on cryptography

Our Guidance

24/7 Support, Call Us @ Any Time [email protected] +91 94448 56435


  1. Post quantum cryptography

    thesis on cryptography

  2. PKI Thesis

    thesis on cryptography

  3. Nikremt

    thesis on cryptography

  4. Cryptography and network security thesis

    thesis on cryptography

  5. thesis_abstracts_2010

    thesis on cryptography

  6. Latest thesis on cryptography

    thesis on cryptography


  1. L8.2 Cryptography in context

  2. Foundations of Cryptography

  3. Foundations of Cryptography

  4. L5.2 Cryptography

  5. Lesson 114 : Basic Concepts On Cryptography

  6. Explaining Basic Cryptography Concepts


  1. A Thesis entitled Design and Implementation of a Customized

    There are three main branches of Cryptography: Symmetric systems, Asymmetric systems, and Cryptographic protocols. Secure internet communication can be realized.


    For this reason, NIST has started a Lightweight Cryptography Project to standardize lightweight algorithms. In this thesis, we first explain what

  3. Cryptography and Information Security

    Website Postal addressShow on map ... Student thesis: Doctoral Thesis › Doctor of Philosophy (PhD).

  4. "MODERN CRYPTOGRAPHY" by Samuel Lopez

    Lopez, Samuel, "MODERN CRYPTOGRAPHY" (2018). Electronic Theses, Projects, and Dissertations. 729.

  5. Analysis and Design of Symmetric Cryptographic Algorithms

    In the second part of the thesis, we focus on authenticated encryption schemes. While regular ciphers only protect privacy of processed data, authenticated

  6. Top 15+ Interesting Cryptography Thesis Titles for PhD & MS Scholars

    How to start writing a cryptography thesis? Get in touch with us for customized cryptography dissertation writing help from top rated writers.

  7. Security of Cryptographic Implementations

    This thesis focuses on issues arising when implementing cryptography, ... to turn a cryptographic algorithm into a practical system which can provide.

  8. Master's thesis

    In this section, some cryptography algorithms are briefly introduced, and each of them will be used in this thesis project. 2.4.1 Rivest-Shamir-Adleman (RSA).

  9. Cryptography: Mathematical Advancements on Cyber Security

    A Senior Thesis submitted in partial fulfillment ... Cryptography, the study of encryption and decryption, stems from the basic desire for privacy.

  10. thesis.pdf

    that all prior ciphers based on CA have been found to be vulnerable to attacks, the present work first develops cryptographic primitives using Cellular Automata